Affiliation:
1. School of Electronic and Information Engineering, Soochow University, Suzhou 215006, China
2. School of Electronic and Information Engineering, Wuxi University, Wuxi 214105, China
Abstract
The Internet of Vehicles (IoV) empowers intelligent and tailored services for intelligent connected vehicles (ICVs). However, with the increasing number of onboard external communication interfaces, ICVs face the challenges of malicious network intrusions. The closure of traditional vehicles had led to in-vehicle communication protocols, including the most commonly applied controller area network (CAN), and a lack of security and privacy protection mechanisms. Therefore, to protect the connected vehicles and IoV systems from being attacked, an intrusion-detection method is proposed based on the features extracted from the arbitration identifier (ID) field of CAN messages. Specifically, a sliding window is used to continuously extract a frame of streaming CAN messages first. Afterward, the weighted self-information of the CAN message ID is defined, and both the weighted self-information and the normalized value of an ID are extracted as features. Based on the extracted features, a lightweight one-class classifier, the local outlier factor (LOF), is used to identify the outliers and detect malicious network intrusion attacks. Simulation experiments were conducted based on the public CAN dataset provided by the HCR Lab. The proposed method, using four different one-class classifiers, was analyzed, and it is also benchmarked with three information entropy-based intrusion-detection methods in the literature. The experimental results indicate that, compared to the benchmarks, the proposed method dramatically improves the detection accuracy for injection attacks, namely denial-of-service (DoS) and spoofing, especially when the number of injected messages is low.
Funder
National Natural Science Foundation of China
Natural Science Foundation of Jiangsu Province
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Hardware and Architecture,Signal Processing,Control and Systems Engineering
Reference16 articles.
1. Integrating sensing, computing, and communication in 6G wireless networks: Design and optimization;Qi;IEEE Trans. Commun.,2022
2. Future intelligent and secure vehicular network toward 6G: Machine-learning approaches;Tang;Proc. IEEE,2020
3. A survey of intrusion detection for in-vehicle networks;Wu;IEEE Trans. Intell. Transp. Syst.,2020
4. Remote exploitation of an unaltered passenger vehicle;Miller;Black Hat USA,2015
5. Free-fall: Hacking tesla from wireless to can bus;Nie;Brief. Black Hat USA,2017
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献