Vulnerability Analysis of Highly Automated Vehicular Systems Using Structural Redundancy

被引:1
|
作者
Renganathan, Vishnu [1 ]
Ahmed, Qadeer [2 ]
机构
[1] Ohio State Univ, Dept Elect & Comp Engn, Columbus, OH 43210 USA
[2] Ohio State Univ, Dept Mech & Aerosp Engn, Columbus, OH 43210 USA
关键词
Vulnerability analysis; Vehicular cybersecurity; structural model;
D O I
10.1109/IV55152.2023.10186588
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Vulnerability analysis and security quantification for automotive systems with limited system information is an arduous task. This work performs vulnerability analysis of Highly Automated Vehicular Systems (HAVS) using its structural model. The analysis is performed based on the severity and detectability of attacks in the system. We consider a grey box - an unknown nonlinear dynamic model of the system. We decipher the dependency of input-output constraints by analyzing the behavioral model developed by measuring the outputs while manipulating the inputs on the Controller Area Network (CAN). We identify the vulnerabilities in the system that are exploited due to improper network segmentation (improper gateway implementation), open network components, and sensors and model them with the system dynamics as attack vectors. We then identify the redundant and non-redundant parts of the system based on the unknown variables and sensor configuration. Then we analyze the security implications based on the placement of the attack vectors with respect to the redundant and non-redundant parts using canonical decomposition of the structural model. With the help of Model-In-Loop (MIL) simulations, we verify and evaluate how the proposed analysis could be used to enhance automotive security.
引用
收藏
页数:7
相关论文
共 50 条
  • [1] Redundancy for Highly Available Systems - Design and Analysis
    Gamer, Thomas
    Stattelmann, Stefan
    ATP EDITION, 2014, (05): : 42 - 52
  • [2] Vulnerability Analysis of Vehicular
    Kalogiannis, Konstantinos
    Henriksson, Andreas
    Papadimitratos, Panos
    2023 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS, EUROS&PW, 2023, : 11 - 20
  • [3] Supporting Automated Vulnerability Analysis Using Formalized Vulnerability Signatures
    Almorsy, Mohamed
    Grundy, John
    Ibrahim, Amani S.
    2012 PROCEEDINGS OF THE 27TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE), 2012, : 100 - 109
  • [4] Technical Systems with Structural and Time Redundancy: A Probabilistic Analysis of Their Performance
    R. V. Kakubava
    R. A. Khurodze
    Automation and Remote Control, 2004, 65 : 825 - 833
  • [5] Stochastic Simulation and Analysis of the Operation of Computing Systems with Structural Redundancy
    Pavskii, V. A.
    Pavskii, K. V.
    OPTOELECTRONICS INSTRUMENTATION AND DATA PROCESSING, 2014, 50 (04) : 363 - 369
  • [6] Technical systems with structural and time redundancy: A probabilistic analysis of their performance
    Kakubava, RV
    Khurodze, RA
    AUTOMATION AND REMOTE CONTROL, 2004, 65 (05) : 825 - 833
  • [7] Redundancy of Structural Systems in the Context of Structural Safety
    Fang, Z. X.
    Fan, H. T.
    PROCEEDINGS OF THE TWELFTH EAST ASIA-PACIFIC CONFERENCE ON STRUCTURAL ENGINEERING AND CONSTRUCTION (EASEC12), 2011, 14
  • [8] Vulnerability of structural systems
    Agarwal, J
    Blockley, D
    Woodman, N
    STRUCTURAL SAFETY, 2003, 25 (03) : 263 - 286
  • [9] Structural and systems vulnerability
    Agarwal, J
    Blockley, DI
    Woodman, NJ
    APPLICATIONS OF STATISTICS AND PROBABILITY, VOLS 1 AND 2: CIVIL ENGINEERING RELIABILITY AND RISK ANALYSIS, 2000, : 1039 - 1046
  • [10] Seismic vulnerability analysis of series isolated structural systems
    Wu D.
    Li J.-J.
    Tan P.
    Xiong Y.
    Huo W.-G.
    Tan, Ping (11795234@qq.com), 1600, Tsinghua University (34): : 227 - 232