Vulnerability Analysis of Highly Automated Vehicular Systems Using Structural Redundancy

被引:1
|
作者
Renganathan, Vishnu [1 ]
Ahmed, Qadeer [2 ]
机构
[1] Ohio State Univ, Dept Elect & Comp Engn, Columbus, OH 43210 USA
[2] Ohio State Univ, Dept Mech & Aerosp Engn, Columbus, OH 43210 USA
关键词
Vulnerability analysis; Vehicular cybersecurity; structural model;
D O I
10.1109/IV55152.2023.10186588
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Vulnerability analysis and security quantification for automotive systems with limited system information is an arduous task. This work performs vulnerability analysis of Highly Automated Vehicular Systems (HAVS) using its structural model. The analysis is performed based on the severity and detectability of attacks in the system. We consider a grey box - an unknown nonlinear dynamic model of the system. We decipher the dependency of input-output constraints by analyzing the behavioral model developed by measuring the outputs while manipulating the inputs on the Controller Area Network (CAN). We identify the vulnerabilities in the system that are exploited due to improper network segmentation (improper gateway implementation), open network components, and sensors and model them with the system dynamics as attack vectors. We then identify the redundant and non-redundant parts of the system based on the unknown variables and sensor configuration. Then we analyze the security implications based on the placement of the attack vectors with respect to the redundant and non-redundant parts using canonical decomposition of the structural model. With the help of Model-In-Loop (MIL) simulations, we verify and evaluate how the proposed analysis could be used to enhance automotive security.
引用
收藏
页数:7
相关论文
共 50 条
  • [21] CRYPTOGRAPHIC SYSTEMS USING REDUNDANCY
    AGNEW, GB
    IEEE TRANSACTIONS ON INFORMATION THEORY, 1990, 36 (01) : 31 - 39
  • [22] Diagnostic fault equivalence identification using redundancy information & structural analysis
    Hartanto, I
    Boppana, V
    Fuchs, WK
    INTERNATIONAL TEST CONFERENCE 1996, PROCEEDINGS, 1996, : 294 - 302
  • [23] OPTIMUM DESIGN, REDUNDANCY AND RELIABILITY OF STRUCTURAL SYSTEMS
    FENG, YS
    MOSES, F
    COMPUTERS & STRUCTURES, 1986, 24 (02) : 239 - 251
  • [24] Stochastic matrices and the assessment of the vulnerability of automated systems
    Vydrin A.S.
    Mikhalev A.V.
    Journal of Mathematical Sciences, 2008, 152 (4) : 490 - 516
  • [25] Analysis and design of vehicular power systems using PSCAD/EMTDC
    Filizadeh, S.
    Chevrefils, A. R.
    Northcott, D. R.
    2007 IEEE VEHICLE POWER AND PROPULSION CONFERENCE, VOLS 1 AND 2, 2007, : 463 - 468
  • [26] History and Future of Automated Vulnerability Analysis
    Doupe, Adam
    PROCEEDINGS OF THE 24TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT '19), 2019, : 147 - 147
  • [27] Vulnerability analysis of power systems using bilevel programing
    Agudelo, Laura
    López-Lezama, Jesús M.
    Muñoz, Nicolás
    Informacion Tecnologica, 2014, 25 (03): : 103 - 114
  • [28] Structural Vulnerability Analysis of Interdependent Electric Power and Natural Gas Systems
    Amusan, Olabode
    Shi, Shuomang
    Wu, Di
    Liao, Haitao
    ENERGIES, 2023, 16 (19)
  • [29] Protective Redundancy Overhead Reduction Using Instruction Vulnerability Factor
    Borodin, Demid
    Juurlink, B. H. H.
    PROCEEDINGS OF THE 2010 COMPUTING FRONTIERS CONFERENCE (CF 2010), 2010, : 319 - 326
  • [30] Structural safety, technical reliability, and optimal redundancy allocation in structural systems
    Beck, Andre T.
    CIVIL ENGINEERING AND ENVIRONMENTAL SYSTEMS, 2024,