CANon: Lightweight and Practical Cyber-Attack Detection for Automotive Controller Area Networks

被引:1
|
作者
Baek, Youngmi [1 ]
Shin, Seongjoo [2 ]
机构
[1] Changshin Univ, Dept Comp Software Engn, Chang Won 51352, South Korea
[2] DGIST, Resilient CPS Res Ctr, Daegu 42988, South Korea
基金
新加坡国家研究基金会;
关键词
in-vehicle network; sequential hash chain; one-time key; controller area network; AUTHENTICATION;
D O I
10.3390/s22072636
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Automotive cyber-physical systems are in transition from the closed-systems to open-networking systems. As a result, in-vehicle networks such as the controller area network (CAN) have become essential to connect to inter-vehicle networks through the various rich interfaces. Newly exposed security concerns derived from this requirement may cause in-vehicle networks to pose threats to automotive security and driver's safety. In this paper, to ensure a high level of security of the in-vehicle network for automotive CPS, we propose a novel lightweight and practical cyber defense platform, referred to as CANon (CAN with origin authentication and non-repudiation), to be enabled to detect cyber-attacks in real-time. CANon is designed based on the hierarchical approach of centralized-session management and distributed-origin authentication. In the former, a gateway node manages each initialization vector and session of origin-centric groups consisting of two more sending and receiving nodes. In the latter, the receiving nodes belonging to the given origin-centric group individually perform the symmetric key-based detection against cyber-attacks by verifying each message received from the sending node, namely origin authentication, in real-time. To improve the control security, CANon employs a one-time local key selected from a sequential hash chain (SHC) for authentication of an origin node in a distributed mode and exploits the iterative hash operations with randomness. Since the SHC can constantly generate and consume hash values regardless of their memory capacities, it is very effective for resource-limited nodes for in-vehicle networks. In addition, through implicit key synchronization within a given group, CANon addresses the challenges of a key exposure problem and a complex key distribution mechanism when performing symmetric key-based authentication. To achieve lightweight cyber-attack detection without imposing an additive load on CAN, CANon uses a keyed-message authentication code (KMAC) activated within a given group. The detection performance of CANon is evaluated under an actual node of Freescale S12XF and virtual nodes operating on the well-known CANoe tool. It is seen that the detection rate of CANon against brute-force and replay attacks reaches 100% when the length of KMAC is over 16 bits. It demonstrates that CANon ensures high security and is sufficient to operate in real-time even on low-performance ECUs. Moreover, CANon based on several software modules operates without an additive hardware security module at an upper layer of the CAN protocol and can be directly ported to CAN-FD (CAN with Flexible Data rate) so that it achieves the practical cyber defense platform.
引用
收藏
页数:32
相关论文
共 50 条
  • [1] Adaptive and Lightweight Cyber-Attack Detection in Modern Automotive Cyber-Physical Systems
    Baek, Youngmi
    Park, Seo-Hee
    [J]. 2023 IEEE 20TH CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC, 2023,
  • [2] Controller Cyber-Attack Detection and Isolation
    Sztyber-Betley, Anna
    Syfert, Michal
    Koscielny, Jan Maciej
    Gorecka, Zuzanna
    [J]. SENSORS, 2023, 23 (05)
  • [3] Cyber-Attack Detection for Automotive Cyber-Physical Systems
    Lee, Suyun
    Jung, Sunjae
    Baek, Youngmi
    [J]. BUILDSYS'21: PROCEEDINGS OF THE 2021 ACM INTERNATIONAL CONFERENCE ON SYSTEMS FOR ENERGY-EFFICIENT BUILT ENVIRONMENTS, 2021, : 214 - 215
  • [4] Bridging the Air Gap between Isolated Networks and Mobile Phones in a Practical Cyber-Attack
    Guri, Mordechai
    Monitz, Matan
    Elovici, Yuval
    [J]. ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY, 2017, 8 (04)
  • [5] Data Mining Based Cyber-Attack Detection
    TIANFIELD Huaglory
    [J]. 系统仿真技术, 2017, 13 (02) : 90 - 104
  • [6] Cyber-Attack Resilient Design of Wide-Area PSS Considering Practical Communication Constraints
    Prakash, Tapan
    Singh, Vinay Pratap
    Mohanty, Soumya R.
    [J]. IEEE SYSTEMS JOURNAL, 2020, 14 (02): : 2012 - 2022
  • [7] Secure Traffic Networks in Smart Cities: Analysis and Design of Cyber-Attack Detection Algorithms
    Roy, Tanushree
    Dey, Satadru
    [J]. 2020 AMERICAN CONTROL CONFERENCE (ACC), 2020, : 4102 - 4107
  • [8] Cyber-attack detection based on controlled invariant sets
    Rosich, Albert
    Voos, Holger
    Darouach, Mohamed
    [J]. 2014 EUROPEAN CONTROL CONFERENCE (ECC), 2014, : 2176 - 2181
  • [9] A Cyber-Attack Detection Model Based on Multivariate Analyses
    Sakai, Yuto
    Rinsaka, Koichiro
    Dohi, Tadashi
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009, E92A (07) : 1585 - 1592
  • [10] A Stealth Cyber-Attack Detection Strategy for DC Microgrids
    Sahoo, Subham
    Mishra, Sukumar
    Peng, Jimmy Chih-Hsien
    Dragicevic, Tomislav
    [J]. IEEE TRANSACTIONS ON POWER ELECTRONICS, 2019, 34 (08) : 8162 - 8174