Developing and Deploying Security Applications for In-Vehicle Networks

Radiological material transportation is primarily facilitated by heavy-duty on-road vehicles. Modern vehicles have dozens of electronic control units or ECUs, which are small, embedded computers that communicate with sensors and each other for vehicle functionality. ECUs use a standardized network a...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Hollifield, Samuel C, Moriano, Pablo, Lambert, William L, Asiamah, Joel, Sikkema, Isaac, Iannacone, Michael D
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Hollifield, Samuel C
Moriano, Pablo
Lambert, William L
Asiamah, Joel
Sikkema, Isaac
Iannacone, Michael D
description Radiological material transportation is primarily facilitated by heavy-duty on-road vehicles. Modern vehicles have dozens of electronic control units or ECUs, which are small, embedded computers that communicate with sensors and each other for vehicle functionality. ECUs use a standardized network architecture--Controller Area Network or CAN--which presents grave security concerns that have been exploited by researchers and hackers alike. For instance, ECUs can be impersonated by adversaries who have infiltrated an automotive CAN and disable or invoke unintended vehicle functions such as brakes, acceleration, or safety mechanisms. Further, the quality of security approaches varies wildly between manufacturers. Thus, research and development of after-market security solutions have grown remarkably in recent years. Many researchers are exploring deployable intrusion detection and prevention mechanisms using machine learning and data science techniques. However, there is a gap between developing security system algorithms and deploying prototype security appliances in-vehicle. In this paper, we, a research team at Oak Ridge National Laboratory working in this space, highlight challenges in the development pipeline, and provide techniques to standardize methodology and overcome technological hurdles.
doi_str_mv 10.48550/arxiv.2306.15588
format Article
fullrecord <record><control><sourceid>arxiv_GOX</sourceid><recordid>TN_cdi_arxiv_primary_2306_15588</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2306_15588</sourcerecordid><originalsourceid>FETCH-LOGICAL-a678-fdb0dfd4b30c9b960728c2c680adcefb69fc60893e966312c19e302401489de83</originalsourceid><addsrcrecordid>eNotz7FOwzAUhWEvDKjwAEz4BRKu7cS1x6qlUKmCgYo1cuxrsDCx5YRC3h61MB39y5E-Qm4Y1I1qW7gz5Sccay5A1qxtlbok2w0eMaYchjdqBkc3mGOaT_WC9quEaaarnGOwZgppGKlPhe6G6hXfg41In3D6TuVjvCIX3sQRr_93QQ7b-8P6sdo_P-zWq31l5FJV3vXgvGt6AVb3WsKSK8utVGCcRd9L7a0EpQVqKQXjlmkUwBtgjdIOlViQ27_bM6TLJXyaMncnUHcGiV9GJEY9</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Developing and Deploying Security Applications for In-Vehicle Networks</title><source>arXiv.org</source><creator>Hollifield, Samuel C ; Moriano, Pablo ; Lambert, William L ; Asiamah, Joel ; Sikkema, Isaac ; Iannacone, Michael D</creator><creatorcontrib>Hollifield, Samuel C ; Moriano, Pablo ; Lambert, William L ; Asiamah, Joel ; Sikkema, Isaac ; Iannacone, Michael D</creatorcontrib><description>Radiological material transportation is primarily facilitated by heavy-duty on-road vehicles. Modern vehicles have dozens of electronic control units or ECUs, which are small, embedded computers that communicate with sensors and each other for vehicle functionality. ECUs use a standardized network architecture--Controller Area Network or CAN--which presents grave security concerns that have been exploited by researchers and hackers alike. For instance, ECUs can be impersonated by adversaries who have infiltrated an automotive CAN and disable or invoke unintended vehicle functions such as brakes, acceleration, or safety mechanisms. Further, the quality of security approaches varies wildly between manufacturers. Thus, research and development of after-market security solutions have grown remarkably in recent years. Many researchers are exploring deployable intrusion detection and prevention mechanisms using machine learning and data science techniques. However, there is a gap between developing security system algorithms and deploying prototype security appliances in-vehicle. In this paper, we, a research team at Oak Ridge National Laboratory working in this space, highlight challenges in the development pipeline, and provide techniques to standardize methodology and overcome technological hurdles.</description><identifier>DOI: 10.48550/arxiv.2306.15588</identifier><language>eng</language><subject>Computer Science - Cryptography and Security ; Computer Science - Systems and Control</subject><creationdate>2023-06</creationdate><rights>http://creativecommons.org/licenses/by-nc-nd/4.0</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>228,230,776,881</link.rule.ids><linktorsrc>$$Uhttps://arxiv.org/abs/2306.15588$$EView_record_in_Cornell_University$$FView_record_in_$$GCornell_University$$Hfree_for_read</linktorsrc><backlink>$$Uhttps://doi.org/10.48550/arXiv.2306.15588$$DView paper in arXiv$$Hfree_for_read</backlink></links><search><creatorcontrib>Hollifield, Samuel C</creatorcontrib><creatorcontrib>Moriano, Pablo</creatorcontrib><creatorcontrib>Lambert, William L</creatorcontrib><creatorcontrib>Asiamah, Joel</creatorcontrib><creatorcontrib>Sikkema, Isaac</creatorcontrib><creatorcontrib>Iannacone, Michael D</creatorcontrib><title>Developing and Deploying Security Applications for In-Vehicle Networks</title><description>Radiological material transportation is primarily facilitated by heavy-duty on-road vehicles. Modern vehicles have dozens of electronic control units or ECUs, which are small, embedded computers that communicate with sensors and each other for vehicle functionality. ECUs use a standardized network architecture--Controller Area Network or CAN--which presents grave security concerns that have been exploited by researchers and hackers alike. For instance, ECUs can be impersonated by adversaries who have infiltrated an automotive CAN and disable or invoke unintended vehicle functions such as brakes, acceleration, or safety mechanisms. Further, the quality of security approaches varies wildly between manufacturers. Thus, research and development of after-market security solutions have grown remarkably in recent years. Many researchers are exploring deployable intrusion detection and prevention mechanisms using machine learning and data science techniques. However, there is a gap between developing security system algorithms and deploying prototype security appliances in-vehicle. In this paper, we, a research team at Oak Ridge National Laboratory working in this space, highlight challenges in the development pipeline, and provide techniques to standardize methodology and overcome technological hurdles.</description><subject>Computer Science - Cryptography and Security</subject><subject>Computer Science - Systems and Control</subject><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>GOX</sourceid><recordid>eNotz7FOwzAUhWEvDKjwAEz4BRKu7cS1x6qlUKmCgYo1cuxrsDCx5YRC3h61MB39y5E-Qm4Y1I1qW7gz5Sccay5A1qxtlbok2w0eMaYchjdqBkc3mGOaT_WC9quEaaarnGOwZgppGKlPhe6G6hXfg41In3D6TuVjvCIX3sQRr_93QQ7b-8P6sdo_P-zWq31l5FJV3vXgvGt6AVb3WsKSK8utVGCcRd9L7a0EpQVqKQXjlmkUwBtgjdIOlViQ27_bM6TLJXyaMncnUHcGiV9GJEY9</recordid><startdate>20230627</startdate><enddate>20230627</enddate><creator>Hollifield, Samuel C</creator><creator>Moriano, Pablo</creator><creator>Lambert, William L</creator><creator>Asiamah, Joel</creator><creator>Sikkema, Isaac</creator><creator>Iannacone, Michael D</creator><scope>AKY</scope><scope>GOX</scope></search><sort><creationdate>20230627</creationdate><title>Developing and Deploying Security Applications for In-Vehicle Networks</title><author>Hollifield, Samuel C ; Moriano, Pablo ; Lambert, William L ; Asiamah, Joel ; Sikkema, Isaac ; Iannacone, Michael D</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a678-fdb0dfd4b30c9b960728c2c680adcefb69fc60893e966312c19e302401489de83</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Computer Science - Cryptography and Security</topic><topic>Computer Science - Systems and Control</topic><toplevel>online_resources</toplevel><creatorcontrib>Hollifield, Samuel C</creatorcontrib><creatorcontrib>Moriano, Pablo</creatorcontrib><creatorcontrib>Lambert, William L</creatorcontrib><creatorcontrib>Asiamah, Joel</creatorcontrib><creatorcontrib>Sikkema, Isaac</creatorcontrib><creatorcontrib>Iannacone, Michael D</creatorcontrib><collection>arXiv Computer Science</collection><collection>arXiv.org</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Hollifield, Samuel C</au><au>Moriano, Pablo</au><au>Lambert, William L</au><au>Asiamah, Joel</au><au>Sikkema, Isaac</au><au>Iannacone, Michael D</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Developing and Deploying Security Applications for In-Vehicle Networks</atitle><date>2023-06-27</date><risdate>2023</risdate><abstract>Radiological material transportation is primarily facilitated by heavy-duty on-road vehicles. Modern vehicles have dozens of electronic control units or ECUs, which are small, embedded computers that communicate with sensors and each other for vehicle functionality. ECUs use a standardized network architecture--Controller Area Network or CAN--which presents grave security concerns that have been exploited by researchers and hackers alike. For instance, ECUs can be impersonated by adversaries who have infiltrated an automotive CAN and disable or invoke unintended vehicle functions such as brakes, acceleration, or safety mechanisms. Further, the quality of security approaches varies wildly between manufacturers. Thus, research and development of after-market security solutions have grown remarkably in recent years. Many researchers are exploring deployable intrusion detection and prevention mechanisms using machine learning and data science techniques. However, there is a gap between developing security system algorithms and deploying prototype security appliances in-vehicle. In this paper, we, a research team at Oak Ridge National Laboratory working in this space, highlight challenges in the development pipeline, and provide techniques to standardize methodology and overcome technological hurdles.</abstract><doi>10.48550/arxiv.2306.15588</doi><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier DOI: 10.48550/arxiv.2306.15588
ispartof
issn
language eng
recordid cdi_arxiv_primary_2306_15588
source arXiv.org
subjects Computer Science - Cryptography and Security
Computer Science - Systems and Control
title Developing and Deploying Security Applications for In-Vehicle Networks
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-24T19%3A52%3A26IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-arxiv_GOX&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Developing%20and%20Deploying%20Security%20Applications%20for%20In-Vehicle%20Networks&rft.au=Hollifield,%20Samuel%20C&rft.date=2023-06-27&rft_id=info:doi/10.48550/arxiv.2306.15588&rft_dat=%3Carxiv_GOX%3E2306_15588%3C/arxiv_GOX%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true