VoltageIDS: Low-Level Communication Characteristics for Automotive Intrusion Detection System

The proliferation of computerized functions aimed at enhancing drivers' safety and convenience has increased the number of vehicular attack surfaces accordingly. The fundamental vulnerability is caused by the fact that the controller area network protocol, a de facto standard for in-vehicle net...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on information forensics and security 2018-08, Vol.13 (8), p.2114-2129
Hauptverfasser: Choi, Wonsuk, Joo, Kyungho, Jo, Hyo Jin, Park, Moon Chan, Lee, Dong Hoon
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 2129
container_issue 8
container_start_page 2114
container_title IEEE transactions on information forensics and security
container_volume 13
creator Choi, Wonsuk
Joo, Kyungho
Jo, Hyo Jin
Park, Moon Chan
Lee, Dong Hoon
description The proliferation of computerized functions aimed at enhancing drivers' safety and convenience has increased the number of vehicular attack surfaces accordingly. The fundamental vulnerability is caused by the fact that the controller area network protocol, a de facto standard for in-vehicle networks, does not support message origin authentication. Several methods to resolve this problem have been suggested. However, most of them require modification of the CAN protocol and have their own vulnerabilities. In this paper, we focus on securing in-vehicle CAN networks, proposing a novel automotive intrusion detection system (so-called VoltageIDS). The system leverages the inimitable characteristics of an electrical CAN signal as a fingerprint of the electronic control units. The noteworthy contributions are that VoltageIDS does not require any modification of the current system and has been validated on actual vehicles while driving on the road. VoltageIDS is also the first automotive intrusion detection system capable of distinguishing between errors and the bus-off attack. Our experimental results on a CAN bus prototype and on real vehicles show that VoltageIDS detects intrusions in the in-vehicle CAN network. Moreover, we evaluate VoltageIDS while a vehicle is moving.
doi_str_mv 10.1109/TIFS.2018.2812149
format Article
fullrecord <record><control><sourceid>crossref_RIE</sourceid><recordid>TN_cdi_crossref_primary_10_1109_TIFS_2018_2812149</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>8306904</ieee_id><sourcerecordid>10_1109_TIFS_2018_2812149</sourcerecordid><originalsourceid>FETCH-LOGICAL-c331t-44aab4ecb5a616c4de7335c975bdf6682f821c8124f2a70bb01355eec57e513</originalsourceid><addsrcrecordid>eNo9kM1Kw0AUhQdRsFYfQNzkBVLnzl8SdyW1Ggi4SHEnYTK90UjTkZlppW9vYktX9y7Od-B8hNwDnQHQ7HFVLKsZo5DOWAoMRHZBJiClihVlcHn-gV-TG--_KRUCVDohH-92E_QnFovqKSrtb1ziHjdRbvt-t-2MDp3dRvmXdtoEdJ0PnfFRa1003wXb29DtMSq2we38GFxgQPOPVAcfsL8lV63eeLw73Smpls-r_DUu316KfF7GhnMIsRBaNwJNI7UCZcQaE86lyRLZrFulUtamDMywS7RMJ7Rphh1SIhqZoAQ-JXBsNc5677Ctf1zXa3eogdajnXq0U4926pOdgXk4Mh0invMppyqjgv8BhM9iig</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>VoltageIDS: Low-Level Communication Characteristics for Automotive Intrusion Detection System</title><source>IEEE Electronic Library (IEL)</source><creator>Choi, Wonsuk ; Joo, Kyungho ; Jo, Hyo Jin ; Park, Moon Chan ; Lee, Dong Hoon</creator><creatorcontrib>Choi, Wonsuk ; Joo, Kyungho ; Jo, Hyo Jin ; Park, Moon Chan ; Lee, Dong Hoon</creatorcontrib><description>The proliferation of computerized functions aimed at enhancing drivers' safety and convenience has increased the number of vehicular attack surfaces accordingly. The fundamental vulnerability is caused by the fact that the controller area network protocol, a de facto standard for in-vehicle networks, does not support message origin authentication. Several methods to resolve this problem have been suggested. However, most of them require modification of the CAN protocol and have their own vulnerabilities. In this paper, we focus on securing in-vehicle CAN networks, proposing a novel automotive intrusion detection system (so-called VoltageIDS). The system leverages the inimitable characteristics of an electrical CAN signal as a fingerprint of the electronic control units. The noteworthy contributions are that VoltageIDS does not require any modification of the current system and has been validated on actual vehicles while driving on the road. VoltageIDS is also the first automotive intrusion detection system capable of distinguishing between errors and the bus-off attack. Our experimental results on a CAN bus prototype and on real vehicles show that VoltageIDS detects intrusions in the in-vehicle CAN network. Moreover, we evaluate VoltageIDS while a vehicle is moving.</description><identifier>ISSN: 1556-6013</identifier><identifier>EISSN: 1556-6021</identifier><identifier>DOI: 10.1109/TIFS.2018.2812149</identifier><identifier>CODEN: ITIFA6</identifier><language>eng</language><publisher>IEEE</publisher><subject>Automotive engineering ; automotive IDS ; Clocks ; Controller area network ; Electric variables ; electronic control unit ; fingerprinting ; Intrusion detection ; Message authentication ; Protocols ; Telematics</subject><ispartof>IEEE transactions on information forensics and security, 2018-08, Vol.13 (8), p.2114-2129</ispartof><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c331t-44aab4ecb5a616c4de7335c975bdf6682f821c8124f2a70bb01355eec57e513</citedby><cites>FETCH-LOGICAL-c331t-44aab4ecb5a616c4de7335c975bdf6682f821c8124f2a70bb01355eec57e513</cites><orcidid>0000-0003-0692-2543 ; 0000-0001-5075-7114</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/8306904$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,792,27901,27902,54733</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/8306904$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Choi, Wonsuk</creatorcontrib><creatorcontrib>Joo, Kyungho</creatorcontrib><creatorcontrib>Jo, Hyo Jin</creatorcontrib><creatorcontrib>Park, Moon Chan</creatorcontrib><creatorcontrib>Lee, Dong Hoon</creatorcontrib><title>VoltageIDS: Low-Level Communication Characteristics for Automotive Intrusion Detection System</title><title>IEEE transactions on information forensics and security</title><addtitle>TIFS</addtitle><description>The proliferation of computerized functions aimed at enhancing drivers' safety and convenience has increased the number of vehicular attack surfaces accordingly. The fundamental vulnerability is caused by the fact that the controller area network protocol, a de facto standard for in-vehicle networks, does not support message origin authentication. Several methods to resolve this problem have been suggested. However, most of them require modification of the CAN protocol and have their own vulnerabilities. In this paper, we focus on securing in-vehicle CAN networks, proposing a novel automotive intrusion detection system (so-called VoltageIDS). The system leverages the inimitable characteristics of an electrical CAN signal as a fingerprint of the electronic control units. The noteworthy contributions are that VoltageIDS does not require any modification of the current system and has been validated on actual vehicles while driving on the road. VoltageIDS is also the first automotive intrusion detection system capable of distinguishing between errors and the bus-off attack. Our experimental results on a CAN bus prototype and on real vehicles show that VoltageIDS detects intrusions in the in-vehicle CAN network. Moreover, we evaluate VoltageIDS while a vehicle is moving.</description><subject>Automotive engineering</subject><subject>automotive IDS</subject><subject>Clocks</subject><subject>Controller area network</subject><subject>Electric variables</subject><subject>electronic control unit</subject><subject>fingerprinting</subject><subject>Intrusion detection</subject><subject>Message authentication</subject><subject>Protocols</subject><subject>Telematics</subject><issn>1556-6013</issn><issn>1556-6021</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2018</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNo9kM1Kw0AUhQdRsFYfQNzkBVLnzl8SdyW1Ggi4SHEnYTK90UjTkZlppW9vYktX9y7Od-B8hNwDnQHQ7HFVLKsZo5DOWAoMRHZBJiClihVlcHn-gV-TG--_KRUCVDohH-92E_QnFovqKSrtb1ziHjdRbvt-t-2MDp3dRvmXdtoEdJ0PnfFRa1003wXb29DtMSq2we38GFxgQPOPVAcfsL8lV63eeLw73Smpls-r_DUu316KfF7GhnMIsRBaNwJNI7UCZcQaE86lyRLZrFulUtamDMywS7RMJ7Rphh1SIhqZoAQ-JXBsNc5677Ctf1zXa3eogdajnXq0U4926pOdgXk4Mh0invMppyqjgv8BhM9iig</recordid><startdate>201808</startdate><enddate>201808</enddate><creator>Choi, Wonsuk</creator><creator>Joo, Kyungho</creator><creator>Jo, Hyo Jin</creator><creator>Park, Moon Chan</creator><creator>Lee, Dong Hoon</creator><general>IEEE</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><orcidid>https://orcid.org/0000-0003-0692-2543</orcidid><orcidid>https://orcid.org/0000-0001-5075-7114</orcidid></search><sort><creationdate>201808</creationdate><title>VoltageIDS: Low-Level Communication Characteristics for Automotive Intrusion Detection System</title><author>Choi, Wonsuk ; Joo, Kyungho ; Jo, Hyo Jin ; Park, Moon Chan ; Lee, Dong Hoon</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c331t-44aab4ecb5a616c4de7335c975bdf6682f821c8124f2a70bb01355eec57e513</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2018</creationdate><topic>Automotive engineering</topic><topic>automotive IDS</topic><topic>Clocks</topic><topic>Controller area network</topic><topic>Electric variables</topic><topic>electronic control unit</topic><topic>fingerprinting</topic><topic>Intrusion detection</topic><topic>Message authentication</topic><topic>Protocols</topic><topic>Telematics</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Choi, Wonsuk</creatorcontrib><creatorcontrib>Joo, Kyungho</creatorcontrib><creatorcontrib>Jo, Hyo Jin</creatorcontrib><creatorcontrib>Park, Moon Chan</creatorcontrib><creatorcontrib>Lee, Dong Hoon</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><jtitle>IEEE transactions on information forensics and security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Choi, Wonsuk</au><au>Joo, Kyungho</au><au>Jo, Hyo Jin</au><au>Park, Moon Chan</au><au>Lee, Dong Hoon</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>VoltageIDS: Low-Level Communication Characteristics for Automotive Intrusion Detection System</atitle><jtitle>IEEE transactions on information forensics and security</jtitle><stitle>TIFS</stitle><date>2018-08</date><risdate>2018</risdate><volume>13</volume><issue>8</issue><spage>2114</spage><epage>2129</epage><pages>2114-2129</pages><issn>1556-6013</issn><eissn>1556-6021</eissn><coden>ITIFA6</coden><abstract>The proliferation of computerized functions aimed at enhancing drivers' safety and convenience has increased the number of vehicular attack surfaces accordingly. The fundamental vulnerability is caused by the fact that the controller area network protocol, a de facto standard for in-vehicle networks, does not support message origin authentication. Several methods to resolve this problem have been suggested. However, most of them require modification of the CAN protocol and have their own vulnerabilities. In this paper, we focus on securing in-vehicle CAN networks, proposing a novel automotive intrusion detection system (so-called VoltageIDS). The system leverages the inimitable characteristics of an electrical CAN signal as a fingerprint of the electronic control units. The noteworthy contributions are that VoltageIDS does not require any modification of the current system and has been validated on actual vehicles while driving on the road. VoltageIDS is also the first automotive intrusion detection system capable of distinguishing between errors and the bus-off attack. Our experimental results on a CAN bus prototype and on real vehicles show that VoltageIDS detects intrusions in the in-vehicle CAN network. Moreover, we evaluate VoltageIDS while a vehicle is moving.</abstract><pub>IEEE</pub><doi>10.1109/TIFS.2018.2812149</doi><tpages>16</tpages><orcidid>https://orcid.org/0000-0003-0692-2543</orcidid><orcidid>https://orcid.org/0000-0001-5075-7114</orcidid></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1556-6013
ispartof IEEE transactions on information forensics and security, 2018-08, Vol.13 (8), p.2114-2129
issn 1556-6013
1556-6021
language eng
recordid cdi_crossref_primary_10_1109_TIFS_2018_2812149
source IEEE Electronic Library (IEL)
subjects Automotive engineering
automotive IDS
Clocks
Controller area network
Electric variables
electronic control unit
fingerprinting
Intrusion detection
Message authentication
Protocols
Telematics
title VoltageIDS: Low-Level Communication Characteristics for Automotive Intrusion Detection System
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-05T11%3A38%3A53IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-crossref_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=VoltageIDS:%20Low-Level%20Communication%20Characteristics%20for%20Automotive%20Intrusion%20Detection%20System&rft.jtitle=IEEE%20transactions%20on%20information%20forensics%20and%20security&rft.au=Choi,%20Wonsuk&rft.date=2018-08&rft.volume=13&rft.issue=8&rft.spage=2114&rft.epage=2129&rft.pages=2114-2129&rft.issn=1556-6013&rft.eissn=1556-6021&rft.coden=ITIFA6&rft_id=info:doi/10.1109/TIFS.2018.2812149&rft_dat=%3Ccrossref_RIE%3E10_1109_TIFS_2018_2812149%3C/crossref_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=8306904&rfr_iscdi=true