VoltageIDS: Low-Level Communication Characteristics for Automotive Intrusion Detection System
The proliferation of computerized functions aimed at enhancing drivers' safety and convenience has increased the number of vehicular attack surfaces accordingly. The fundamental vulnerability is caused by the fact that the controller area network protocol, a de facto standard for in-vehicle net...
Gespeichert in:
Veröffentlicht in: | IEEE transactions on information forensics and security 2018-08, Vol.13 (8), p.2114-2129 |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 2129 |
---|---|
container_issue | 8 |
container_start_page | 2114 |
container_title | IEEE transactions on information forensics and security |
container_volume | 13 |
creator | Choi, Wonsuk Joo, Kyungho Jo, Hyo Jin Park, Moon Chan Lee, Dong Hoon |
description | The proliferation of computerized functions aimed at enhancing drivers' safety and convenience has increased the number of vehicular attack surfaces accordingly. The fundamental vulnerability is caused by the fact that the controller area network protocol, a de facto standard for in-vehicle networks, does not support message origin authentication. Several methods to resolve this problem have been suggested. However, most of them require modification of the CAN protocol and have their own vulnerabilities. In this paper, we focus on securing in-vehicle CAN networks, proposing a novel automotive intrusion detection system (so-called VoltageIDS). The system leverages the inimitable characteristics of an electrical CAN signal as a fingerprint of the electronic control units. The noteworthy contributions are that VoltageIDS does not require any modification of the current system and has been validated on actual vehicles while driving on the road. VoltageIDS is also the first automotive intrusion detection system capable of distinguishing between errors and the bus-off attack. Our experimental results on a CAN bus prototype and on real vehicles show that VoltageIDS detects intrusions in the in-vehicle CAN network. Moreover, we evaluate VoltageIDS while a vehicle is moving. |
doi_str_mv | 10.1109/TIFS.2018.2812149 |
format | Article |
fullrecord | <record><control><sourceid>crossref_RIE</sourceid><recordid>TN_cdi_crossref_primary_10_1109_TIFS_2018_2812149</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>8306904</ieee_id><sourcerecordid>10_1109_TIFS_2018_2812149</sourcerecordid><originalsourceid>FETCH-LOGICAL-c331t-44aab4ecb5a616c4de7335c975bdf6682f821c8124f2a70bb01355eec57e513</originalsourceid><addsrcrecordid>eNo9kM1Kw0AUhQdRsFYfQNzkBVLnzl8SdyW1Ggi4SHEnYTK90UjTkZlppW9vYktX9y7Od-B8hNwDnQHQ7HFVLKsZo5DOWAoMRHZBJiClihVlcHn-gV-TG--_KRUCVDohH-92E_QnFovqKSrtb1ziHjdRbvt-t-2MDp3dRvmXdtoEdJ0PnfFRa1003wXb29DtMSq2we38GFxgQPOPVAcfsL8lV63eeLw73Smpls-r_DUu316KfF7GhnMIsRBaNwJNI7UCZcQaE86lyRLZrFulUtamDMywS7RMJ7Rphh1SIhqZoAQ-JXBsNc5677Ctf1zXa3eogdajnXq0U4926pOdgXk4Mh0invMppyqjgv8BhM9iig</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>VoltageIDS: Low-Level Communication Characteristics for Automotive Intrusion Detection System</title><source>IEEE Electronic Library (IEL)</source><creator>Choi, Wonsuk ; Joo, Kyungho ; Jo, Hyo Jin ; Park, Moon Chan ; Lee, Dong Hoon</creator><creatorcontrib>Choi, Wonsuk ; Joo, Kyungho ; Jo, Hyo Jin ; Park, Moon Chan ; Lee, Dong Hoon</creatorcontrib><description>The proliferation of computerized functions aimed at enhancing drivers' safety and convenience has increased the number of vehicular attack surfaces accordingly. The fundamental vulnerability is caused by the fact that the controller area network protocol, a de facto standard for in-vehicle networks, does not support message origin authentication. Several methods to resolve this problem have been suggested. However, most of them require modification of the CAN protocol and have their own vulnerabilities. In this paper, we focus on securing in-vehicle CAN networks, proposing a novel automotive intrusion detection system (so-called VoltageIDS). The system leverages the inimitable characteristics of an electrical CAN signal as a fingerprint of the electronic control units. The noteworthy contributions are that VoltageIDS does not require any modification of the current system and has been validated on actual vehicles while driving on the road. VoltageIDS is also the first automotive intrusion detection system capable of distinguishing between errors and the bus-off attack. Our experimental results on a CAN bus prototype and on real vehicles show that VoltageIDS detects intrusions in the in-vehicle CAN network. Moreover, we evaluate VoltageIDS while a vehicle is moving.</description><identifier>ISSN: 1556-6013</identifier><identifier>EISSN: 1556-6021</identifier><identifier>DOI: 10.1109/TIFS.2018.2812149</identifier><identifier>CODEN: ITIFA6</identifier><language>eng</language><publisher>IEEE</publisher><subject>Automotive engineering ; automotive IDS ; Clocks ; Controller area network ; Electric variables ; electronic control unit ; fingerprinting ; Intrusion detection ; Message authentication ; Protocols ; Telematics</subject><ispartof>IEEE transactions on information forensics and security, 2018-08, Vol.13 (8), p.2114-2129</ispartof><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c331t-44aab4ecb5a616c4de7335c975bdf6682f821c8124f2a70bb01355eec57e513</citedby><cites>FETCH-LOGICAL-c331t-44aab4ecb5a616c4de7335c975bdf6682f821c8124f2a70bb01355eec57e513</cites><orcidid>0000-0003-0692-2543 ; 0000-0001-5075-7114</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/8306904$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,792,27901,27902,54733</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/8306904$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Choi, Wonsuk</creatorcontrib><creatorcontrib>Joo, Kyungho</creatorcontrib><creatorcontrib>Jo, Hyo Jin</creatorcontrib><creatorcontrib>Park, Moon Chan</creatorcontrib><creatorcontrib>Lee, Dong Hoon</creatorcontrib><title>VoltageIDS: Low-Level Communication Characteristics for Automotive Intrusion Detection System</title><title>IEEE transactions on information forensics and security</title><addtitle>TIFS</addtitle><description>The proliferation of computerized functions aimed at enhancing drivers' safety and convenience has increased the number of vehicular attack surfaces accordingly. The fundamental vulnerability is caused by the fact that the controller area network protocol, a de facto standard for in-vehicle networks, does not support message origin authentication. Several methods to resolve this problem have been suggested. However, most of them require modification of the CAN protocol and have their own vulnerabilities. In this paper, we focus on securing in-vehicle CAN networks, proposing a novel automotive intrusion detection system (so-called VoltageIDS). The system leverages the inimitable characteristics of an electrical CAN signal as a fingerprint of the electronic control units. The noteworthy contributions are that VoltageIDS does not require any modification of the current system and has been validated on actual vehicles while driving on the road. VoltageIDS is also the first automotive intrusion detection system capable of distinguishing between errors and the bus-off attack. Our experimental results on a CAN bus prototype and on real vehicles show that VoltageIDS detects intrusions in the in-vehicle CAN network. Moreover, we evaluate VoltageIDS while a vehicle is moving.</description><subject>Automotive engineering</subject><subject>automotive IDS</subject><subject>Clocks</subject><subject>Controller area network</subject><subject>Electric variables</subject><subject>electronic control unit</subject><subject>fingerprinting</subject><subject>Intrusion detection</subject><subject>Message authentication</subject><subject>Protocols</subject><subject>Telematics</subject><issn>1556-6013</issn><issn>1556-6021</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2018</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNo9kM1Kw0AUhQdRsFYfQNzkBVLnzl8SdyW1Ggi4SHEnYTK90UjTkZlppW9vYktX9y7Od-B8hNwDnQHQ7HFVLKsZo5DOWAoMRHZBJiClihVlcHn-gV-TG--_KRUCVDohH-92E_QnFovqKSrtb1ziHjdRbvt-t-2MDp3dRvmXdtoEdJ0PnfFRa1003wXb29DtMSq2we38GFxgQPOPVAcfsL8lV63eeLw73Smpls-r_DUu316KfF7GhnMIsRBaNwJNI7UCZcQaE86lyRLZrFulUtamDMywS7RMJ7Rphh1SIhqZoAQ-JXBsNc5677Ctf1zXa3eogdajnXq0U4926pOdgXk4Mh0invMppyqjgv8BhM9iig</recordid><startdate>201808</startdate><enddate>201808</enddate><creator>Choi, Wonsuk</creator><creator>Joo, Kyungho</creator><creator>Jo, Hyo Jin</creator><creator>Park, Moon Chan</creator><creator>Lee, Dong Hoon</creator><general>IEEE</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><orcidid>https://orcid.org/0000-0003-0692-2543</orcidid><orcidid>https://orcid.org/0000-0001-5075-7114</orcidid></search><sort><creationdate>201808</creationdate><title>VoltageIDS: Low-Level Communication Characteristics for Automotive Intrusion Detection System</title><author>Choi, Wonsuk ; Joo, Kyungho ; Jo, Hyo Jin ; Park, Moon Chan ; Lee, Dong Hoon</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c331t-44aab4ecb5a616c4de7335c975bdf6682f821c8124f2a70bb01355eec57e513</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2018</creationdate><topic>Automotive engineering</topic><topic>automotive IDS</topic><topic>Clocks</topic><topic>Controller area network</topic><topic>Electric variables</topic><topic>electronic control unit</topic><topic>fingerprinting</topic><topic>Intrusion detection</topic><topic>Message authentication</topic><topic>Protocols</topic><topic>Telematics</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Choi, Wonsuk</creatorcontrib><creatorcontrib>Joo, Kyungho</creatorcontrib><creatorcontrib>Jo, Hyo Jin</creatorcontrib><creatorcontrib>Park, Moon Chan</creatorcontrib><creatorcontrib>Lee, Dong Hoon</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><jtitle>IEEE transactions on information forensics and security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Choi, Wonsuk</au><au>Joo, Kyungho</au><au>Jo, Hyo Jin</au><au>Park, Moon Chan</au><au>Lee, Dong Hoon</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>VoltageIDS: Low-Level Communication Characteristics for Automotive Intrusion Detection System</atitle><jtitle>IEEE transactions on information forensics and security</jtitle><stitle>TIFS</stitle><date>2018-08</date><risdate>2018</risdate><volume>13</volume><issue>8</issue><spage>2114</spage><epage>2129</epage><pages>2114-2129</pages><issn>1556-6013</issn><eissn>1556-6021</eissn><coden>ITIFA6</coden><abstract>The proliferation of computerized functions aimed at enhancing drivers' safety and convenience has increased the number of vehicular attack surfaces accordingly. The fundamental vulnerability is caused by the fact that the controller area network protocol, a de facto standard for in-vehicle networks, does not support message origin authentication. Several methods to resolve this problem have been suggested. However, most of them require modification of the CAN protocol and have their own vulnerabilities. In this paper, we focus on securing in-vehicle CAN networks, proposing a novel automotive intrusion detection system (so-called VoltageIDS). The system leverages the inimitable characteristics of an electrical CAN signal as a fingerprint of the electronic control units. The noteworthy contributions are that VoltageIDS does not require any modification of the current system and has been validated on actual vehicles while driving on the road. VoltageIDS is also the first automotive intrusion detection system capable of distinguishing between errors and the bus-off attack. Our experimental results on a CAN bus prototype and on real vehicles show that VoltageIDS detects intrusions in the in-vehicle CAN network. Moreover, we evaluate VoltageIDS while a vehicle is moving.</abstract><pub>IEEE</pub><doi>10.1109/TIFS.2018.2812149</doi><tpages>16</tpages><orcidid>https://orcid.org/0000-0003-0692-2543</orcidid><orcidid>https://orcid.org/0000-0001-5075-7114</orcidid></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1556-6013 |
ispartof | IEEE transactions on information forensics and security, 2018-08, Vol.13 (8), p.2114-2129 |
issn | 1556-6013 1556-6021 |
language | eng |
recordid | cdi_crossref_primary_10_1109_TIFS_2018_2812149 |
source | IEEE Electronic Library (IEL) |
subjects | Automotive engineering automotive IDS Clocks Controller area network Electric variables electronic control unit fingerprinting Intrusion detection Message authentication Protocols Telematics |
title | VoltageIDS: Low-Level Communication Characteristics for Automotive Intrusion Detection System |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-05T11%3A38%3A53IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-crossref_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=VoltageIDS:%20Low-Level%20Communication%20Characteristics%20for%20Automotive%20Intrusion%20Detection%20System&rft.jtitle=IEEE%20transactions%20on%20information%20forensics%20and%20security&rft.au=Choi,%20Wonsuk&rft.date=2018-08&rft.volume=13&rft.issue=8&rft.spage=2114&rft.epage=2129&rft.pages=2114-2129&rft.issn=1556-6013&rft.eissn=1556-6021&rft.coden=ITIFA6&rft_id=info:doi/10.1109/TIFS.2018.2812149&rft_dat=%3Ccrossref_RIE%3E10_1109_TIFS_2018_2812149%3C/crossref_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=8306904&rfr_iscdi=true |