Asymmetric Symbol and Skew Sender Identification for Automotive Networks

Over recent years, many vulnerabilities have been exposed in vehicles, whose probability of occurrence will rise in the future due to connectivity and increasing system complexity. Even more serious that the Controller Area Network (CAN), widely used by Electronic Control Units (ECUs) to exchange sa...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on information forensics and security 2022, Vol.17, p.1-1
Hauptverfasser: Schell, Oleg, Oechsler, Claudio, Kneib, Marcel
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 1
container_issue
container_start_page 1
container_title IEEE transactions on information forensics and security
container_volume 17
creator Schell, Oleg
Oechsler, Claudio
Kneib, Marcel
description Over recent years, many vulnerabilities have been exposed in vehicles, whose probability of occurrence will rise in the future due to connectivity and increasing system complexity. Even more serious that the Controller Area Network (CAN), widely used by Electronic Control Units (ECUs) to exchange safety-critical messages within a vehicle, does not provide any security measures. In this context, Intrusion Detection Systems (IDSs) have recently been proposed that use time characteristics in the analog transmission signal to identify the sending ECU and detect unauthorized messages. However, realistic application of proposed approaches is not yet tangible, with the full potential of time-based systems yet to be determined. In this elaboration, we therefore establish a foundation by working out robust time characteristics first and analyze root causes for their variation between ECUs. Combining the results with insights from related research, we deduce properties which help to design reliable and feasible IDSs for CAN. Finally, we emphasize these properties by presenting ASSASSIN, an IDS that uses time characteristics to identify the sender of a CAN message and assess authenticity. Achieving an average detection rate of 99.02 %, real-time capable classification and an adaptability to temperature fluctuations, we demonstrate the potential of time-based IDSs on a prototype setup and a real vehicle using resource-limited hardware, also contrasting them with well-elaborated voltage-based IDSs.
doi_str_mv 10.1109/TIFS.2022.3217382
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_ieee_primary_9930819</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9930819</ieee_id><sourcerecordid>2742703744</sourcerecordid><originalsourceid>FETCH-LOGICAL-c245t-badd2841f544272812cf12ea2a23d9c29abd79ee8a4937da78f5772563304b5d3</originalsourceid><addsrcrecordid>eNo9kFFrwjAUhcPYYM7tB4y9BPZcl9ykTfMosk1Btoe655A2t1C1jUvqxH-_iuLTPQ_fORc-Qp45m3DO9Ntq8VFMgAFMBHAlcrghI56mWZIx4LfXzMU9eYhxzZiUPMtHZD6Nx7bFPjQVLY5t6bfUdo4WGzzQAjuHgS4cdn1TN5XtG9_R2gc63fe-9X3zh_QL-4MPm_hI7mq7jfh0uWPy8_G-ms2T5ffnYjZdJhXItE9K6xzkkteplKAg51DVHNCCBeF0BdqWTmnE3EotlLMqr1OlIM2EYLJMnRiT1_PuLvjfPcberP0-dMNLA2qYZEJJOVD8TFXBxxiwNrvQtDYcDWfmJMychJmTMHMRNnRezp0GEa-81oLlXIt_bCVmkg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2742703744</pqid></control><display><type>article</type><title>Asymmetric Symbol and Skew Sender Identification for Automotive Networks</title><source>IEEE Electronic Library (IEL)</source><creator>Schell, Oleg ; Oechsler, Claudio ; Kneib, Marcel</creator><creatorcontrib>Schell, Oleg ; Oechsler, Claudio ; Kneib, Marcel</creatorcontrib><description>Over recent years, many vulnerabilities have been exposed in vehicles, whose probability of occurrence will rise in the future due to connectivity and increasing system complexity. Even more serious that the Controller Area Network (CAN), widely used by Electronic Control Units (ECUs) to exchange safety-critical messages within a vehicle, does not provide any security measures. In this context, Intrusion Detection Systems (IDSs) have recently been proposed that use time characteristics in the analog transmission signal to identify the sending ECU and detect unauthorized messages. However, realistic application of proposed approaches is not yet tangible, with the full potential of time-based systems yet to be determined. In this elaboration, we therefore establish a foundation by working out robust time characteristics first and analyze root causes for their variation between ECUs. Combining the results with insights from related research, we deduce properties which help to design reliable and feasible IDSs for CAN. Finally, we emphasize these properties by presenting ASSASSIN, an IDS that uses time characteristics to identify the sender of a CAN message and assess authenticity. Achieving an average detection rate of 99.02 %, real-time capable classification and an adaptability to temperature fluctuations, we demonstrate the potential of time-based IDSs on a prototype setup and a real vehicle using resource-limited hardware, also contrasting them with well-elaborated voltage-based IDSs.</description><identifier>ISSN: 1556-6013</identifier><identifier>EISSN: 1556-6021</identifier><identifier>DOI: 10.1109/TIFS.2022.3217382</identifier><identifier>CODEN: ITIFA6</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Automobiles ; Automotive engineering ; Clocks ; Control equipment ; Controller area network ; Electronic control ; Hardware ; Intrusion Detection ; Messages ; Safety critical ; Security ; Transceivers ; Vehicular Security ; Voltage control ; Voltage measurement</subject><ispartof>IEEE transactions on information forensics and security, 2022, Vol.17, p.1-1</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c245t-badd2841f544272812cf12ea2a23d9c29abd79ee8a4937da78f5772563304b5d3</cites><orcidid>0000-0002-2327-7059 ; 0000-0002-6335-811X ; 0000-0001-6908-2057</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9930819$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,792,4010,27900,27901,27902,54733</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/9930819$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Schell, Oleg</creatorcontrib><creatorcontrib>Oechsler, Claudio</creatorcontrib><creatorcontrib>Kneib, Marcel</creatorcontrib><title>Asymmetric Symbol and Skew Sender Identification for Automotive Networks</title><title>IEEE transactions on information forensics and security</title><addtitle>TIFS</addtitle><description>Over recent years, many vulnerabilities have been exposed in vehicles, whose probability of occurrence will rise in the future due to connectivity and increasing system complexity. Even more serious that the Controller Area Network (CAN), widely used by Electronic Control Units (ECUs) to exchange safety-critical messages within a vehicle, does not provide any security measures. In this context, Intrusion Detection Systems (IDSs) have recently been proposed that use time characteristics in the analog transmission signal to identify the sending ECU and detect unauthorized messages. However, realistic application of proposed approaches is not yet tangible, with the full potential of time-based systems yet to be determined. In this elaboration, we therefore establish a foundation by working out robust time characteristics first and analyze root causes for their variation between ECUs. Combining the results with insights from related research, we deduce properties which help to design reliable and feasible IDSs for CAN. Finally, we emphasize these properties by presenting ASSASSIN, an IDS that uses time characteristics to identify the sender of a CAN message and assess authenticity. Achieving an average detection rate of 99.02 %, real-time capable classification and an adaptability to temperature fluctuations, we demonstrate the potential of time-based IDSs on a prototype setup and a real vehicle using resource-limited hardware, also contrasting them with well-elaborated voltage-based IDSs.</description><subject>Automobiles</subject><subject>Automotive engineering</subject><subject>Clocks</subject><subject>Control equipment</subject><subject>Controller area network</subject><subject>Electronic control</subject><subject>Hardware</subject><subject>Intrusion Detection</subject><subject>Messages</subject><subject>Safety critical</subject><subject>Security</subject><subject>Transceivers</subject><subject>Vehicular Security</subject><subject>Voltage control</subject><subject>Voltage measurement</subject><issn>1556-6013</issn><issn>1556-6021</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNo9kFFrwjAUhcPYYM7tB4y9BPZcl9ykTfMosk1Btoe655A2t1C1jUvqxH-_iuLTPQ_fORc-Qp45m3DO9Ntq8VFMgAFMBHAlcrghI56mWZIx4LfXzMU9eYhxzZiUPMtHZD6Nx7bFPjQVLY5t6bfUdo4WGzzQAjuHgS4cdn1TN5XtG9_R2gc63fe-9X3zh_QL-4MPm_hI7mq7jfh0uWPy8_G-ms2T5ffnYjZdJhXItE9K6xzkkteplKAg51DVHNCCBeF0BdqWTmnE3EotlLMqr1OlIM2EYLJMnRiT1_PuLvjfPcberP0-dMNLA2qYZEJJOVD8TFXBxxiwNrvQtDYcDWfmJMychJmTMHMRNnRezp0GEa-81oLlXIt_bCVmkg</recordid><startdate>2022</startdate><enddate>2022</enddate><creator>Schell, Oleg</creator><creator>Oechsler, Claudio</creator><creator>Kneib, Marcel</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7TB</scope><scope>8FD</scope><scope>FR3</scope><scope>JQ2</scope><scope>KR7</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0002-2327-7059</orcidid><orcidid>https://orcid.org/0000-0002-6335-811X</orcidid><orcidid>https://orcid.org/0000-0001-6908-2057</orcidid></search><sort><creationdate>2022</creationdate><title>Asymmetric Symbol and Skew Sender Identification for Automotive Networks</title><author>Schell, Oleg ; Oechsler, Claudio ; Kneib, Marcel</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c245t-badd2841f544272812cf12ea2a23d9c29abd79ee8a4937da78f5772563304b5d3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Automobiles</topic><topic>Automotive engineering</topic><topic>Clocks</topic><topic>Control equipment</topic><topic>Controller area network</topic><topic>Electronic control</topic><topic>Hardware</topic><topic>Intrusion Detection</topic><topic>Messages</topic><topic>Safety critical</topic><topic>Security</topic><topic>Transceivers</topic><topic>Vehicular Security</topic><topic>Voltage control</topic><topic>Voltage measurement</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Schell, Oleg</creatorcontrib><creatorcontrib>Oechsler, Claudio</creatorcontrib><creatorcontrib>Kneib, Marcel</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Mechanical &amp; Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>Engineering Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Civil Engineering Abstracts</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE transactions on information forensics and security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Schell, Oleg</au><au>Oechsler, Claudio</au><au>Kneib, Marcel</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Asymmetric Symbol and Skew Sender Identification for Automotive Networks</atitle><jtitle>IEEE transactions on information forensics and security</jtitle><stitle>TIFS</stitle><date>2022</date><risdate>2022</risdate><volume>17</volume><spage>1</spage><epage>1</epage><pages>1-1</pages><issn>1556-6013</issn><eissn>1556-6021</eissn><coden>ITIFA6</coden><abstract>Over recent years, many vulnerabilities have been exposed in vehicles, whose probability of occurrence will rise in the future due to connectivity and increasing system complexity. Even more serious that the Controller Area Network (CAN), widely used by Electronic Control Units (ECUs) to exchange safety-critical messages within a vehicle, does not provide any security measures. In this context, Intrusion Detection Systems (IDSs) have recently been proposed that use time characteristics in the analog transmission signal to identify the sending ECU and detect unauthorized messages. However, realistic application of proposed approaches is not yet tangible, with the full potential of time-based systems yet to be determined. In this elaboration, we therefore establish a foundation by working out robust time characteristics first and analyze root causes for their variation between ECUs. Combining the results with insights from related research, we deduce properties which help to design reliable and feasible IDSs for CAN. Finally, we emphasize these properties by presenting ASSASSIN, an IDS that uses time characteristics to identify the sender of a CAN message and assess authenticity. Achieving an average detection rate of 99.02 %, real-time capable classification and an adaptability to temperature fluctuations, we demonstrate the potential of time-based IDSs on a prototype setup and a real vehicle using resource-limited hardware, also contrasting them with well-elaborated voltage-based IDSs.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TIFS.2022.3217382</doi><tpages>1</tpages><orcidid>https://orcid.org/0000-0002-2327-7059</orcidid><orcidid>https://orcid.org/0000-0002-6335-811X</orcidid><orcidid>https://orcid.org/0000-0001-6908-2057</orcidid></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1556-6013
ispartof IEEE transactions on information forensics and security, 2022, Vol.17, p.1-1
issn 1556-6013
1556-6021
language eng
recordid cdi_ieee_primary_9930819
source IEEE Electronic Library (IEL)
subjects Automobiles
Automotive engineering
Clocks
Control equipment
Controller area network
Electronic control
Hardware
Intrusion Detection
Messages
Safety critical
Security
Transceivers
Vehicular Security
Voltage control
Voltage measurement
title Asymmetric Symbol and Skew Sender Identification for Automotive Networks
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-05T06%3A45%3A34IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Asymmetric%20Symbol%20and%20Skew%20Sender%20Identification%20for%20Automotive%20Networks&rft.jtitle=IEEE%20transactions%20on%20information%20forensics%20and%20security&rft.au=Schell,%20Oleg&rft.date=2022&rft.volume=17&rft.spage=1&rft.epage=1&rft.pages=1-1&rft.issn=1556-6013&rft.eissn=1556-6021&rft.coden=ITIFA6&rft_id=info:doi/10.1109/TIFS.2022.3217382&rft_dat=%3Cproquest_RIE%3E2742703744%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2742703744&rft_id=info:pmid/&rft_ieee_id=9930819&rfr_iscdi=true