Identifying ECUs Using Inimitable Characteristics of Signals in Controller Area Networks

As the functions of vehicles are more computerized for the safety and convenience of drivers, attack surfaces of vehicle are accordingly increasing. Many attack results have shown that an attacker could intentionally control vehicles. Most of them exploit the vulnerability that controller area network (CAN) protocol, a de-facto standard for the in-vehicle networks, does not support message origin authentication. Although a number of methods to resolve this security vulnerability have been suggested, they have their each limitation to be applied into the current system. They have required either the modification of the CAN standard or dramatical communication load increase, which is infeasible in practice. In this paper, the authors propose a novel identification method, which works in the physical layer of the in-vehicle CAN network. The authors' method identifies electronic control units (ECUs) using inimitable characteristics of electrical CAN signals enabling detection of a malicious ECU. Unlike previous attempts to address the security problem in the in-vehicle CAN network, the authors' method works by simply adding a monitoring unit to the existing network, making it deployable in current systems and compliant with required CAN standards. The authors' experimental results show that the authors' method is able to correctly identify ECUs. In case of misclassfication rate for ECU identification, the authors' method yields 0.36% in average which is approximate four times lower than the method proposed by P.-S. Murvay et al. This paper is also the first to identify potential attack models that systems should be able to detect.

Language

  • English

Media Info

Subject/Index Terms

Filing Info

  • Accession Number: 01673216
  • Record Type: Publication
  • Files: TRIS
  • Created Date: Jun 21 2018 12:02PM