Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3433210.3437530acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article
Open access

PLI-TDC: Super Fine Delay-Time Based Physical-Layer Identification with Time-to-Digital Converter for In-Vehicle Networks

Published: 04 June 2021 Publication History

Abstract

Recently, cyberattacks on Controller Area Network (CAN) which is one of the automotive networks are becoming a severe problem. CAN is a protocol for communicating among Electronic Control Units (ECUs) and it is a de-facto standard of automotive networks. Some security researchers point out several vulnerabilities in CAN such as unable to distinguish spoofing messages due to no authentication and no sender identification. To prevent a malicious message injection, at least we should identify the malicious senders by analyzing live messages. In previous work, a delay-time based method called Divider to identify the sender node has been proposed. However, Divider could not identify ECUs which have similar variations because Divider's measurement clock has coarse time-resolution. In addition, Divider cannot adapt a drift of delay-time caused by the temperature drift at the ambient buses. In this paper, we propose a super fine delay-time based sender identification method with Time-to-Digital Converter (TDC). The proposed method achieves an accuracy rate of 99.67% in the CAN bus prototype and 97.04% in a real-vehicle. Besides, in an environment of drifting temperature, the proposed method can achieve a mean accuracy of over 99%.

Supplementary Material

MP4 File (ASIA-CCS21-fp135.mp4)
In this video, we propose and implement a novel sender identification method called Physical-Layer Identification based on Time-to-Digital Converter (PLI-TDC) for in-vehicle networks. PLI-TDC overcame the problems such as misclassification, needing multi frames, and intolerance of temperature change in the conventional methods. We implemented PLI-TDC using an FPGA and a microcomputer to verify the ability for identification. As a result, we confirm that PLI-TDC achieved a mean accuracy of 99.67 % in the CAN bus prototype and 97.04 % in a real-vehicle. In addition, PLI-TDC can achieve a mean accuracy of over 99% even if the temperature is drifted. We also evaluated the real-time detection capability. And, we concluded that PLI-TDC can validate all CAN messages without spilling messages. Finally, we have released the source codes related to our work in the hope to promote research on sender identification.

References

[1]
ams. 2020. AS6500 Time-to-Digital Converter. https://ams.com/ja/as6500. (Accessed on 10/25/2020).
[2]
Yasuo Arai and Masahiro Ikeno. 1996. A Time Digitizer CMOS Gate-Array with a 250 ps Time Resolution. IEEE Journal of Solid-State Circuits, Vol. 31, 2 (1996), 212--220.
[3]
Kyong-Tak Cho and Kang G Shin. 2016. Fingerprinting Electronic Control Units for Vehicle Intrusion Detection. In 25th USENIX Security Symposium (USENIX Security 16). 911--927.
[4]
Kyong-Tak Cho and Kang G Shin. 2017. Viden: Attacker Identification on In-Vehicle Networks. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. ACM, 1109--1123.
[5]
Wonsuk Choi, Hyo Jin Jo, Samuel Woo, Ji Young Chun, Jooyoung Park, and Dong Hoon Lee. 2018. Identifying ECUs Using Inimitable Characteristics of Signals in Controller Area Networks. IEEE Transactions on Vehicular Technology, Vol. 67, 6 (2018), 4757--4770.
[6]
The MITRE Corporation. 2020. CVE-2020--5551. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020--5551. (Accessed on 04/26/2020).
[7]
Mahsa Foruhandeh, Yanmao Man, Ryan Gerdes, Ming Li, and Thidapat Chantem. 2019. SIMPLE: Single-Frame Based Physical Layer Identification for Intrusion Detection and Prevention on In-Vehicle Networks. In Proceedings of the 35th Annual Computer Security Applications Conference. 229--244.
[8]
Robert Bosch GmbH. 1991. CAN Specification Version 2.0. http://esd.cs.ucr.edu/webres/can20.pdf. (Accessed on 07/08/2019).
[9]
Anthony Van Herrewege, Dave Singelee, and Ingrid Verbauwhede. 2011. CANAuth-A Simple, Backward Compatible Broadcast Authentication Protocol for CAN Bus. In ECRYPT Workshop on Lightweight Cryptography, Vol. 2011. 1--7.
[10]
Min-Joo Kang and Je-Won Kang. 2016. Intrusion Detection System Using Deep Neural Network for In-Vehicle Network Security. PloS one, Vol. 11, 6 (2016), e0155781.
[11]
Marcel Kneib and Christopher Huth. 2018. Scission: Signal Characteristic-Based Sender Identification and Intrusion Detection in Automotive Networks. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. ACM, 787--800.
[12]
Marcel Kneib, Oleg Schell, and Christopher Huth. 2020. EASI: Edge-Based Sender Identification on Resource-Constrained Platforms for Automotive Networks. In Proceedings Network and Distributed System Security Symposium. 1--16.
[13]
Igor Kononenko. 1994. Estimating Attributes: Analysis and Extensions of RELIEF. In European conference on machine learning. Springer, 171--182.
[14]
Mirco Marchetti and Dario Stabili. 2017. Anomaly Detection of CAN Bus Messages through Analysis of ID Sequences. In 2017 IEEE Intelligent Vehicles Symposium (IV). IEEE, 1577--1583.
[15]
Mirco Marchetti, Dario Stabili, Alessandro Guido, and Michele Colajanni. 2016. Evaluation of Anomaly Detection for In-Vehicle Networks through Information-Theoretic Algorithms. In 2016 IEEE 2nd International Forum on Research and Technologies for Society and Industry Leveraging a better tomorrow (RTSI). IEEE, 1--6.
[16]
Charlie Miller and Chris Valasek. 2015. Remote Exploitation of An Unaltered Passenger Vehicle. Black Hat USA, Vol. 2015 (2015), 1--91.
[17]
Pal-Stefan Murvay and Bogdan Groza. 2014. Source Identification Using Signal Characteristics in Controller Area Networks. IEEE Signal Processing Letters, Vol. 21, 4 (2014), 395--399.
[18]
Pal-Stefan Murvay and Bogdan Groza. 2020. TIDAL-CAN: Differential Timing Based Intrusion Detection and Localization for Controller Area Network. IEEE Access, Vol. 8 (2020), 68895--68912.
[19]
Sen Nie, Ling Liu, and Yuefeng Du. 2017. Free-Fall: Hacking Tesla from Wireless to CAN Bus. Black Hat USA, Vol. 2017 (2017), 1--16.
[20]
Stefan Nürnberger and Christian Rossow. 2016. --vatiCAN--Vetted, Authenticated CAN Bus. In International Conference on Cryptographic Hardware and Embedded Systems. Springer, 106--124.
[21]
Shuji Ohira. 2020. PLI-TDC. https://github.com/shuji-oh/PLI_TDC_for_CAN. (Accessed: 2020--10--25).
[22]
Shuji Ohira, Araya Kibrom Desta, Tomoya Kitagawa, Ismail Arai, and Kazutoshi Fujikawa. 2020. Divider: Delay-Time Based Sender Identification in Automotive Networks. In IEEE 44th Annual Computer Software and Applications Conference (COMPSAC). IEEE, 1490--1497.
[23]
James Scobie. 2018. A Starter's Guide to Arm Processing Power in Automotive - Embedded blog - System - Arm Community. https://community.arm.com/developer/ip-products/system/b/embedded-blog/posts/a-starters-guide-to-arm-processing-power-in-automotive. (Accessed on 05/31/2020).
[24]
Hyun Min Song, Ha Rang Kim, and Huy Kang Kim. 2016. Intrusion Detection System Based on the Analysis of Time Intervals of CAN Messages for In-Vehicle Network. In 2016 international conference on information networking (ICOIN). IEEE, 63--68.
[25]
Jian Song, Qi An, and Shubin Liu. 2006. A High-Resolution Time-to-Digital Converter Implemented in Field-Programmable-Gate-Arrays. IEEE Transactions on Nuclear Science, Vol. 53, 1 (2006), 236--241.
[26]
Adrian Taylor, Sylvain Leblanc, and Nathalie Japkowicz. 2016. Anomaly Detection in Automobile Control Network Data with Long Short-Term Memory Networks. In 2016 IEEE International Conference on Data Science and Advanced Analytics (DSAA). IEEE, 130--139.
[27]
Jinyuan Wu and Zonghan Shi. 2008. The 10-ps Wave Union TDC: Improving FPGA TDC Resolution beyond Its Cell Delay. In 2008 IEEE Nuclear Science Symposium Conference Record. IEEE, 3440--3446.
[28]
Wufei Wu, Yizhi Huang, Ryo Kurachi, Gang Zeng, Guoqi Xie, Renfa Li, and Keqin Li. 2018. Sliding Window Optimized Information Entropy Analysis Method for Intrusion Detection on In-Vehicle Networks. IEEE Access, Vol. 6 (2018), 45233--45245.
[29]
Mahmut Yazici, Shadi Basurra, and Mohamed Gaber. 2018. Edge Machine Learning: Enabling Smart Internet of Things Applications. Big Data and Cognitive Computing, Vol. 2, 3 (2018), 1--17.
[30]
Jia Zhou, Prachi Joshi, Haibo Zeng, and Renfa Li. 2019. BTMonitor: Bit-Time-Based Intrusion Detection and Attacker Identification in Controller Area Network. ACM Transactions on Embedded Computing Systems (TECS), Vol. 18, 6 (2019), 1--23.

Cited By

View all
  • (2024)A Model for CAN Message Timestamp Fluctuations to Accurately Estimate Transmitter Clock SkewsInternational Journal of Automotive Engineering10.20485/jsaeijae.15.1_1015:1(10-18)Online publication date: 2024
  • (2024)Multi-classification in-vehicle intrusion detection system using packet- and sequence-level characteristics from time-embedded transformer with autoencoderKnowledge-Based Systems10.1016/j.knosys.2024.112091299:COnline publication date: 5-Sep-2024
  • (2023)SPARTA: Signal Propagation-based Attack Recognition and Threat Avoidance for Automotive NetworksProceedings of the 2023 ACM Asia Conference on Computer and Communications Security10.1145/3579856.3595788(760-772)Online publication date: 10-Jul-2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
ASIA CCS '21: Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security
May 2021
975 pages
ISBN:9781450382878
DOI:10.1145/3433210
  • General Chairs:
  • Jiannong Cao,
  • Man Ho Au,
  • Program Chairs:
  • Zhiqiang Lin,
  • Moti Yung
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 04 June 2021

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. controller area networks
  2. electronic control units
  3. intrusion detection systems
  4. machine learning
  5. physical-layer identification

Qualifiers

  • Research-article

Conference

ASIA CCS '21
Sponsor:

Acceptance Rates

Overall Acceptance Rate 418 of 2,322 submissions, 18%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)236
  • Downloads (Last 6 weeks)36
Reflects downloads up to 16 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)A Model for CAN Message Timestamp Fluctuations to Accurately Estimate Transmitter Clock SkewsInternational Journal of Automotive Engineering10.20485/jsaeijae.15.1_1015:1(10-18)Online publication date: 2024
  • (2024)Multi-classification in-vehicle intrusion detection system using packet- and sequence-level characteristics from time-embedded transformer with autoencoderKnowledge-Based Systems10.1016/j.knosys.2024.112091299:COnline publication date: 5-Sep-2024
  • (2023)SPARTA: Signal Propagation-based Attack Recognition and Threat Avoidance for Automotive NetworksProceedings of the 2023 ACM Asia Conference on Computer and Communications Security10.1145/3579856.3595788(760-772)Online publication date: 10-Jul-2023
  • (2023)Systematic Review on the Recent Trends of Cybersecurity in Automobile Industry2023 International Conference on Science, Engineering and Business for Sustainable Development Goals (SEB-SDG)10.1109/SEB-SDG57117.2023.10124561(1-7)Online publication date: 5-Apr-2023
  • (2023)DESC-IDSFuture Generation Computer Systems10.1016/j.future.2022.10.020140:C(266-281)Online publication date: 1-Mar-2023
  • (2023)Physical Layer Intrusion Detection and Localization on CAN BusMachine Learning and Optimization Techniques for Automotive Cyber-Physical Systems10.1007/978-3-031-28016-0_13(399-423)Online publication date: 27-Mar-2023
  • (2022)Asymmetric Symbol and Skew Sender Identification for Automotive NetworksIEEE Transactions on Information Forensics and Security10.1109/TIFS.2022.321738217(3959-3971)Online publication date: 2022
  • (2022)ECUPrint—Physical Fingerprinting Electronic Control Units on CAN Buses Inside Cars and SAE J1939 Compliant VehiclesIEEE Transactions on Information Forensics and Security10.1109/TIFS.2022.315805517(1185-1200)Online publication date: 2022
  • (2022)A Binarized Neural Network Approach to Accelerate in-Vehicle Network Intrusion DetectionIEEE Access10.1109/ACCESS.2022.320809110(123505-123520)Online publication date: 2022

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media