Seneors报告 面向汽车控制器局域网的CANon轻量级实用网络攻击检测-2022年

VIP文档

ID:28606

大小:4.26 MB

页数:32页

时间:2023-01-07

金币:10

上传者:战必胜

 
Citation: Baek, Y.; Shin, S. CANon:
Lightweight and Practical Cyber-
Attack Detection for Automotive
Controller Area Networks. Sensors
2022, 22, 2636. https://doi.org/
10.3390/s22072636
Academic Editors: Alexios Mylonas,
Nikolaos Pitropakis and Omprakash
Kaiwartya
Received: 16 February 2022
Accepted: 25 March 2022
Published: 29 March 2022
Publishers Note: MDPI stays neutral
with regard to jurisdictional claims in
published maps and institutional affil-
iations.
Copyright: © 2022 by the authors.
Licensee MDPI, Basel, Switzerland.
This article is an open access article
distributed under the terms and
conditions of the Creative Commons
Attribution (CC BY) license (https://
creativecommons.org/licenses/by/
4.0/).
sensors
Article
CANon: Lightweight and Practical Cyber-Attack Detection for
Automotive Controller Area Networks
Youngmi Baek
1,
* and Seongjoo Shin
2
1
Department of Computer Software Engineering, Changshin University, Changwon 51352, Korea
2
Resilient CPS Research Center, DGIST, Daegu 42988, Korea; sj_shin@digst.ac.kr
* Correspondence: ymbaek@cs.ac.kr; Tel.: +82-55-250-1314
Abstract:
Automotive cyber-physical systems are in transition from the closed-systems to open-
networking systems. As a result, in-vehicle networks such as the controller area network (CAN) have
become essential to connect to inter-vehicle networks through the various rich interfaces. Newly
exposed security concerns derived from this requirement may cause in-vehicle networks to pose
threats to automotive security and driver’s safety. In this paper, to ensure a high level of security
of the in-vehicle network for automotive CPS, we propose a novel lightweight and practical cyber
defense platform, referred to as CANon (CAN with origin authentication and non-repudiation), to be
enabled to detect cyber-attacks in real-time. CANon is designed based on the hierarchical approach
of centralized-session management and distributed-origin authentication. In the former, a gateway
node manages each initialization vector and session of origin-centric groups consisting of two more
sending and receiving nodes. In the latter, the receiving nodes belonging to the given origin-centric
group individually perform the symmetric key-based detection against cyber-attacks by verifying
each message received from the sending node, namely origin authentication, in real-time. To improve
the control security, CANon employs a one-time local key selected from a sequential hash chain (SHC)
for authentication of an origin node in a distributed mode and exploits the iterative hash operations
with randomness. Since the SHC can constantly generate and consume hash values regardless of their
memory capacities, it is very effective for resource-limited nodes for in-vehicle networks. In addition,
through implicit key synchronization within a given group, CANon addresses the challenges of a
key exposure problem and a complex key distribution mechanism when performing symmetric key-
based authentication. To achieve lightweight cyber-attack detection without imposing an additive
load on CAN, CANon uses a keyed-message authentication code (KMAC) activated within a given
group. The detection performance of CANon is evaluated under an actual node of Freescale S12XF
and virtual nodes operating on the well-known CANoe tool. It is seen that the detection rate of
CANon against brute-force and replay attacks reaches 100% when the length of KMAC is over 16 bits.
It demonstrates that CANon ensures high security and is sufficient to operate in real-time even on
low-performance ECUs. Moreover, CANon based on several software modules operates without an
additive hardware security module at an upper layer of the CAN protocol and can be directly ported
to CAN-FD (CAN with Flexible Data rate) so that it achieves the practical cyber defense platform.
Keywords: in-vehicle network; sequential hash chain; one-time key; controller area network
1. Introduction
Cyber-physical systems (CPSs) are commonly applied to critical infrastructure and
future-oriented services enabling the quality of life to be improved. These systems promise
enhanced efficiency, convenience, and safety by integrating physical and computational
components tightly. Recently, the physical components have suffered from various cyber-
attacks, which aim to disrupt the intended functionality of the CPS, such as Stuxnet [
1
].
Such attacks mainly exploit computational components to manipulate the characteristics
of physical components. The manipulation for the control of the physical component,
Sensors 2022, 22, 2636. https://doi.org/10.3390/s22072636 https://www.mdpi.com/journal/sensors
资源描述:

当前文档最多预览五页,下载文档查看全文

此文档下载收益归作者所有

当前文档最多预览五页,下载文档查看全文
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,天天文库负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。
关闭