| Literature DB >> 32326272 |
Mehmet Bozdal1, Mohammad Samie1, Sohaib Aslam1, Ian Jennions1.
Abstract
The automobile industry no longer relies on pure mechanical systems; instead, it benefits from many smart features based on advanced embedded electronics. Although the rise in electronics and connectivity has improved comfort, functionality, and safe driving, it has also created new attack surfaces to penetrate the in-vehicle communication network, which was initially designed as a close loop system. For such applications, the Controller Area Network (CAN) is the most-widely used communication protocol, which still suffers from various security issues because of the lack of encryption and authentication. As a result, any malicious/hijacked node can cause catastrophic accidents and financial loss. This paper analyses the CAN bus comprehensively to provide an outlook on security concerns. It also presents the security vulnerabilities of the CAN and a state-of-the-art attack surface with cases of implemented attack scenarios and goes through different solutions that assist in attack prevention, mainly based on an intrusion detection system (IDS).Entities:
Keywords: CAN network; CAN security; ECU; in-vehicle communication
Year: 2020 PMID: 32326272 PMCID: PMC7219335 DOI: 10.3390/s20082364
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1An example of a single two-wire Controller Area Network (CAN).
Figure 2Classical CAN frame structure.
Figure 3Signalling in CAN; Node 1 wins arbitration without any disruption.
Figure 4The state diagram of the error confinement mechanism (ECM) in the CAN bus.
Figure 5The automotive attack surface.
Summary of the Controlled Area Network (CAN) bus attacks.
| Reference | DoS | Modification 1 | Access Type | Notes/Root Cause |
|---|---|---|---|---|
| [ | Y | N | OBD II | Does not require full CAN messages |
| [ | N | Y | OBD II, CD, Bluetooth, GSM | Systematical experimental attacks. Indirect access via the car service computer |
| [ | N | Y | In-direct OBD II | Attack via a smartphone app |
| [ | Y | Y | Multiple remote sources | Remote attack analysis of 21 commercial cars |
| [ | N | Y | Wi-Fi, GSM | Access CAN network via a browser exploit |
| [ | Y | N | OBD II, compromised ECU | SAE J1939 data-link layer exploits |
| [ | N | Y | Wi-Fi, GSM | Ransomware attack over the air |
| [ | N | Y | TPMS | Remotely sending false TPMS data |
1 The modification includes replay, impersonation, and bogus information attacks.
Methods to secure the CAN bus.
| Proposed Method | Benefits | Disadvantages |
|---|---|---|
| Network Segmentation | Limit access to the end-user | Increased cost, |
| Encryption | Hardened attacks, | Increased computational power, |
| Authentication | Secure data transmission | Increased computational power, |
| Intrusion Detection | Detect anomalies and attacks | Complicated algorithm design, |
Encryption methods for the CAN bus.
| Reference | Encryption Method | Traffic Effect | Key |
|---|---|---|---|
| [ | AES-128 and SHA-1 | Increased | Static Symmetric |
| [ | XOR | No Change | Dynamically Synchronised |
| [ | AES-256 and Elliptic-curve Diffie–Hellman | Increased | Symmetric |
| [ | XOR | No Change | Static Symmetric |
| [ | Tiny Encryption Algorithm | Increased | Static Symmetric |
| [ | Triple DES | Increased | Dynamically Synchronised |
Automotive anomaly detection sensors [54].
| Sensor | Description |
|---|---|
| Formality | Correct message size, header and field size, field delimiters, checksum, etc. |
| Location | The message is allowed with respect to the dedicated bus system |
| Range | Compliance of payload in terms of data range |
| Frequency | Timing behaviour of messages is approved |
| Correlation | Correlation of messages on different bus systems adheres to the specification |
| Protocol | The correct order, start-time, etc. of internal challenge-response protocols |
| Plausibility | Content of message payload is plausible, no infeasible correlation with previous values |
| Consistency | Data from redundant sources is consistent |
Comparison of the intrusion detection system (IDS).
| Reference | Algorithm Analyses | Parameters | Advantages | Downsides |
|---|---|---|---|---|
| [ | Generative Adversarial Nets | A pattern of CAN ID | CAN train itself for unknown attacks | Expensive hardware |
| [ | Adaptive Network-based Fuzzy Inference System | Busload, message frequency analysis | Detect attack type, simple solution | Works for simple attacks, updated each second, needs a feature database |
| [ | Entropy-based | Entropy of IDs, payload | Does not require much information about traffic data | Very vulnerable to some attacks which include random bits |
| [ | Long Short-term Memory Networks | Payload | Does not require pre-knowledge | Does not understand the natural change |
| [ | Specification-based | Protocol policy | Less dependency | IDS should be placed at every ECU |
| [ | Hamming Distance | Payload | Low computation | Low detection |
| [ | Offset ratio and time interval | Remote frame timing | Simple efficient algorithm with low-cost hardware | Increased traffic |
| [ | Analysis of ID Sequence | Sequence of ID | Low memory and computation requirement, detection of inserted few malicious messages | Very vulnerable to attacks which have a similar sequence of normal traffic |
| [ | Support Vector Machine and Boosted Decision Tree | Electrical signal | Robust to some attack types, first IDS to differentiate between an error and an attack | High cost and vulnerable to environmental changes |
| [ | Recursive Least Squares | Clock skew | Robust to some attack types, | Only works on periodic signals |
| [ | Bloom Filtering | Message identifier, payload | Low memory usage for membership testing | Complex algorithm |
| [ | Probability Density Function | Reception cycle period ( frequency analysis) | Online learning | Hard to authenticate a non-periodic message |
| [ | Flow-based | Message frequency | Simple algorithm | Only works on periodic signals |