| Literature DB >> 36081138 |
Rajkumar Singh Rathore1, Chaminda Hewage1, Omprakash Kaiwartya2, Jaime Lloret3.
Abstract
In-vehicle communication has become an integral part of today's driving environment considering the growing add-ons of sensor-centric communication and computing devices inside a vehicle for a range of purposes including vehicle monitoring, physical wiring reduction, and driving efficiency. However, related literature on cyber security for in-vehicle communication systems is still lacking potential dedicated solutions for in-vehicle cyber risks. Existing solutions are mainly relying on protocol-specific security techniques and lacking an overall security framework for in-vehicle communication. In this context, this paper critically explores the literature on cyber security for in-vehicle communication focusing on technical architecture, methodologies, challenges, and possible solutions. In-vehicle communication network architecture is presented considering key components, interfaces, and related technologies. The protocols for in-vehicle communication have been classified based on their characteristics, and usage type. Security solutions for in-vehicle communication have been critically reviewed considering machine learning, cryptography, and port-centric techniques. A multi-layer secure framework is also developed as a protocol and use case-independent in-vehicle communication solution. Finally, open challenges and future dimensions of research for in-vehicle communication cyber security are highlighted as observations and recommendations.Entities:
Keywords: controller area network (CAN); cryptography; cyber attacks; cyber security; in-vehicle network; intrusion detection system; machine learning; smart intelligent vehicles
Mesh:
Year: 2022 PMID: 36081138 PMCID: PMC9460802 DOI: 10.3390/s22176679
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.847
Figure 1In-Vehicle security scenarios with possible threats.
Figure 2Internal Configuration of ECUs.
Figure 3In-Vehicle Network Architecture with Automotive Protocols.
Figure 4E/E Architecture-Distributed.
Figure 5E/E Architecture-Domain Centralized.
Figure 6E/E Architecture-Zonal ECU and High-Performance Computing.
Classification of in-vehicle network communication protocols.
| In-Vehicle Network Communication Protocols | Domain | Bandwidth | Salient Features | Drawbacks | Topology | Standard | Cabling | Max. Nodes Supported | Messaging |
|---|---|---|---|---|---|---|---|---|---|
| Controller Area Network (CAN) | Powertrain, Body Control | 125 Kbps–1 Mbps | Low cost | Less Bandwidth | Star, Ring, Linear bus | ISO 11898 | UTP | 30 | Multi-Master |
| Local Interconnect Network (LIN) | Simple Applications (Less Time Critical) | 125 Kbps–1 Mbps | Low cost | Low Speed | Liner bus | ISO 17987 | 1-Wire Cabling | 16 | Master-Slave |
| FlexRay | Advanced Chassis Control | Up to 10 Mbps | High Speed | High Cost | Star, Linear bus, hybrid | ISO 17458 | UTP | 22 | Multi-Master |
| Media-Oriented Systems Transport (MOST) | Infotainment Applications | Up to 150 Mbps | High Speed | High Cost | Ring | ISO 21806 | UTP and Optical | 64 | Streams/Cyclic Frames |
| Automotive Ethernet | High Bandwidth Applications | Up to 100 Mbps | High Speed | High Cost | Star, Linear bus | ISO 21111 | UTP | Based on Switch ports | Based on IP |
Figure 7Classification of in-vehicle network attacks.
Figure 8Illustrating entry points to smart intelligent vehicles.
Figure 9Classification of automotive protocols and possible security threats.
Figure 10General Flow Diagram reflecting series of steps for intrusion detection using machine learning model.
Summary of characteristics of security solutions based on machine learning algorithm.
| Focused Area | Algorithm Used for Detection | Adversary Model | Robustness | Strength | Weakness | Complexity Level | Accuracy in Detection (%) |
|---|---|---|---|---|---|---|---|
| CAN Bus | Time Intervals-based Framework for Analysis [ | Denial of Service Attack | High | Lightweight IDS | No provision of Sequence Analysis | Low | >90 |
| CAN Bus | Deep Neural Network [ | Intrusion Detection System | High | Effective Class Discrimination | Extensive Data Set is required for learning | High | >90 |
| VANET Applications | Artificial Neural Network [ | Misbehavior Detection System | High | Effective Data Analysis and Feature Extraction before building Classifier | Lack of Comprehensive Detection Mechanism | High | >90 |
| Connected Vehicle | Physical-based constraints and Machine Learning Algorithm [ | Manipulation of Data | Medium | Collaborative Adaptive Cruise Control Attack Analysis | Unable to find dependencies in hidden states | High | 90% for velocity and Position change attack |
| CAN Bus | Generative Adversarial Networks based on Deep Learning [ | Fuzzy Attack, Denial of Service Attack, Spoofing Attack | High | Real time IDS for In-Vehicle Network | Lack of Efficiency in distinguishing other type of Anomalous Traffic | High | >90 |
| Autonomous Vehicle | Long Short-Term Memory and Reinforcement Learning [ | Cyber Physical Attack | High | Effective extraction of temporal features using LSTM | Extensive Data Set for learning | High | Not Available |
| CAN Bus | Long Short-Term Memory [ | Flood Attack, Replay Attack, Spoofing Attack | Medium | Multi-Dimensional Anomaly Detection Model | Issues of Random Weight Initializations | High | >80 |
| Machine to Machine Communication | Five machine learning approaches, namely K-Nearest Neighbor, Linear and Radial Support Vector Machine, model based on Decision Tree, model based on Naive Bayes, and finally model based on Random Forest [ | Trust Computation | Medium | Comparative Analysis of machine learning-based trust models | Issues in finding the optimality in trust boundaries | High | Not Available |
| Internet of Vehicles | Fuzzy and Q-Learning [ | Distributed Denial of Service Attack | High | Self-Learning Capability | Unable to Provide Efficient Protection Against other Types of Attacks | High | Not Available |
| Autonomous Vehicle | Convolutional Neural Network and Fully Connected Deep Neural Network [ | Platoon Attack | High | Effective Performance with Time Series Classification | Scalability Issues | High | >90 |
| CAN Bus | Deep Convolutional Neural Network [ | Spoofing, Denial of Service, Fuzzy | Medium | Experiment is Performed on the Real Vehicle | Semantic Features are not considered for further detecting the unknown attack | High | >80 |
| CAN Bus | Recurrent Neural Network [ | Impersonation, Denial of Service, Fuzzy | High | Vehicle status can be monitored in real time without domain knowledge | Issues with long sequences | High | >90 |
| VANET | Reinforcement Learning [ | Trust Computation | High | Model for evaluating the reliability of information | Issue of overloading of states resulting into diminishing output | High | 90% |
| CAN Bus | Intrusion Detection based on Frequency Analysis [ | Replay Attack | Medium | Model can be adaptable to different Automotive Manufacturer | No consideration about different vehicle states | Medium | Not Available |
| Autonomous Vehicle | Long-Term Short-Term Memory, Generative Adversarial Network, Reinforcement Learning [ | Cyber Physical Attack | High | Model can Extract Features from huge data sets | No consideration for non-linear modelling with dynamics | High | Not Available |
| CAN Bus | Deep Learning [ | Impersonation, Denial of Service, Fuzzy | Medium | Sequential Patterns Analysis for Detecting the Change in Traffic Behavior | No consideration for other Cyber Attacks | High | >80 |
| CAN Bus | Long Short-Term Memory [ | Spoofing, Denial of Service, Fuzzy | Medium | CAN data sets are collected from real Vehicle | Experiment is conducted in offline mode, no consideration for other unknown attacks | High | >90 |
| CAN Bus | Cluster-based learning algorithm and Data Driven algorithm [ | RPM Attack, Fuzzy Attack, GEAR Attack, Denial of Service Attack | High | Data driven model with classification based on unsupervised approach | No consideration about self adaptability feature and other attack types | High | >90 |
| CAN Bus, Cloud-based IDS | Deep Learning [ | Malware, Denial of Service, Command Injection | Medium | Mathematical Modelling and Testbed Experiment on Robotic Vehicle | No consideration against physical jamming threat | High | >85 |
| CAN Bus | Deep Learning [ | Replay, Spoofing | High | Experiment is conducted on the real data acquired from the physical vehicle | No Comparative Analysis with other Deep Learning Schemes | High | >95 |
| CAN Bus | Deep Contractive Autoencoders [ | Fuzzy, Impersonation, Denial of Service | Medium | Three different Vehicles are utilized for AN Data Collection and Discriminating the Anomalies. | Lack of Efficiency in distinguishing other type of Anomalous Traffic | High | >90 |
| CAN Bus | Machine Learning [ | Spoofing, Denial of Service, Fuzzy | High | Simulation is performed on the real data collected from licensed vehicle | Support Vector Machine underperform with more noisy data set | High | >90 |
| CAN Bus | Long-Term Short-Term Memory and Recurrent Neural Network [ | Spoofing | High | Authentication based on finger print signals | No provision for optimization of FPGA Accelerator | High | >95 |
| Internet of Vehicles | Deep Transfer Learning [ | Flooding, ARP, Impersonation | High | For New Attack type, Model can update without any labelled data requirements | Issue of Negative Transfer | High | >90 |
| CAN Bus | Machine Learning [ | Denial of Service | Medium | High Search Ability and Avoidance of Premature Convergence | No consideration for other Cyber Attacks | High | >90 |
| CAN Bus | Long Short-Term Memory and Convolutional Neural Network [ | Replay, Denial of Service, Fuzzy, Spoofing | High | Model is verified with automatic vehicle data sets | No consideration for other attacks types | High | >90 |
Figure 11Use of general asymmetric cryptography approach for securing vehicle to vehicle communication.
Figure 12Centralized framework consisting of Supervisory Node [92].
Summary of characteristics of security solutions based on Cryptographic techniques.
| Focused Area | Strength | Approach/Methodology | Weakness | Adversary Model | Key Aspects |
|---|---|---|---|---|---|
| CAN Bus | Delayed Data Authentication for avoiding disruption with real time traffic | CBC-MAC [ | No provision for MAC calculation with diversified compound sizes | Spoofing, Injection |
The proposed scheme utilizes compound message authentication codes for delayed data authentication. In this scheme, on a compound of successive messages, message authentication code is calculated. |
| CAN Bus | Backward Compatibility, no need to modify existing nodes | Counters, | All nodes must know about pre-shared key before verifying the messages | Replay, Sniffing, Injection, Spoofing | The proposed scheme utilizes HMAC in designing lightweight authentication protocol. |
| CAN Bus | The proposed protocol can be practically deployed in the vehicle without hardware modification | Session Keys, | Issues in exchange of authentication data owing bandwidth limitations | Injection, | A lightweight authentication protocol is proposed to CAN bus. |
| CAN Bus | Source authentication is effectively managed | LMAC, | The proposed scheme works well with only lower number of nodes | Injection, | In the proposed scheme, authentication protocol is designed utilizing MAC mixing and key splitting mechanism. |
| CAN Bus | Proposed solution is software-based and can be easily applied | Secret Keys (Symmetric Pair wise) and MAC [ | No comparative analysis is provided for testbed experiment | Replay, Masquerade |
Different parameters are used to design the scheme, namely MAC ID, Secret Keys. Transmitter and Receiver use shared secret key. |
| CAN Bus | Provide Secure channel for vehicle to external communication | CRC, MAC [ | No comparative analysis is provided for other types of attacks | Denial of Service | Designing of new secure protocol for CAN. |
| CAN Bus | The proposed centralized security scheme is verified with FPGA board | HMAC, SHA-256 [ | No comparative analysis is provided for key exchange environment | Spoofing | In the proposed scheme, central authentication framework is designed. |
| CAN Bus | The proposed scheme authenticate ECU with provision of session keys establishment | Session Keys, ECC, HMAC [ | AVISPA tool is used for Security Validity, other platforms should be used for measuring the efficacy | Authentication of ECU in CAN for providing protection against attacks |
The proposed scheme utilizes the ECC. In the adapted protocol, elliptic curves are implemented with variety of different parameters. |
| CAN Bus | Simulation is performed using Vector Canoe. | Authentication (Lightweight) [ | No comparative analysis is provided for other types of attacks | Denial of Service | A new CAN authentication protocol is proposed. |
| CAN Bus | The proposed scheme utilize two different MAC methods. | Key Management, MAC [ | No comparative analysis is provided for other types of attacks | Replay, Tampering | A new message authentication-based protocol is proposed for CAN. |
| CAN Bus | The proposed scheme requires less memory and speed is high | SHA, | No comparative analysis is provided for other types of attacks | Flood, Replay, Masquerade, Eavesdrop, Brute-force | For authentication and encryption, a new lightweight protocol is proposed for CAN bus. |
| CAN Bus | Proposed scheme has high compatibility with existing architectures and testbed experiment is performed | Symmetric Key, | No comparative analysis is provided for other types of attacks | Injection, Sniffing, Spoofing | A practical framework is proposed for solving issue of message authentication. |
| CAN Bus | The proposed scheme has built in fault detection mechanism | CRC, | No comparative analysis is provided for other types of attacks | Masquerade |
Proposed scheme utilizes CRC for finding bit errors if any. CAN Data frame part is encrypted using light weight stream cipher. |
| CAN Bus | The proposed security scheme provide secure environment for CAN-FD and performance is evaluated with microcontrollers and oftware | SHA-256, | No comparative analysis is provided for other types of attacks | Spoofing, | A security architecture is proposed for developing secure communication environment for CAN-FD. |
| CAN Bus | Backward Compatibility, no need to modify existing nodes | Counter, | No comparative analysis is provided for other types of attacks | Spoofing, | An authentication protocol is proposed in which ECUs are allowed to authenticate each other. |
| CAN Bus | Message authentication for CAN bus with the presence of existing constraints | SHA1, | No comparative analysis is provided for other types of attacks | Replay, Denial of Service | In the proposed scheme, time stamp as well as HMAC are used for the message authentication. |
| CAN Bus | The proposed scheme can change the encrypted messages frequently | Symmetric Key (Dynamically Managed) [ | No comparative analysis is provided for other types of attacks | Replay |
In the proposed scheme, payload data is encrypted using symmetric key. Key generators are used to dynamically changing the symmetric key. |
| CAN Bus | The proposed security framework is hardware-based | PUFs, ECDH [ | No comparative analysis is provided for other types of attacks | Spoofing, Eavesdropping |
In the proposed scheme, ECDH is utilized. In this scheme shared key is not stored. |
| CAN Bus | The proposed security model block the compromised data on the receiver as well as sender side simultaneously. | Blacklisting, MAC, Whitelisting [ | No comparative analysis is provided for other types of attacks | Denial of Service, Man in the Middle |
A hardware-based security framework is designed. For secure booting, trusted hardware modules are used. |
| CAN Bus | The proposed scheme is evaluated on several embedded systems environment | 128-bit key, | No comparative analysis is provided for other types of attacks | Spoofing, | An authentication protocol is proposed for CAN-FD, utilizing ChaskeyMAC. |
| CAN Bus | In the proposed scheme CAN ID is shuffled using NAS frequently. | HMAC, AES-128, SHA-256, Shuffling-CAN ID, AKEP-2 [ | No comparative analysis is provided for other types of attacks | Replay, Impersonation | In the proposed scheme, attack surface is dynamically shuffled using one time Id. |
| CAN Bus | Communication security is provided by group-based approach, effective group key management | Keys (Public andPrivate), | No comparative analysis is provided for other types of attacks | Spoofing, Sniffing, | A new security architecture is proposed in which Gateway-ECU is used for communication among ECUs. |
| CAN Bus | Experiment is conducted on real hardware. | GHASH, | Delay Issue, no comparative analysis is provided for other types of attacks | Sniffing, Replay, Spoofing | In the proposed scheme, encrypted CAN frames are assigned several different priorities for handling the increased delay in the system. |
| CAN Bus | The proposed scheme does not require any changes to existing hardware. | AKEP2, MAC, Session Keys [ | No comparative analysis is provided for other types of attacks | Denial of Service, Masquerade, Bus-Off | A new authentication protocol is proposed. No need of any hardware modifications. |
| CAN Bus | Design optimization is performed in the proposed scheme for ensuring time critical execution of applications | HMAC 64 bits, Key distribution process based on Diffie-Hellman [ | No comparative analysis is rovided for other types of attacks | Denial of Service, Injection, Replay, Impersonation, Bus off | The proposed scheme uses HMAC for ensuring security on CAN bus. |
| CAN Bus | Sender nodes are authenticated using software-based mechanism | AES-128, MAC [ | No comparative analysis is provided for other types of attacks | Concatenation, Injection, Replay | The proposed scheme utilizes the ordered CMAC buffer for authenticating the CAN frames ID. |
| CAN Bus | The proposed scheme has two significant contributions, namely sender authentication and effective key management | MAC, Session Keys [ | No comparative analysis is provided for other types of attacks | Replay, Impersonation | The proposed scheme is characterized with two features, namely authentication of the sender as well as management of keys. |
| CAN Bus | Overhead of CAN communication is reduced significantly by mixing diversified authentication tags. | SHA-256, MAC, Symmetric Key Cryptography, Bloom Filters [ | No provision of key distribution and no comparative analysis is provided for other types of attacks | Replay, Man in the Middle | In the proposed scheme, CAN bus data authentication is carried out with the help of Bloom Filters attributes. |
| CAN, | Mutual identity authentication is provided to all communication parties and session key confidentiality is effectively managed | Symmetric Cryptography, Session Keys, AEAD Algorithm [ | No comparative analysis is provided for other types of attacks | Eavesdropping, Replay, Man in the Middle, Masquerade | The proposed scheme is featured with efficient authentication as well as secure communication. Session keys are updated regularly. |
Figure 13Multi-layered Security Framework for in-Vehicle Network.
Figure 14Open challenges for security of in-vehicle network.