Electronic Control Unit Discrimination Using Wired Signal Distinct Native Attributes
Abstract
A controller area network bus is a communications system used in modern automobiles to connect the electronic control units that implement normal vehicular operations as well as advanced autonomous safety and driver comfort features. However, these advancements come at the expense of vehicle security – researchers have shown that automobiles can be hacked by compromising electronic control units or by connecting unauthorized devices to the controller area network bus.
Physical layer device fingerprinting is a promising approach for implementing vehicle security. This chapter presents a fingerprinting method and classification algorithm for electronic control unit discrimination. Cross-lot discrimination is assessed using four Toyota Avalon electronic control units with different lot numbers as authorized devices, and a BeagleBoard, Arduino and CANable as rogue devices. The experiments yielded perfect rejection rates for rogue devices with false credentials and access denial rates exceeding 98% for authorized electronic control units with false credentials. Additionally, an average correct classification of approximately 99% was obtained for authorized devices.
Keywords
CAN bus electronic unit discrimination rogue device detectionPreview
Unable to display preview. Download preview PDF.
References
- 1.O. Avatefipour, A. Hafeez, M. Tayyab and H. Malik, Linking received packets to the transmitter through physical-fingerprinting of controller area network, Proceedings of the IEEE Workshop on Information Forensics and Security, 2017Google Scholar
- 2.T. Carbino, Exploitation of Unintentional Ethernet Cable Emissions Using Constellation Based-Distinct Native Attribute (CB-DNA) Fingerprints to Enhance Network Security, Ph.D. Dissertation, Department of Electrical and Computer Engineering, Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio, 2015Google Scholar
- 3.T. Carbino, M. Temple and J. Lopez, A comparison of PHY-based fingerprinting methods used to enhance network access control, in ICT Systems Security and Privacy Protection, H. Federrath and D. Gollmann (Eds.), Springer, Cham, Switzerland, pp. 204–217, 2015CrossRefGoogle Scholar
- 4.T. Carbino, M. Temple and J. Lopez, Conditional constellation based distinct native attribute (CB-DNA) fingerprinting for network device authentication, Proceedings of the IEEE International Conference on Communications, 2016Google Scholar
- 5.K. Cho and K. Shin, Fingerprinting electronic control units for vehicle intrusion detection, Proceedings of the Twenty-Fifth USENIX Security Symposium, pp. 911–927, 2016Google Scholar
- 6.W. Choi, H. Jo, S. Woo, J. Chun, J. Park and D. Lee, Identifying ECUs using inimitable characteristics of signals in controller area networks, IEEE Transactions on Vehicular Technology, vol. 67(6), pp. 4757–4770, 2018CrossRefGoogle Scholar
- 7.W. Cobb, E. Garcia, M. Temple, R. Baldwin and Y. Kim, Physical layer identification of embedded devices using RF-DNA fingerprinting, Proceedings of the Military Communications Conference, pp. 2168–2173, 2010Google Scholar
- 8.S. Corrigan, Introduction to the Controller Area Network (CAN), Application Report SLOA101, Texas Instruments, Dallas, Texas, 2002Google Scholar
- 9.R. Currie, Developments in Car Hacking, Information Security Reading Room, SANS Institute, North Bethesda, Maryland, 2015Google Scholar
- 10.A. Greenberg, Hackers remotely kill a Jeep on the highway – With me in it, Wired, July 21, 2015Google Scholar
- 11.M. Jaynes, R. Dantu, R. Varriale and N. Evans, Automating ECU identification for vehicle security, Proceedings of the Fifteenth IEEE International Conference on Machine Learning and Applications, pp. 632–635, 2016Google Scholar
- 12.J. Lopez, N. Liefer, C. Busho and M. Temple, Enhancing critical infrastructure and key resources (CIKR) level-0 physical process security using field device distinct native attribute features, IEEE Transactions on Information Forensics and Security, vol. 13(5), pp. 1215–1229, 2018CrossRefGoogle Scholar
- 13.M. Lukacs, P. Collins and M. Temple, Device identification using active noise interrogation and RF-DNA “fingerprinting” for non-destructive amplifier acceptance testing, Proceedings of the Seventeenth Annual IEEE Wireless and Microwave Technology Conference, 2016Google Scholar
- 14.P. Murvay and B. Groza, Source identification using signal characteristics in controller area networks, IEEE Signal Processing Letters, vol. 21(4), pp. 395–399, 2014CrossRefGoogle Scholar
- 15.P. Paganini, CAN hacking tools, 20 USD to hack a car remotely, Security Affairs, February 9, 2014Google Scholar
- 16.D. Reising, M. Temple and J. Jackson, Authorized and rogue device discrimination using dimensionally-reduced RF-DNA fingerprints, IEEE Transactions on Information Forensics and Security, vol. 10(6), pp. 1180–1192, 2015CrossRefGoogle Scholar
- 17.B. Ross, T. Carbino and S. Stone, Physical-layer discrimination of power line communications, Proceedings of the International Conference on Computing, Networking and Communications, pp. 341–345, 2017Google Scholar
- 18.B. Ross, T. Carbino and M. Temple, Home automation simulcasted power line communications network (SPN) discrimination using wired signal distinct native attribute (WS-DNA), Proceedings of the Twelfth International Conference on Cyber Warfare and Security, pp. 313–322, 2017Google Scholar
- 19.B. Ross, T. Carbino and M. Temple, Simulcasted power line communications network (SPN) configuration validation for home automation applications using wired signal distinct native attribute (WS-DNA) fingerprinting, Journal of Information Warfare, vol. 16(3), pp. 95–118, 2017Google Scholar
- 20.Wikipedia Contributors, CAN-Bus-Frame in Base Format without Stuffbits, Wikipedia Commons (commons.wikimedia.org/wiki/File:CAN-Bus-frame\_in\_base\_format\_without\_stuffbits.svg), 2017Google Scholar
- 21.M. Williams, S. Munns, M. Temple and M. Mendenhall, RF-DNA fingerprinting for airport WiMax communications security, Proceedings of the Fourth International Conference on Network and System Security, pp. 32–39, 2010Google Scholar
- 22.M. Williams, M. Temple and D. Reising, Augmenting bit-level network security using physical layer RF-DNA fingerprinting, Proceedings of the IEEE Global Telecommunications Conference, 2010Google Scholar