Advertisement

Electronic Control Unit Discrimination Using Wired Signal Distinct Native Attributes

  • Rahn Lassiter
  • Scott GrahamEmail author
  • Timothy Carbino
  • Stephen Dunlap
Conference paper
Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 570)

Abstract

A controller area network bus is a communications system used in modern automobiles to connect the electronic control units that implement normal vehicular operations as well as advanced autonomous safety and driver comfort features. However, these advancements come at the expense of vehicle security – researchers have shown that automobiles can be hacked by compromising electronic control units or by connecting unauthorized devices to the controller area network bus.

Physical layer device fingerprinting is a promising approach for implementing vehicle security. This chapter presents a fingerprinting method and classification algorithm for electronic control unit discrimination. Cross-lot discrimination is assessed using four Toyota Avalon electronic control units with different lot numbers as authorized devices, and a BeagleBoard, Arduino and CANable as rogue devices. The experiments yielded perfect rejection rates for rogue devices with false credentials and access denial rates exceeding 98% for authorized electronic control units with false credentials. Additionally, an average correct classification of approximately 99% was obtained for authorized devices.

Keywords

CAN bus electronic unit discrimination rogue device detection 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    O. Avatefipour, A. Hafeez, M. Tayyab and H. Malik, Linking received packets to the transmitter through physical-fingerprinting of controller area network, Proceedings of the IEEE Workshop on Information Forensics and Security, 2017Google Scholar
  2. 2.
    T. Carbino, Exploitation of Unintentional Ethernet Cable Emissions Using Constellation Based-Distinct Native Attribute (CB-DNA) Fingerprints to Enhance Network Security, Ph.D. Dissertation, Department of Electrical and Computer Engineering, Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio, 2015Google Scholar
  3. 3.
    T. Carbino, M. Temple and J. Lopez, A comparison of PHY-based fingerprinting methods used to enhance network access control, in ICT Systems Security and Privacy Protection, H. Federrath and D. Gollmann (Eds.), Springer, Cham, Switzerland, pp. 204–217, 2015CrossRefGoogle Scholar
  4. 4.
    T. Carbino, M. Temple and J. Lopez, Conditional constellation based distinct native attribute (CB-DNA) fingerprinting for network device authentication, Proceedings of the IEEE International Conference on Communications, 2016Google Scholar
  5. 5.
    K. Cho and K. Shin, Fingerprinting electronic control units for vehicle intrusion detection, Proceedings of the Twenty-Fifth USENIX Security Symposium, pp. 911–927, 2016Google Scholar
  6. 6.
    W. Choi, H. Jo, S. Woo, J. Chun, J. Park and D. Lee, Identifying ECUs using inimitable characteristics of signals in controller area networks, IEEE Transactions on Vehicular Technology, vol. 67(6), pp. 4757–4770, 2018CrossRefGoogle Scholar
  7. 7.
    W. Cobb, E. Garcia, M. Temple, R. Baldwin and Y. Kim, Physical layer identification of embedded devices using RF-DNA fingerprinting, Proceedings of the Military Communications Conference, pp. 2168–2173, 2010Google Scholar
  8. 8.
    S. Corrigan, Introduction to the Controller Area Network (CAN), Application Report SLOA101, Texas Instruments, Dallas, Texas, 2002Google Scholar
  9. 9.
    R. Currie, Developments in Car Hacking, Information Security Reading Room, SANS Institute, North Bethesda, Maryland, 2015Google Scholar
  10. 10.
    A. Greenberg, Hackers remotely kill a Jeep on the highway – With me in it, Wired, July 21, 2015Google Scholar
  11. 11.
    M. Jaynes, R. Dantu, R. Varriale and N. Evans, Automating ECU identification for vehicle security, Proceedings of the Fifteenth IEEE International Conference on Machine Learning and Applications, pp. 632–635, 2016Google Scholar
  12. 12.
    J. Lopez, N. Liefer, C. Busho and M. Temple, Enhancing critical infrastructure and key resources (CIKR) level-0 physical process security using field device distinct native attribute features, IEEE Transactions on Information Forensics and Security, vol. 13(5), pp. 1215–1229, 2018CrossRefGoogle Scholar
  13. 13.
    M. Lukacs, P. Collins and M. Temple, Device identification using active noise interrogation and RF-DNA “fingerprinting” for non-destructive amplifier acceptance testing, Proceedings of the Seventeenth Annual IEEE Wireless and Microwave Technology Conference, 2016Google Scholar
  14. 14.
    P. Murvay and B. Groza, Source identification using signal characteristics in controller area networks, IEEE Signal Processing Letters, vol. 21(4), pp. 395–399, 2014CrossRefGoogle Scholar
  15. 15.
    P. Paganini, CAN hacking tools, 20 USD to hack a car remotely, Security Affairs, February 9, 2014Google Scholar
  16. 16.
    D. Reising, M. Temple and J. Jackson, Authorized and rogue device discrimination using dimensionally-reduced RF-DNA fingerprints, IEEE Transactions on Information Forensics and Security, vol. 10(6), pp. 1180–1192, 2015CrossRefGoogle Scholar
  17. 17.
    B. Ross, T. Carbino and S. Stone, Physical-layer discrimination of power line communications, Proceedings of the International Conference on Computing, Networking and Communications, pp. 341–345, 2017Google Scholar
  18. 18.
    B. Ross, T. Carbino and M. Temple, Home automation simulcasted power line communications network (SPN) discrimination using wired signal distinct native attribute (WS-DNA), Proceedings of the Twelfth International Conference on Cyber Warfare and Security, pp. 313–322, 2017Google Scholar
  19. 19.
    B. Ross, T. Carbino and M. Temple, Simulcasted power line communications network (SPN) configuration validation for home automation applications using wired signal distinct native attribute (WS-DNA) fingerprinting, Journal of Information Warfare, vol. 16(3), pp. 95–118, 2017Google Scholar
  20. 20.
    Wikipedia Contributors, CAN-Bus-Frame in Base Format without Stuffbits, Wikipedia Commons (commons.wikimedia.org/wiki/File:CAN-Bus-frame\_in\_base\_format\_without\_stuffbits.svg), 2017Google Scholar
  21. 21.
    M. Williams, S. Munns, M. Temple and M. Mendenhall, RF-DNA fingerprinting for airport WiMax communications security, Proceedings of the Fourth International Conference on Network and System Security, pp. 32–39, 2010Google Scholar
  22. 22.
    M. Williams, M. Temple and D. Reising, Augmenting bit-level network security using physical layer RF-DNA fingerprinting, Proceedings of the IEEE Global Telecommunications Conference, 2010Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2019

Authors and Affiliations

  • Rahn Lassiter
    • 1
  • Scott Graham
    • 1
    Email author
  • Timothy Carbino
    • 1
  • Stephen Dunlap
    • 1
  1. 1.Air Force Institute of Technology, Wright-Patterson AFBOhioUSA

Personalised recommendations