Abstract
In-Vehicle Network (IVN) is composed of many communication nodes and Electronic Control Units (ECUs). The complex and interactive hybrid IVN expose more vulnerabilities of the system as it connects to the external network environment and opens up more attacking surface. In this paper, we first show a complete structure of the in-vehicle hybrid network. Then, we propose a three-layer network structure model, analyze the security threats of each layer, and compare the state-of-the-art countermeasures in detail. Finally, we identify the challenges and future research directions for the security of the in-vehicle hybrid network.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Koscher, K., Czeskis, A., Roesner, F., Patel, S., Kohno, T., Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S.: Experimental security analysis of a modern automobile. In: 2010 IEEE Symposium on Security and Privacy (SP), pp. 447–462. IEEE (2010)
Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S., Koscher, K., Czeskis, A., Roesner, F., Kohno, T.: Comprehensive experimental analyses of automotive attack surfaces. In: USENIX Security Symposium (2011)
Mukherjee, S., Shirazi, H., Ray, I., Daily, J., Gamble, R.: Practical DoS attacks on embedded networks in commercial vehicles. In: Ray, I., Gaur, M.S., Conti, M., Sanghi, D., Kamakoti, V. (eds.) ICISS 2016. LNCS, vol. 10063, pp. 23–42. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-49806-5_2
Apvrille, L., El Khayari, R., Henniger, O., Roudier, Y., Schweppe, H., Seudié, H.,Weyl, B., Wolf, M.: Secure automotive on-board electronics network architecture. In: FISITA 2010 World Automotive Congress, Budapest, Hungary, vol. 8 (2010)
Specification of Module Secure Onboard Communication AUTOSAR Release 4.2.2. https://www.autosar.org/standards/classic-platform/release-42/software-architecture/general/. Accessed 3 Aug 2017
Symantec anomaly detection for automotive. https://www.symantec.com/products/anomaly-detection-for-automotive. Accessed 29 July 2017
Lee, S.Y., Park, S.H., Choi, H.S., Lee, C.D.: MOST network system supporting full-duplexing communication. In: 2012 14th International Conference on Advanced Communication Technology (ICACT), pp. 1272–1275. IEEE (2012)
MOST150 intelligent network interface controller. http://www.microchip.com/wwwproducts/en/OS81118. Accessed 23 July 2017
Steinbach, T., Lim, H.T., Korf, F., Schmidt, T.C., Herrscher, D., Wolisz, A.: Tomorrow’s in-car interconnect? A competitive evaluation of IEEE 802.1 AVB and time-triggered ethernet (AS6802). In: 2012 IEEE Vehicular Technology Conference (VTC Fall), pp. 1–5. IEEE (2012)
Brunner, S., Roder, J., Kucera, M., Waas, T.: Automotive E/E-architecture enhancements by usage of ethernet TSN. In: 2017 13th Workshop on Intelligent Solutions in Embedded Systems (WISES), pp. 9–13. IEEE (2017)
Cho, K.T., Shin, K.G.: Error handling of in-vehicle networks makes them vulnerable. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 1044–1055. ACM (2016)
Ishtiaq Roufa, R.M., Mustafaa, H., Travis Taylora, S.O., Xua, W., Gruteserb, M., Trappeb, W., Seskarb, I.: Security and privacy vulnerabilities of in-car wireless networks: a tire pressure monitoring system case study. In: 19th USENIX Security Symposium, Washington DC, pp. 11–13 (2010)
Al-Kahtani, M.S.: Survey on security attacks in vehicular ad hoc networks (VANETs). In: 2012 6th International Conference on Signal Processing and Communication Systems (ICSPCS), pp. 1–9. IEEE (2012)
Wolf, M., Gendrullis, T.: Design, implementation, and evaluation of a vehicular hardware security module. In: Kim, H. (ed.) ICISC 2011. LNCS, vol. 7259, pp. 302–318. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-31912-9_20
Komala, G.K.: Secure broadcast in controller area networks using efficient protocols. Imp. J. Interdisc. Res. 3(1), 868 (2016)
Song, H.M., Kim, H.R., Kim, H.K.: Intrusion detection system based on the analysis of time intervals of CAN messages for in-vehicle network. In: 2016 International Conference on Information Networking (ICOIN), pp. 63–68. IEEE (2016)
Müter, M., Asaj, N.: Entropy-based anomaly detection for in-vehicle networks. In: 2011 IEEE Intelligent Vehicles Symposium (IV), pp. 1110–1115. IEEE (2011)
Seifert, S., Obermaisser, R.: Secure automotive gateway—secure communication for future cars. In: 2014 12th IEEE International Conference on Industrial Informatics (INDIN), pp. 213–220. IEEE (2014)
Integrated automotive gateway can enable connected cars. http://articles.sae.org/13711/. Accessed 23 July 2017
Alheeti, K.M.A., Gruebler, A., McDonald-Maier, K.D.: An intrusion detection system against malicious attacks on the communication network of driverless cars. In: 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC), pp. 916–921. IEEE (2015)
Fujitsu Semiconductor Europe: Fujitsu announces powerful MCU with secure hardware extension (SHE) for automotive instrument clusters (2012)
Marchetti, M., Stabili, D., Guido, A., Colajanni, M.: Evaluation of anomaly detection for in-vehicle networks through information-theoretic algorithms. In: 2016 IEEE 2nd International Forum Research and Technologies for Society and Industry Leveraging a better tomorrow (RTSI), pp. 1–6. IEEE (2016)
Miller, C., Valasek, C.: Remote exploitation of an unaltered passenger vehicle. Black Hat USA (2015)
Foster, I.D., Prudhomme, A., Koscher, K., Savage, S.: Fast and vulnerable: a story of telematic failures. In: WOOT (2015)
SAE Std J3061_201601, Cybersecurity Guidebook for Cyber-Physical Vehicle Systems. http://standards.sae.org/j3061_201601/
Han, G., Zeng, H., Li, Y., Dou, W.: SAFE: security-aware flexray scheduling engine. In: Design, Automation and Test in Europe Conference and Exhibition (DATE), pp. 1–4. IEEE (2014)
Kang, M.J., Kang, J.W.: A novel intrusion detection method using deep neural network for in-vehicle network security. In: 2016 IEEE 83rd Vehicular Technology Conference (VTC Spring), pp. 1–5. IEEE (2016)
Poudel, B., Giri, N.K., Munir, A.: Design and comparative evaluation of GPGPU-and FPGA-based MPSoC ECU architectures for secure, dependable, and real-time automotive CPS. In: 2017 IEEE 28th International Conference on Application-Specific Systems, Architectures and Processors (ASAP), pp. 29–36. IEEE (2017)
Cho, K.-T., Shin, K.G.: Fingerprinting electronic control units for vehicle intrusion detection. In: USENIX Security Symposium, pp. 911–927 (2016)
Acknowledgments
This work was partially supported by SUTD start-up research grant SRG-ISTD-2017-124. The first author’s work was done during his internship in SUTD.
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Huang, T., Zhou, J., Wang, Y., Cheng, A. (2017). On the Security of In-Vehicle Hybrid Network: Status and Challenges. In: Liu, J., Samarati, P. (eds) Information Security Practice and Experience. ISPEC 2017. Lecture Notes in Computer Science(), vol 10701. Springer, Cham. https://doi.org/10.1007/978-3-319-72359-4_38
Download citation
DOI: https://doi.org/10.1007/978-3-319-72359-4_38
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-72358-7
Online ISBN: 978-3-319-72359-4
eBook Packages: Computer ScienceComputer Science (R0)