TY - JOUR
T1 - Real-Time Security Warning and ECU Identification for In-Vehicle Networks
AU - Wei, Hongqian
AU - Ai, Qiang
AU - Zhao, Wenqiang
AU - Zhang, Youtong
N1 - Publisher Copyright:
© 2001-2012 IEEE.
PY - 2023/9/1
Y1 - 2023/9/1
N2 - Vehicle intelligence and networking have manifested the significance of the embedded controller area network (CAN) bus. However, the lack of message encryption and identity (ID) authentication leaves electric control units (ECUs) exposed to cyber attacks. To identify the potential attacks on the CAN, intrusion detection systems (IDSs) are required with consideration of their computational burden and their application in vehicles. Therefore, we propose a lightweight ECU identification scheme. Explicitly, the proposed method records the periodic intervals of frames and calculates accumulated clock offsets with the recursive least square (RLS) algorithm; meanwhile, the empirical rules (ERs) are adopted to eliminate the noises. Then, the ECU fingerprints have been formulated with the derived clock skew, clock offsets, as well as their expectations. Furthermore, to accurately identify the attackers in the masquerade attacks, a double-verified attacker identification approach is proposed, in which the data dependency and intra-inter-class algorithm are, respectively, utilized for better executability. Finally, we have tested the proposed method with an actual vehicle, and the results manifest that the proposed method could identify the abnormal ECUs with an identification accuracy of at least 98%, and its execution time is less than 3 ms.
AB - Vehicle intelligence and networking have manifested the significance of the embedded controller area network (CAN) bus. However, the lack of message encryption and identity (ID) authentication leaves electric control units (ECUs) exposed to cyber attacks. To identify the potential attacks on the CAN, intrusion detection systems (IDSs) are required with consideration of their computational burden and their application in vehicles. Therefore, we propose a lightweight ECU identification scheme. Explicitly, the proposed method records the periodic intervals of frames and calculates accumulated clock offsets with the recursive least square (RLS) algorithm; meanwhile, the empirical rules (ERs) are adopted to eliminate the noises. Then, the ECU fingerprints have been formulated with the derived clock skew, clock offsets, as well as their expectations. Furthermore, to accurately identify the attackers in the masquerade attacks, a double-verified attacker identification approach is proposed, in which the data dependency and intra-inter-class algorithm are, respectively, utilized for better executability. Finally, we have tested the proposed method with an actual vehicle, and the results manifest that the proposed method could identify the abnormal ECUs with an identification accuracy of at least 98%, and its execution time is less than 3 ms.
KW - Intelligent connected vehicles
KW - networks
KW - security
KW - vehicle control
UR - http://www.scopus.com/inward/record.url?scp=85149864475&partnerID=8YFLogxK
U2 - 10.1109/JSEN.2023.3249240
DO - 10.1109/JSEN.2023.3249240
M3 - Article
AN - SCOPUS:85149864475
SN - 1530-437X
VL - 23
SP - 20258
EP - 20266
JO - IEEE Sensors Journal
JF - IEEE Sensors Journal
IS - 17
ER -