Covert Channel-Based Transmitter Authentication in Controller Area Networks

12/08/2019
by   Xuhang Ying, et al.
0

In recent years, the security of automotive Cyber-Physical Systems (CPSs) is facing urgent threats due to the widespread use of legacy in-vehicle communication systems. As a representative legacy bus system, the Controller Area Network (CAN) hosts Electronic Control Units (ECUs) that are crucial vehicle functioning. In this scenario, malicious actors can exploit CAN vulnerabilities, such as the lack of built-in authentication and encryption schemes, to launch CAN bus attacks with life-threatening consequences (e.g., disabling brakes). In this paper, we present TACAN (Transmitter Authentication in CAN), which provides secure authentication of ECUs on the legacy CAN bus by exploiting the covert channels, without introducing CAN protocol modifications or traffic overheads. TACAN turns upside-down the originally malicious concept of covert channels and exploits it to build an effective defensive technique that facilitates transmitter authentication via a centralized, trusted Monitor Node. TACAN consists of three different covert channels for ECU authentication: 1) the Inter-Arrival Time (IAT)-based; 2) the Least Significant Bit (LSB)-based; and 3) a hybrid covert channel, exploiting the combination of the first two. In order to validate TACAN, we implement the covert channels on the University of Washington (UW) EcoCAR (Chevrolet Camaro 2016) testbed. We further evaluate the bit error, throughput, and detection performance of TACAN through extensive experiments using the EcoCAR testbed and a publicly available dataset collected from Toyota Camry 2010. We demonstrate the feasibility of TACAN and the effectiveness of detecting CAN bus attacks, highlighting no traffic overheads and attesting the regular functionality of ECUs.

READ FULL TEXT

page 2

page 4

page 6

page 8

page 9

page 12

page 14

page 15

research
03/12/2019

TACAN: Transmitter Authentication through Covert Channels in Controller Area Networks

Nowadays, the interconnection of automotive systems with modern digital ...
research
08/28/2023

Hybrid PLS-ML Authentication Scheme for V2I Communication Networks

Vehicular communication networks are rapidly emerging as vehicles become...
research
01/27/2018

Linking Received Packet to the Transmitter Through Physical-Fingerprinting of Controller Area Network

The Controller Area Network (CAN) bus serves as a legacy protocol for in...
research
01/17/2023

Utilization of Impedance Disparity Incurred from Switching Activities to Monitor and Characterize Firmware Activities

The massive trend toward embedded systems introduces new security threat...
research
02/24/2021

Automated Fuzzing of Automotive Control Units

Modern vehicles are governed by a network of Electronic Control Units (E...
research
06/06/2022

CAN-MM: Multiplexed Message Authentication Code for Controller Area Network message authentication in road vehicles

The automotive market is increasingly profitable for cyberattacks with t...
research
08/20/2020

Defending Against Adversarial Attacks in Transmission- and Distribution-level PMU Data

Phasor measurement units (PMUs) provide high-fidelity data that improve ...

Please sign up or login with your details

Forgot password? Click here to reset