TACAN: Transmitter Authentication through Covert Channels in Controller Area Networks

03/12/2019
by   Xuhang Ying, et al.
0

Nowadays, the interconnection of automotive systems with modern digital devices offers advanced user experiences to drivers. Electronic Control Units (ECUs) carry out a multitude of operations using the insecure Controller Area Network (CAN) bus in automotive Cyber-Physical Systems (CPSs). Therefore, dangerous attacks, such as disabling brakes, are possible and the safety of passengers is at risk. In this paper, we present TACAN (Transmitter Authentication in CAN), which provides secure authentication of ECUs by exploiting the covert channels without introducing CAN protocol modifications or traffic overheads (i.e., no extra bits or messages are used). TACAN turns upside-down the originally malicious concept of covert channels and exploits it to build an effective defensive technique that facilitates transmitter authentication via a trusted Monitor Node. TACAN consists of three different covert channels for ECU authentication: 1) Inter-Arrival Time (IAT)-based, leveraging the IATs of CAN messages; 2) offset-based, exploiting the clock offsets of CAN messages; 3) Least Significant Bit (LSB)-based, concealing authentication messages into the LSBs of normal CAN data. We implement the covert channels on the University of Washington (UW) EcoCAR testbed and evaluate their performance through extensive experiments. We demonstrate the feasibility of TACAN, highlighting no traffic overheads and attesting the regular functionality of ECUs. In particular, the bit error ratios are within 0.1 respectively. Furthermore, the bit error ratio of the LSB-based covert channel is equal to that of a normal CAN bus, which is 3.1x10^-7

READ FULL TEXT
research
12/08/2019

Covert Channel-Based Transmitter Authentication in Controller Area Networks

In recent years, the security of automotive Cyber-Physical Systems (CPSs...
research
03/21/2021

Nonlinear RF Fingerprints Authentication for OFDM Wireless Devices based on Demodulated Symbols

Radio Frequency fingerprints (RFF) authentication is one of the methods ...
research
08/28/2023

Hybrid PLS-ML Authentication Scheme for V2I Communication Networks

Vehicular communication networks are rapidly emerging as vehicles become...
research
12/17/2020

Concurrent Encryption and Authentication for Wireless Networks using Compressed Sensing

Authentication and encryption are traditionally treated as two separate ...
research
01/27/2018

Linking Received Packet to the Transmitter Through Physical-Fingerprinting of Controller Area Network

The Controller Area Network (CAN) bus serves as a legacy protocol for in...
research
11/25/2019

CANTO – Covert AutheNtication with Timing channels over Optimized traffic flows for CAN

Previous research works have endorsed the use of delays and clock skews ...

Please sign up or login with your details

Forgot password? Click here to reset