吉林大学学报(工学版) ›› 2016, Vol. 46 ›› Issue (4): 1246-1253.doi: 10.13229/j.cnki.jdxbgxb201604034
于赫1, 秦贵和1, 2, 孙铭会1, 2, 闫鑫3, 王璇喆3
YU He1, QIN Gui-he1, 2, SUN Ming-hui1, 2, YAN Xin3, WANG Xuan-zhe3
摘要: 在汽车智能化进程加快以及车联网技术快速发展的背景下,分析了车载CAN总线网络安全现状,总结了车载CAN总线网络潜在的安全漏洞,归纳了对车载CAN总线网络的攻击手段,提出了使用信息熵的车载CAN总线网络异常检测方法,并对该方法的有效性进行了实验验证。理论分析及实验结果均表明:使用信息熵的车载CAN总线网络异常检测方法是有效可行的。
中图分类号:
[1] Miller C, Valasek C. Adventures in automotive networks and control units[C]∥DEFCON 21 Hacking Conference, Las Vegas,2013. [2] Miller C, Valasek C. A survey of remote automotive attack surfaces[C]∥Black Hat,Las Vegas,USA, 2014. [3] Miller C, Valasek C. Remote Exploitation of an Unaltered Passenger Vehicle[C]∥Black Hat,Las Vegas,USA, 2015. [4] Leinmüller T, Buttyan L, Hubaux J P, et al. Sevecom-secure vehicle communication[C]∥IST Mobile and Wireless Communication Summit, Myconos Greece,2006. [5] European Commission within the Seventh Framework Programme.E-safety vehicle intrusion protected applications (EVITA) project[OB/OL]. http://www.evitaproject.org. [6] Groza B, Murvay S. Broadcast Authentication in a Low Speed Controller Area Network[M]. E-Business and Telecommunications: Springer, 2012: 330-344. [7] Groza B, Murvay S. Efficient protocols for secure broadcast in controller area networks[J]. IEEE Transactions on Industrial Informatics, 2013, 9(4): 2034-2042. [8] Groza B, Murvay S, van Herrewege A, et al. Libra-can: a Lightweight Broadcast Authentication Protocol for Controller Area Networks[M]. Cryptology and Network Security: Springer, 2012: 185-200. [9] Murvay P S, Groza B. Source identification using signal characteristics in controller area networks[J]. Signal Processing Letters,2014, 21(4): 395-399. [10] Lin Chung-wei, Sangiovanni-Vincentelli A. Cyber-security for the controller area network (CAN) communication protocol[C]∥International Conference on Cyber Security,Washingtong DC,2012: 1-7. [11] Schweppe H, Roudier Y. Security and privacy for in-vehicle networks[C]∥IEEE 1st International Workshop on Vehicular Communications, Sensing, and Computing (VCSC),Seoul,2012: 12-17. [12] Schweppe H, Roudier Y, Weyl B, et al. Car2x communication: securing the last meter-a cost-effective approach for ensuring trust in car2x applications using in-vehicle symmetric cryptography[C]∥Vehicular Technology Conference (VTC Fall),San Francisco, 2011: 1-5. [13] Woo S, Jo H J, Lee D H. A practical wireless attack on the connected car and security protocol for in-vehicle CAN[J]. IEEE Transactions on Intelligent Transportation Systems, 2015, 16(2): 993-1006. [14] Yu Lu, Deng Juan, Brooks Richard R, et al. Automobile ECU design to avoid data tampering[C]∥Proceedings of the 10th Annual Cyber and Information Security Research Conference, Tennessee,2015: 10. [15] Larson U E, Nilsson D K, Jonsson E. An approach to specification-based attack detection for in-vehicle networks[C]∥Intelligent Vehicles Symposium,Eindhoven,2008: 220-225. [16] Muter M, Groll A, Freiling F C. A structured approach to anomaly detection for in-vehicle networks[C]∥Sixth International Conference on Information Assurance and Security (IAS), Atlanta,2010: 92-98. [17] BOSCH. CAN Specification,Version 2.0[S].1991. [18] Kleberger P, Olovsson T, Jonsson E. Security aspects of the in-vehicle network in the connected car[C]∥Intelligent Vehicles Symposium (IV),Baden,2011: 528-533. [19] Lin C W, Zhu Q, Phung C, et al. Security-aware mapping for CAN-based real-time distributed automotive systems[C]∥IEEE/ACM International Conference on Computer-aided Design (ICCAD),San Jose,2013: 115-121. [20] 刘衍珩, 付枫, 朱建启, 等. 基于活跃熵的DoS攻击检测模型[J]. 吉林大学学报: 工学版, 2011, 41(4): 1059-1064. Liu Yan-hang, Fu Feng, Zhu Jian-qi, et al. DoS detection model base on alive entropy[J]. Journal of Jilin University(Engineering and Technology Edition), 2011, 41(4): 1059-1064. |
[1] | 刘富,宗宇轩,康冰,张益萌,林彩霞,赵宏伟. 基于优化纹理特征的手背静脉识别系统[J]. 吉林大学学报(工学版), 2018, 48(6): 1844-1850. |
[2] | 王利民,刘洋,孙铭会,李美慧. 基于Markov blanket的无约束型K阶贝叶斯集成分类模型[J]. 吉林大学学报(工学版), 2018, 48(6): 1851-1858. |
[3] | 金顺福,王宝帅,郝闪闪,贾晓光,霍占强. 基于备用虚拟机同步休眠的云数据中心节能策略及性能[J]. 吉林大学学报(工学版), 2018, 48(6): 1859-1866. |
[4] | 赵东,孙明玉,朱金龙,于繁华,刘光洁,陈慧灵. 结合粒子群和单纯形的改进飞蛾优化算法[J]. 吉林大学学报(工学版), 2018, 48(6): 1867-1872. |
[5] | 刘恩泽,吴文福. 基于机器视觉的农作物表面多特征决策融合病变判断算法[J]. 吉林大学学报(工学版), 2018, 48(6): 1873-1878. |
[6] | 欧阳丹彤, 范琪. 子句级别语境感知的开放信息抽取方法[J]. 吉林大学学报(工学版), 2018, 48(5): 1563-1570. |
[7] | 刘富, 兰旭腾, 侯涛, 康冰, 刘云, 林彩霞. 基于优化k-mer频率的宏基因组聚类方法[J]. 吉林大学学报(工学版), 2018, 48(5): 1593-1599. |
[8] | 桂春, 黄旺星. 基于改进的标签传播算法的网络聚类方法[J]. 吉林大学学报(工学版), 2018, 48(5): 1600-1605. |
[9] | 刘元宁, 刘帅, 朱晓冬, 陈一浩, 郑少阁, 沈椿壮. 基于高斯拉普拉斯算子与自适应优化伽柏滤波的虹膜识别[J]. 吉林大学学报(工学版), 2018, 48(5): 1606-1613. |
[10] | 车翔玖, 王利, 郭晓新. 基于多尺度特征融合的边界检测算法[J]. 吉林大学学报(工学版), 2018, 48(5): 1621-1628. |
[11] | 赵宏伟, 刘宇琦, 董立岩, 王玉, 刘陪. 智能交通混合动态路径优化算法[J]. 吉林大学学报(工学版), 2018, 48(4): 1214-1223. |
[12] | 黄辉, 冯西安, 魏燕, 许驰, 陈慧灵. 基于增强核极限学习机的专业选择智能系统[J]. 吉林大学学报(工学版), 2018, 48(4): 1224-1230. |
[13] | 傅文博, 张杰, 陈永乐. 物联网环境下抵抗路由欺骗攻击的网络拓扑发现算法[J]. 吉林大学学报(工学版), 2018, 48(4): 1231-1236. |
[14] | 曹洁, 苏哲, 李晓旭. 基于Corr-LDA模型的图像标注方法[J]. 吉林大学学报(工学版), 2018, 48(4): 1237-1243. |
[15] | 侯永宏, 王利伟, 邢家明. 基于HTTP的动态自适应流媒体传输算法[J]. 吉林大学学报(工学版), 2018, 48(4): 1244-1253. |
|