吉林大学学报(工学版) ›› 2016, Vol. 46 ›› Issue (4): 1246-1253.doi: 10.13229/j.cnki.jdxbgxb201604034

• Orginal Article • Previous Articles     Next Articles

Cyber security and anomaly detection method for in-vehicle CAN

YU He1, QIN Gui-he1, 2, SUN Ming-hui1, 2, YAN Xin3, WANG Xuan-zhe3   

  1. 1.College of Computer Science and Technology, Jilin University, Changchun 130012, China;
    2.Symbol Computation and Knowledge Engineer of Ministry of Education,Jilin University, Changchun 130012;China;
    3.College of Software, Jilin University, Changchun 130012, China
  • Received:2015-09-08 Online:2016-07-20 Published:2016-07-20

Abstract: With the rapid developments of intelligent vehicle technology and vehicle networking technology, automotive information security issues are facing severe challenges. In this paper, the current situation of in-vehicle CAN cyber security is analyzed, and the potential security vulnerabilities and attacks for In-vehicle CAN bus are summarized. Then, an In-vehicle CAN bus anomaly detection method, which uses information entropy, is proposed. Experiments are carried out to verify the effectiveness of the proposed method. Theoretical analysis and experimental results show that the proposed method is feasible and effective.

Key words: computer application, controller area network(CAN)bus, anomaly detection, information entropy, vehicle cyber security

CLC Number: 

  • TP393
[1] Miller C, Valasek C. Adventures in automotive networks and control units[C]∥DEFCON 21 Hacking Conference, Las Vegas,2013.
[2] Miller C, Valasek C. A survey of remote automotive attack surfaces[C]∥Black Hat,Las Vegas,USA, 2014.
[3] Miller C, Valasek C. Remote Exploitation of an Unaltered Passenger Vehicle[C]∥Black Hat,Las Vegas,USA, 2015.
[4] Leinmüller T, Buttyan L, Hubaux J P, et al. Sevecom-secure vehicle communication[C]∥IST Mobile and Wireless Communication Summit, Myconos Greece,2006.
[5] European Commission within the Seventh Framework Programme.E-safety vehicle intrusion protected applications (EVITA) project[OB/OL]. http://www.evitaproject.org.
[6] Groza B, Murvay S. Broadcast Authentication in a Low Speed Controller Area Network[M]. E-Business and Telecommunications: Springer, 2012: 330-344.
[7] Groza B, Murvay S. Efficient protocols for secure broadcast in controller area networks[J]. IEEE Transactions on Industrial Informatics, 2013, 9(4): 2034-2042.
[8] Groza B, Murvay S, van Herrewege A, et al. Libra-can: a Lightweight Broadcast Authentication Protocol for Controller Area Networks[M]. Cryptology and Network Security: Springer, 2012: 185-200.
[9] Murvay P S, Groza B. Source identification using signal characteristics in controller area networks[J]. Signal Processing Letters,2014, 21(4): 395-399.
[10] Lin Chung-wei, Sangiovanni-Vincentelli A. Cyber-security for the controller area network (CAN) communication protocol[C]∥International Conference on Cyber Security,Washingtong DC,2012: 1-7.
[11] Schweppe H, Roudier Y. Security and privacy for in-vehicle networks[C]∥IEEE 1st International Workshop on Vehicular Communications, Sensing, and Computing (VCSC),Seoul,2012: 12-17.
[12] Schweppe H, Roudier Y, Weyl B, et al. Car2x communication: securing the last meter-a cost-effective approach for ensuring trust in car2x applications using in-vehicle symmetric cryptography[C]∥Vehicular Technology Conference (VTC Fall),San Francisco, 2011: 1-5.
[13] Woo S, Jo H J, Lee D H. A practical wireless attack on the connected car and security protocol for in-vehicle CAN[J]. IEEE Transactions on Intelligent Transportation Systems, 2015, 16(2): 993-1006.
[14] Yu Lu, Deng Juan, Brooks Richard R, et al. Automobile ECU design to avoid data tampering[C]∥Proceedings of the 10th Annual Cyber and Information Security Research Conference, Tennessee,2015: 10.
[15] Larson U E, Nilsson D K, Jonsson E. An approach to specification-based attack detection for in-vehicle networks[C]∥Intelligent Vehicles Symposium,Eindhoven,2008: 220-225.
[16] Muter M, Groll A, Freiling F C. A structured approach to anomaly detection for in-vehicle networks[C]∥Sixth International Conference on Information Assurance and Security (IAS), Atlanta,2010: 92-98.
[17] BOSCH. CAN Specification,Version 2.0[S].1991.
[18] Kleberger P, Olovsson T, Jonsson E. Security aspects of the in-vehicle network in the connected car[C]∥Intelligent Vehicles Symposium (IV),Baden,2011: 528-533.
[19] Lin C W, Zhu Q, Phung C, et al. Security-aware mapping for CAN-based real-time distributed automotive systems[C]∥IEEE/ACM International Conference on Computer-aided Design (ICCAD),San Jose,2013: 115-121.
[20] 刘衍珩, 付枫, 朱建启, 等. 基于活跃熵的DoS攻击检测模型[J]. 吉林大学学报: 工学版, 2011, 41(4): 1059-1064.
Liu Yan-hang, Fu Feng, Zhu Jian-qi, et al. DoS detection model base on alive entropy[J]. Journal of Jilin University(Engineering and Technology Edition), 2011, 41(4): 1059-1064.
[1] LIU Fu,ZONG Yu-xuan,KANG Bing,ZHANG Yi-meng,LIN Cai-xia,ZHAO Hong-wei. Dorsal hand vein recognition system based on optimized texture features [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1844-1850.
[2] WANG Li-min,LIU Yang,SUN Ming-hui,LI Mei-hui. Ensemble of unrestricted K-dependence Bayesian classifiers based on Markov blanket [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1851-1858.
[3] JIN Shun-fu,WANG Bao-shuai,HAO Shan-shan,JIA Xiao-guang,HUO Zhan-qiang. Synchronous sleeping based energy saving strategy of reservation virtual machines in cloud data centers and its performance research [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1859-1866.
[4] ZHAO Dong,SUN Ming-yu,ZHU Jin-long,YU Fan-hua,LIU Guang-jie,CHEN Hui-ling. Improved moth-flame optimization method based on combination of particle swarm optimization and simplex method [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1867-1872.
[5] LIU En-ze,WU Wen-fu. Agricultural surface multiple feature decision fusion disease judgment algorithm based on machine vision [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1873-1878.
[6] OUYANG Dan-tong, FAN Qi. Clause-level context-aware open information extraction [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1563-1570.
[7] LIU Fu, LAN Xu-teng, HOU Tao, KANG Bing, LIU Yun, LIN Cai-xia. Metagenomic clustering method based on k-mer frequency optimization [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1593-1599.
[8] GUI Chun, HUANG Wang-xing. Network clustering method based on improved label propagation algorithm [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1600-1605.
[9] LIU Yuan-ning, LIU Shuai, ZHU Xiao-dong, CHEN Yi-hao, ZHENG Shao-ge, SHEN Chun-zhuang. LOG operator and adaptive optimization Gabor filtering for iris recognition [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1606-1613.
[10] CHE Xiang-jiu, WANG Li, GUO Xiao-xin. Improved boundary detection based on multi-scale cues fusion [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1621-1628.
[11] ZHAO Hong-wei, LIU Yu-qi, DONG Li-yan, WANG Yu, LIU Pei. Dynamic route optimization algorithm based on hybrid in ITS [J]. 吉林大学学报(工学版), 2018, 48(4): 1214-1223.
[12] HUANG Hui, FENG Xi-an, WEI Yan, XU Chi, CHEN Hui-ling. An intelligent system based on enhanced kernel extreme learning machine for choosing the second major [J]. 吉林大学学报(工学版), 2018, 48(4): 1224-1230.
[13] FU Wen-bo, ZHANG Jie, CHEN Yong-le. Network topology discovery algorithm against routing spoofing attack in Internet of things [J]. 吉林大学学报(工学版), 2018, 48(4): 1231-1236.
[14] CAO Jie, SU Zhe, LI Xiao-xu. Image annotation method based on Corr-LDA model [J]. 吉林大学学报(工学版), 2018, 48(4): 1237-1243.
[15] HOU Yong-hong, WANG Li-wei, XING Jia-ming. HTTP-based dynamic adaptive streaming video transmission algorithm [J]. 吉林大学学报(工学版), 2018, 48(4): 1244-1253.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] LIU Song-shan, WANG Qing-nian, WANG Wei-hua, LIN Xin. Influence of inertial mass on damping and amplitude-frequency characteristic of regenerative suspension[J]. 吉林大学学报(工学版), 2013, 43(03): 557 -563 .
[2] CHU Liang, WANG Yan-bo, QI Fu-wei, ZHANG Yong-sheng. Control method of inlet valves for brake pressure fine regulation[J]. 吉林大学学报(工学版), 2013, 43(03): 564 -570 .
[3] LI Jing, WANG Zi-han, YU Chun-xian, HAN Zuo-yue, SUN Bo-hua. Design of control system to follow vehicle state with HIL test beach[J]. 吉林大学学报(工学版), 2013, 43(03): 577 -583 .
[4] HU Xing-jun, LI Teng-fei, WANG Jing-yu, YANG Bo, GUO Peng, LIAO Lei. Numerical simulation of the influence of rear-end panels on the wake flow field of a heavy-duty truck[J]. 吉林大学学报(工学版), 2013, 43(03): 595 -601 .
[5] WANG Tong-jian, CHEN Jin-shi, ZHAO Feng, ZHAO Qing-bo, LIU Xin-hui, YUAN Hua-shan. Mechanical-hydraulic co-simulation and experiment of full hydraulic steering systems[J]. 吉林大学学报(工学版), 2013, 43(03): 607 -612 .
[6] ZHANG Chun-qin, JIANG Gui-yan, WU Zheng-yan. Factors influencing motor vehicle travel departure time choice behavior[J]. 吉林大学学报(工学版), 2013, 43(03): 626 -632 .
[7] MA Wan-jing, XIE Han-zhou. Integrated control of main-signal and pre-signal on approach of intersection with double stop line[J]. 吉林大学学报(工学版), 2013, 43(03): 633 -639 .
[8] YU De-xin, TONG Qian, YANG Zhao-sheng, GAO Peng. Forecast model of emergency traffic evacuation time under major disaster[J]. 吉林大学学报(工学版), 2013, 43(03): 654 -658 .
[9] XIAO Yun, LEI Jun-qing, ZHANG Kun, LI Zhong-san. Fatigue stiffness degradation of prestressed concrete beam under multilevel amplitude cycle loading[J]. 吉林大学学报(工学版), 2013, 43(03): 665 -670 .
[10] XIAO Rui, DENG Zong-cai, LAN Ming-zhang, SHEN Chen-liang. Experiment research on proportions of reactive powder concrete without silica fume[J]. 吉林大学学报(工学版), 2013, 43(03): 671 -676 .