An Extended Survey on Vehicle Security
2019, arXiv (Cornell University)
https://doi.org/10.1109/ACCESS.2021.3104854Abstract
Advanced electronic units inside modern vehicles have enhanced the driving experience, but also introduced a myriad of security problems due to the inherent limitations of the internal communication protocol. In the last two decades, a number of security threats have been identified and accordingly, security measures have been proposed. While a large body of research on the vehicular security domain is focused on exposing vulnerabilities and proposing counter measures, there is an apparent paucity of research aimed at reviewing existing works on automotive security and at extracting insights. This paper provides a systematic review of security threats and countermeasures for the ubiquitous CAN bus communication protocol. It further exposes the limitations of the existing security measures, and discusses a seemingly-overlooked, simple, cost-effective and incrementally deployable solution which can provide a reasonable defense against a major class of packet injection attacks and many denial of service attacks.
References (83)
- M. Farsi, K. Ratcliff, and M. Barbosa, "An overview of controller area network," Computing & Control Engineering Journal, vol. 10, no. 3, 1999.
- W. Voss, A comprehensible guide to controller area network. Copperhill Media, 2008.
- M. Di Natale, H. Zeng, P. Giusto, and A. Ghosal, Understanding and using the controller area network communication protocol: theory and practice. Springer Science & Business Media, 2012.
- M. Wolf, A. Weimerskirch, and C. Paar, "Security in automotive bus systems," in Workshop on Embedded Security in Cars, 2004.
- K. Koscher, A. Czeskis, F. Roesner, S. Patel, T. Kohno, S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, and S. Savage, "Experi- mental security analysis of a modern automobile," in IEEE S&P, 2010.
- C. Miller and C. Valasek, "Adventures in automotive networks and control units," DEFCON, 2013.
- --, "Remote exploitation of an unaltered passenger vehicle," Black Hat USA, 2015.
- D. K. Nilsson, U. E. Larson, and E. Jonsson, "Efficient in-vehicle delayed data authentication based on compound message authentication codes," in IEEE Vehicular Technology Conference, 2008.
- T. Hoppe, S. Kiltz, and J. Dittmann, "Security threats to automotive CAN networks -practical examples and selected short-term countermeasures," in Computer Safety, Reliability, and Security, 2008.
- P. Kleberger, T. Olovsson, and E. Jonsson, "Security aspects of the in- vehicle network in the connected car," in IEEE IV, 2011.
- I. Studnia, V. Nicomette, E. Alata, Y. Deswarte, M. Kaâniche, and Y. Laarouchi, "Survey on security threats and protection mechanisms in embedded automotive networks," in DSN-W, 2013.
- C. Miller and C. Valasek, "A survey of remote automotive attack surfaces," Black Hat USA, 2014.
- O. Avatefipour and H. Malik, "State-of-the-art survey on in-vehicle network communication (CAN-Bus) security and vulnerabilities," arXiv:1802.01725, 2018.
- J. Liu, S. Zhang, W. Sun, and Y. Shi, "In-vehicle network attacks and coun- termeasures: Challenges and future directions," IEEE Network, vol. 31, no. 5, pp. 50-58, 2017.
- M. Dibaei, X. Zheng, K. Jiang, R. Abbas, S. Liu, Y. Zhang, Y. Xiang, and S. Yu, "Attacks and defences on intelligent connected vehicles: A survey," Digital Communications and Networks, 2020.
- B. Mokhtar and M. Azab, "Survey on security issues in vehicular ad hoc networks," Alexandria engineering journal, vol. 54, no. 4, pp. 1115-1126, 2015.
- C. Bernardini, M. R. Asghar, and B. Crispo, "Security and privacy in vehicular communications: Challenges and opportunities," Vehicular Communications, vol. 10, pp. 13-28, 2017.
- F. Sakiz and S. Sen, "A survey of attacks and detection mechanisms on intelligent transportation systems: Vanets and iov," Ad Hoc Networks, vol. 61, pp. 33-50, 2017.
- H. Hasrouny, A. E. Samhat, C. Bassil, and A. Laouiti, "Vanet security challenges and solutions: A survey," Vehicular Communications, vol. 7, pp. 7-20, 2017.
- M. S. Al-Kahtani, "Survey on security attacks in vehicular ad hoc networks (vanets)," in 2012 6th international conference on signal processing and communication systems. IEEE, 2012, pp. 1-9.
- J. Cui, L. S. Liew, G. Sabaliauskaite, and F. Zhou, "A review on safety failures, security attacks, and available countermeasures for autonomous vehicles," Ad Hoc Networks, vol. 90, p. 101823, 2019.
- J. Petit and S. E. Shladover, "Potential cyberattacks on automated vehi- cles," IEEE Transactions on Intelligent transportation systems, vol. 16, no. 2, pp. 546-556, 2014.
- K.-T. Cho and K. G. Shin, "Error handling of in-vehicle networks makes them vulnerable," in ACM CCS, 2016.
- Texas Instruments, "Introduction to the controller area network (can)," accessed 2019-08-29. [Online]. Available: http://www.ti.com/ lit/an/sloa101b/sloa101b.pdf
- K. Pazul, "Controller area network (CAN) basics," Microchip Technology Inc, 1999.
- kvaser, "CAN bus error handling," accessed 2018-11-29. [Online]. Available: https://www.kvaser.com/about-can/the-can-protocol/ can-error-handling/
- Copperhill Technologies, "CAN bus guide -error flag." [Online]. Avail- able: https://www.copperhilltechnologies.com/can-bus-guide-error-flag/
- D. K. Nilsson, P. H. Phung, and U. E. Larson, "Vehicle ECU classification based on safety-security characteristics," in IET Road Transport Infor- mation and Control Conference and the ITS United Kingdom Members' Conference (RTIC), 2008.
- S. Shukla, "Embedded security for vehicles: Ecu hacking," 2016.
- C. N. Coverdill and S. A. Wright, "Truck with monitored and resettable electronic control units," 1999, uS Patent 5,890,080.
- Nissan-global, "Nissan autonomous emergency steer- ing system," accessed 2018-10-29. [Online].
- Avail- able: https://www.nissan-global.com/EN/TECHNOLOGY/OVERVIEW/ autonomous_emergency_steering_system.html
- T. Ziermann, S. Wildermann, and J. Teich, "CAN+: A new backward- compatible controller area network (CAN) protocol with up to 16x higher data rates," in Design, Automation and Test,Europe, 2009.
- I. Sheikh, M. Hanif, and M. Short, "Improving information throughput and transmission predictability in controller area networks," in 2010 IEEE International Symposium on Industrial Electronics. IEEE, 2010, pp. 1736-1741.
- S. Kang, S. Han, S. Cho, D. Jang, H. Choi, and J.-W. Choi, "High speed can transmission scheme supporting data rate of over 100 mb/s," IEEE Communications Magazine, vol. 54, no. 6, pp. 128-135, 2016.
- R. M. Ishtiaq Roufa, H. Mustafaa, S. O. Travis Taylora, W. Xua, M. Grute- serb, W. Trappeb, and I. Seskarb, "Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study," in USENIX Security, 2010.
- N. T. Courtois, G. V. Bard, and D. Wagner, "Algebraic and slide attacks on KeeLoq," in Workshop on Fast Software Encryption, 2008.
- A. Bogdanov, "Cryptanalysis of the KeeLoq block cipher," IACR Cryptol- ogy ePrint Archive, 2007.
- --, "Attacks on the KeeLoq block cipher and authentication systems," in Conference on RFID Security, 2007.
- S. Indesteege, N. Keller, O. Dunkelman, E. Biham, and B. Preneel, "A practical attack on KeeLoq," in EUROCRYPT, 2008.
- S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, S. Sav- age, K. Koscher, A. Czeskis, F. Roesner, and T. Kohno, "Comprehensive experimental analyses of automotive attack surfaces," in USENIX Security, 2011.
- H. Wen, Q. A. Chen, and Z. Lin, "Plug-n-pwned: Comprehensive vulner- ability analysis of obd-ii dongles as a new over-the-air attack surface in automotive iot," 2020.
- D. Spill and A. Bittau, "BlueSniff: Eve meets Alice and Bluetooth," WOOT, 2007.
- S. Woo, H. J. Jo, and D. H. Lee, "A practical wireless attack on the connected car and security protocol for in-vehicle can," IEEE Transactions on intelligent transportation systems, vol. 16, no. 2, pp. 993-1006, 2014.
- I. D. Foster, A. Prudhomme, K. Koscher, and S. Savage, "Fast and vulnerable: A story of telematic failures," in WOOT, 2015.
- A. Van Herrewege, D. Singelee, and I. Verbauwhede, "CANAuth -a simple, backward compatible broadcast authentication protocol for CAN bus," in ECRYPT Workshop on Lightweight Cryptography, 2011.
- M. Bellare, "Hmac: Keyed-hashing for message authentication," Network Working Group RFC, vol. 2104, 1997.
- B. Groza, S. Murvay, A. Van Herrewege, and I. Verbauwhede, "LiBrA- CAN: a lightweight broadcast authentication protocol for controller area networks," in Cryptology and Network Security, 2012.
- A. Groll and C. Ruland, "Secure and authentic communication on existing in-vehicle networks," in IEEE IV, 2009.
- L. Dariz, M. Selvatici, M. Ruggeri, G. Costantino, and F. Martinelli, "Trade-off analysis of safety and security in CAN bus communication," in MT-ITS, 2017.
- Q. Wang and S. Sawhney, "VeCure: A practical security framework to protect the CAN bus of vehicles," in IOT, 2014.
- R. Kurachi, Y. Matsubara, H. Takada, N. Adachi, Y. Miyashita, and S. Horihata, "CaCAN-centralized authentication system in CAN (con- troller area network)," in ESCAR, 2014.
- H. Ueda, R. Kurachi, H. Takada, T. Mizutani, M. Inoue, and S. Horihata, "Security authentication system for in-vehicle network," SEI technical review, vol. 81, 2015.
- E. Wang, W. Xu, S. Sastry, S. Liu, and K. Zeng, "Hardware module-based message authentication in intra-vehicle networks," in 2017 ACM/IEEE 8th International Conference on Cyber-Physical Systems (ICCPS). IEEE, 2017, pp. 207-216.
- A.-I. Radu and F. D. Garcia, "LeiA: A lightweight authentication protocol for CAN," in ESORICS, 2016.
- A. Hazem and H. Fahmy, "Lcap -a lightweight can authentication protocol for securing in-vehicle networks," in ESCAR, 2012.
- A. Perrig, R. Canetti, J. D. Tygar, and D. Song, "Efficient authentication and signing of multicast streams over lossy channels," in IEEE S&P, 2000.
- S. Nürnberger and C. Rossow, "vatiCAN -vetted, authenticated CAN bus," in CHES, 2016.
- Z. Lu, Q. Wang, X. Chen, G. Qu, Y. Lyu, and Z. Liu, "Leap: a lightweight encryption and authentication protocol for in-vehicle communications," in 2019 IEEE Intelligent Transportation Systems Conference (ITSC). IEEE, 2019, pp. 1158-1164.
- P. I. Radoglou-Grammatikis and P. G. Sarigiannidis, "Securing the smart grid: A comprehensive compilation of intrusion detection and prevention systems," IEEE Access, vol. 7, pp. 46 595-46 620, 2019.
- M. Baykara and R. Das, "A novel honeypot based security approach for real-time intrusion detection and prevention systems," Journal of Informa- tion Security and Applications, vol. 41, pp. 103-116, 2018.
- I. Butun, S. D. Morgera, and R. Sankar, "A survey of intrusion detection systems in wireless sensor networks," IEEE communications surveys & tutorials, vol. 16, no. 1, pp. 266-282, 2013.
- M. Baykara and R. Das, "A novel hybrid approach for detection of web- based attacks in intrusion detection systems," International Journal of Computer Networks And Applications, vol. 4, no. 2, pp. 62-76, 2017.
- M. Baykara and R. Daş, "A survey on potential applications of honey- pot technology in intrusion detection systems," International Journal of Computer Networks and Applications (IJCNA), vol. 2, no. 5, pp. 203-208, 2015.
- T. Hoppe, S. Kiltz, and J. Dittmann, "Security threats to automotive CAN networks -practical examples and selected short-term countermeasures," Reliability Engineering & System Safety, vol. 96, no. 1, 2011.
- M. Gmiden, M. H. Gmiden, and H. Trabelsi, "An intrusion detection method for securing in-vehicle CAN bus," in STA, 2016.
- P.-S. Murvay and B. Groza, "Source identification using signal characteris- tics in controller area networks," IEEE Signal Processing Letters, vol. 21, no. 4, pp. 395-399, 2014.
- W. Choi, H. J. Jo, S. Woo, J. Y. Chun, J. Park, and D. H. Lee, "Identi- fying ECUs using inimitable characteristics of signals in controller area networks," IEEE Transactions on Vehicular Technology, 2018.
- H. M. Song, H. R. Kim, and H. K. Kim, "Intrusion detection system based on the analysis of time intervals of CAN messages for in-vehicle network," in ICOIN, 2016.
- A. Taylor, N. Japkowicz, and S. Leblanc, "Frequency-based anomaly detection for the automotive CAN bus," in WCICSS, 2015.
- M. R. Moore, R. A. Bridges, F. L. Combs, M. S. Starr, and S. J. Prowell, "Modeling inter-signal arrival times for accurate detection of CAN bus signal injection attacks: a data-driven approach to in-vehicle intrusion detection," in Cyber and Information Security Research, 2017.
- M. Müter and N. Asaj, "Entropy-based anomaly detection for in-vehicle networks," in IEEE IV, 2011.
- M.-J. Kang and J.-W. Kang, "Intrusion detection system using deep neural network for in-vehicle network security," PloS One, vol. 11, no. 6, 2016.
- F. Amato, L. Coppolino, F. Mercaldo, F. Moscato, R. Nardone, and A. San- tone, "Can-bus attack detection with deep learning," IEEE Transactions on Intelligent Transportation Systems, 2021.
- M. Markovitz and A. Wool, "Field classification, modeling and anomaly detection in unknown CAN bus networks," Vehicular Communications, vol. 9, 2017.
- M. Marchetti and D. Stabili, "Anomaly detection of CAN bus messages through analysis of ID sequences," in IEEE IV, 2017.
- A. Taylor, S. Leblanc, and N. Japkowicz, "Anomaly detection in automo- bile control network data with long short-term memory networks," in 2016 IEEE International Conference on Data Science and Advanced Analytics (DSAA). IEEE, 2016, pp. 130-139.
- S. Tariq, S. Lee, and S. S. Woo, "Cantransfer: transfer learning based intrusion detection on a controller area network using convolutional lstm network," in Proceedings of the 35th Annual ACM Symposium on Applied Computing, 2020, pp. 1048-1055.
- "Earth-moving machinery -machine-control systems (MCS) using elec- tronic components -performance criteria and tests for functional safety," ISO 15998:2008, 2008.
- A. Palanca, E. Evenchick, F. Maggi, and S. Zanero, "A stealth, selec- tive, link-layer denial-of-service attack against automotive networks," in DIMVA, 2017.
- S. Kulandaivel, S. Jain, J. Guajardo and V. Sekar, "Cannon: Reliable and stealthy remote shutdown attacks via unaltered automotive microcontrollers," accessed 2021-06-15. [Online]. Available: https://users.ece.cmu.edu/~vsekar/assets/pdf/oakland21_cannon.pdf
- S. Nie, L. Liu, and Y. Du, "Free-fall: hacking Tesla from wireless to CAN bus," Black Hat USA Briefings, 2017.
- CHANDRA SHARMA received his BS degree in Computer Engineering from Kathmandu En- gineering College, Nepal, in 2015. He joined Kansas State University, KS, in 2017 to pursue the PhD degree in Computer Science. Starting 2018, he has been working as a Re- search Assistant at PITS Lab at Kansas State University. His primary research interests include information theory and system and software secu- rity. His current work focuses on privacy concerns of disclosing personal information on the internet and optimizing the trade- off between information privacy and utility. SAMUEL MOYLAN graduated from the depart- ment of Computer Science at Kansas State Uni- versity in 2019. While at Kansas State University, his research interests included vehicular security and cyber security. EUGENE Y VASSERMAN is an Associate Pro- fessor in the Department of Computer Science at Kansas State University, specializing in the security of distributed systems. His current re- search is chiefly in the area of security for med- ical cyber-physical systems, security usability, and user education, with past work spanning the gamut from medical system authorization with integrated break-glass capabilities (IoMT), to se- cure hyper-local routing and social networking, to privacy and censorship resistance on a global scale. GEORGE T AMARIUCAI was born and raised in Romania. He received his PhD in electrical and computer engineering from Louisiana State University (2009). Amariucai is currently with the Department of Computer Science at Kansas State University. His research interests are focused on cyber security and its intersections with probability and infor- mation theory, applied and theoretical machine learning, wireless communication networks, cryp- tography, and social sciences. He is the director of the PITS Lab.