The Controller Area Network (CAN) is used for communication between in-vehicle devices. The CAN bus has been shown to be vulnerable to remote attacks. To harden vehicles against such attacks, vehicle manufacturers have divided in-vehicle networks into sub-networks, logically isolating critical devices. However, attackers may still have physical access to various sub-networks where they can connect a malicious device. This threat has not been adequately addressed, as methods proposed to determine physical intrusion points have shown weak results, emphasizing the need to develop more advanced techniques. To address this type of threat, we propose a security hardening system for in-vehicle networks. The proposed system includes two mechanisms that process deep features extracted from voltage signals measured on the CAN bus. The first mechanism uses data augmentation and deep learning to detect and locate physical intrusions when the vehicle starts; this mechanism can detect and locate intrusions, even when the connected malicious devices are silent. This mechanism's effectiveness (100% accuracy) is demonstrated in a wide variety of insertion scenarios on a CAN bus prototype. The second mechanism is a continuous device authentication mechanism, which is also based on deep learning; this mechanism's robustness (99.8% accuracy) is demonstrated on a real moving vehicle.
翻译:控制器地区网络(CAN)用于车辆内装置之间的通信。 CAN 公共汽车被证明很容易受到远程攻击。 硬化车辆来对付这种攻击, 汽车制造商将车辆内网络分成子网络, 逻辑上隔离关键装置。 但是, 攻击者可能仍然可以实际进入各种子网络, 在那里他们可以连接恶意装置。 这一威胁没有得到充分解决, 因为确定实际入侵点的方法显示的结果不力, 强调需要开发更先进的技术。 为了应对这种威胁, 我们建议为车辆内网络建立一个安全加固系统。 拟议的系统包括两个机制, 处理从CAN 公共汽车上测量的电压信号中提取的深层特征。 第一个机制使用数据增强和深度学习来探测和定位车辆开始时的物理入侵; 这个机制可以探测和定位入侵, 即使连接的恶意装置是静态的。 这个机制的有效性( 100%的精确度) 体现在CAN 公共汽车原型的多种插入情景中。 第二个机制是一个连续的装置认证机制, 也基于深层次的学习; 这个机制的稳健性(99.8 %) 的车辆在实际移动上展示。