Mitigating Voltage Fingerprint Spoofing Attacks on the Controller Area Network Bus

dc.contributor.authorLalouani, Wassila
dc.contributor.authorDang, Yi
dc.contributor.authorYounis, Mohamed
dc.date.accessioned2022-12-20T20:23:02Z
dc.date.available2022-12-20T20:23:02Z
dc.date.issued2022-11-21
dc.description.abstractThe Controller Area Network (CAN) bus suffers security vulnerabilities that allow message spoofing and masquerading Electronic Control Units (ECUs). A popular provision for mitigating these vulnerabilities is through the use of machine learning (ML) to derive ECU fingerprints based on the physical properties of bus signals. Particularly, voltage-based intrusion detection systems associate the message transmitter with its voltage fingerprint to detect conflicting logical ECU identifiers in the presence of cyberattacks. However, the signal characteristics depend on the operating conditions and hence the fingerprints need to be adapted overtime by online training of the underlying ML model. An adversary may exploit such a shortcoming to superimpose training data based on its own transmissions and thus bypass the protection mechanism. Such an attack not only allows device impersonation but also leads to rejecting transmissions of a legitimate ECU. This paper proposes an effective approach to thwart these attack scenarios. Our approach introduces unpredictably-scheduled transmissions involving one or multiple ECUs to confuse the adversary and ensure the generation of a legitimate fingerprinting dataset for online training. We validate the robustness of our approach using data collected from a real vehicle and show that it outperforms a prominent competing scheme by over 30% in terms of identifying malicious ECUs when the attacker could overwrite 50% of the retraining transmissions.en_US
dc.description.urihttps://link.springer.com/article/10.1007/s10586-022-03821-xen_US
dc.format.extent12 pagesen_US
dc.genrejournal articlesen_US
dc.genrepreprintsen_US
dc.identifierdoi:10.13016/m2zlab-um5e
dc.identifier.citationLalouani, W., Dang, Y. & Younis, M. Mitigating voltage fingerprint spoofing attacks on the controller area network bus. Cluster Comput (2022). https://doi.org/10.1007/s10586-022-03821-xen_US
dc.identifier.urihttps://doi.org/10.1007/s10586-022-03821-x
dc.identifier.urihttp://hdl.handle.net/11603/26480
dc.language.isoen_USen_US
dc.publisherSpringer Natureen_US
dc.relation.isAvailableAtThe University of Maryland, Baltimore County (UMBC)
dc.relation.ispartofUMBC Computer Science and Electrical Engineering Department Collection
dc.relation.ispartofUMBC Faculty Collection
dc.rightsThis item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author.en_US
dc.titleMitigating Voltage Fingerprint Spoofing Attacks on the Controller Area Network Busen_US
dc.typeTexten_US
dcterms.creatorhttps://orcid.org/0000-0003-3865-9217en_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
CLUS-D-21-01169R2.pdf
Size:
917.7 KB
Format:
Adobe Portable Document Format
Description:

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
2.56 KB
Format:
Item-specific license agreed upon to submission
Description: