Abstract

The rapid expansion of intra-vehicle networks has increased the number of threats to such networks. Most modern vehicles implement various physical and data-link layer technologies. Vehicles are becoming increasingly autonomous and connected. Controller Area Network (CAN) is one such serial bus system that is used to connect sensors and controllers (Electronic Control Units—ECUs) within a vehicle. ECUs vary widely in processing power, storage, memory, and connectivity. Classical cryptographic approaches are resource intensive. There is a need for efficient security countermeasures for protecting the CAN from various attacks. In this article, we present a novel Long Short-Term Memory (LSTM) network to detect anomalies. Once trained, our system is capable of detecting anomalies in real-time and uses minimal resources. We report the results of our novel prediction algorithm that we use to select optimal LSTM network parameters. Our prediction algorithm and anomaly detection engine have been tested on data from real automobiles. We present the results of our experiments and analyze our findings.

Highlights

  • The swift expansion of intra-vehicle networks has increased the number of vulnerabilities to such networks

  • As can be seen from table I, most Electronic Control Units (ECU) are not capable of performing cryptographic operations using their limited resources in any reasonable amount of time

  • We need to invest in intrusion detection systems that can detect intrusions in almost real-time with minimal resources

Read more

Summary

INTRODUCTION

The swift expansion of intra-vehicle networks has increased the number of vulnerabilities to such networks. Most modern vehicles implement various physical layer and data link layer technologies. These heterogeneous technologies interface with each other and with external cellular and wireless networks. Vehicles are becoming increasingly smart, connected and part of the Internet. This has given rise to multiple attack surfaces and vectors. The connected devices are commonly called Electronic Control Units (ECU). ECUs are used in transmission control, engine control, speed control, airbag control, powertrain control, and many other vehicle subsystems. A. CAN Communication CAN is extensively used to connect ECUs in vehicles. Miller and Valasek [1] were successful in their attacks by sending specific messages on the CAN bus. Priority is used to meet specific timing constraints for individual ECUs

CONTROLLER AREA NETWORK
Security Weaknesses
Requirements
AND RELATED WORK
INTRUSION DETECTION SYSTEM
Recurrent Neural Networks
Long Short-Term Memory Network
Prediction Algorithm Design using LSTM
Other Approaches
ANOMALY DETECTION ENGINE
Experiment 2
Observations and Limitations
Experiment 3
Experiment 4
Timing Analysis
VIII. CONCLUSION
Findings
Observations

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.