Abstract
A controller area network bus is a communications system used in modern automobiles to connect the electronic control units that implement normal vehicular operations as well as advanced autonomous safety and driver comfort features. However, these advancements come at the expense of vehicle security – researchers have shown that automobiles can be hacked by compromising electronic control units or by connecting unauthorized devices to the controller area network bus.
Physical layer device fingerprinting is a promising approach for implementing vehicle security. This chapter presents a fingerprinting method and classification algorithm for electronic control unit discrimination. Cross-lot discrimination is assessed using four Toyota Avalon electronic control units with different lot numbers as authorized devices, and a BeagleBoard, Arduino and CANable as rogue devices. The experiments yielded perfect rejection rates for rogue devices with false credentials and access denial rates exceeding 98% for authorized electronic control units with false credentials. Additionally, an average correct classification of approximately 99% was obtained for authorized devices.
Chapter PDF
Similar content being viewed by others
References
O. Avatefipour, A. Hafeez, M. Tayyab and H. Malik, Linking received packets to the transmitter through physical-fingerprinting of controller area network, Proceedings of the IEEE Workshop on Information Forensics and Security, 2017
T. Carbino, Exploitation of Unintentional Ethernet Cable Emissions Using Constellation Based-Distinct Native Attribute (CB-DNA) Fingerprints to Enhance Network Security, Ph.D. Dissertation, Department of Electrical and Computer Engineering, Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio, 2015
T. Carbino, M. Temple and J. Lopez, A comparison of PHY-based fingerprinting methods used to enhance network access control, in ICT Systems Security and Privacy Protection, H. Federrath and D. Gollmann (Eds.), Springer, Cham, Switzerland, pp. 204–217, 2015
T. Carbino, M. Temple and J. Lopez, Conditional constellation based distinct native attribute (CB-DNA) fingerprinting for network device authentication, Proceedings of the IEEE International Conference on Communications, 2016
K. Cho and K. Shin, Fingerprinting electronic control units for vehicle intrusion detection, Proceedings of the Twenty-Fifth USENIX Security Symposium, pp. 911–927, 2016
W. Choi, H. Jo, S. Woo, J. Chun, J. Park and D. Lee, Identifying ECUs using inimitable characteristics of signals in controller area networks, IEEE Transactions on Vehicular Technology, vol. 67(6), pp. 4757–4770, 2018
W. Cobb, E. Garcia, M. Temple, R. Baldwin and Y. Kim, Physical layer identification of embedded devices using RF-DNA fingerprinting, Proceedings of the Military Communications Conference, pp. 2168–2173, 2010
S. Corrigan, Introduction to the Controller Area Network (CAN), Application Report SLOA101, Texas Instruments, Dallas, Texas, 2002
R. Currie, Developments in Car Hacking, Information Security Reading Room, SANS Institute, North Bethesda, Maryland, 2015
A. Greenberg, Hackers remotely kill a Jeep on the highway – With me in it, Wired, July 21, 2015
M. Jaynes, R. Dantu, R. Varriale and N. Evans, Automating ECU identification for vehicle security, Proceedings of the Fifteenth IEEE International Conference on Machine Learning and Applications, pp. 632–635, 2016
J. Lopez, N. Liefer, C. Busho and M. Temple, Enhancing critical infrastructure and key resources (CIKR) level-0 physical process security using field device distinct native attribute features, IEEE Transactions on Information Forensics and Security, vol. 13(5), pp. 1215–1229, 2018
M. Lukacs, P. Collins and M. Temple, Device identification using active noise interrogation and RF-DNA “fingerprinting” for non-destructive amplifier acceptance testing, Proceedings of the Seventeenth Annual IEEE Wireless and Microwave Technology Conference, 2016
P. Murvay and B. Groza, Source identification using signal characteristics in controller area networks, IEEE Signal Processing Letters, vol. 21(4), pp. 395–399, 2014
P. Paganini, CAN hacking tools, 20 USD to hack a car remotely, Security Affairs, February 9, 2014
D. Reising, M. Temple and J. Jackson, Authorized and rogue device discrimination using dimensionally-reduced RF-DNA fingerprints, IEEE Transactions on Information Forensics and Security, vol. 10(6), pp. 1180–1192, 2015
B. Ross, T. Carbino and S. Stone, Physical-layer discrimination of power line communications, Proceedings of the International Conference on Computing, Networking and Communications, pp. 341–345, 2017
B. Ross, T. Carbino and M. Temple, Home automation simulcasted power line communications network (SPN) discrimination using wired signal distinct native attribute (WS-DNA), Proceedings of the Twelfth International Conference on Cyber Warfare and Security, pp. 313–322, 2017
B. Ross, T. Carbino and M. Temple, Simulcasted power line communications network (SPN) configuration validation for home automation applications using wired signal distinct native attribute (WS-DNA) fingerprinting, Journal of Information Warfare, vol. 16(3), pp. 95–118, 2017
Wikipedia Contributors, CAN-Bus-Frame in Base Format without Stuffbits, Wikipedia Commons (commons.wikimedia.org/wiki/File:CAN-Bus-frame\_in\_base\_format\_without\_stuffbits.svg), 2017
M. Williams, S. Munns, M. Temple and M. Mendenhall, RF-DNA fingerprinting for airport WiMax communications security, Proceedings of the Fourth International Conference on Network and System Security, pp. 32–39, 2010
M. Williams, M. Temple and D. Reising, Augmenting bit-level network security using physical layer RF-DNA fingerprinting, Proceedings of the IEEE Global Telecommunications Conference, 2010
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 IFIP International Federation for Information Processing
About this paper
Cite this paper
Lassiter, R., Graham, S., Carbino, T., Dunlap, S. (2019). Electronic Control Unit Discrimination Using Wired Signal Distinct Native Attributes. In: Staggs, J., Shenoi, S. (eds) Critical Infrastructure Protection XIII. ICCIP 2019. IFIP Advances in Information and Communication Technology, vol 570. Springer, Cham. https://doi.org/10.1007/978-3-030-34647-8_6
Download citation
DOI: https://doi.org/10.1007/978-3-030-34647-8_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-34646-1
Online ISBN: 978-3-030-34647-8
eBook Packages: Computer ScienceComputer Science (R0)