Skip to main content

CANSentry: Securing CAN-Based Cyber-Physical Systems against Denial and Spoofing Attacks

  • Conference paper
  • First Online:
Computer Security – ESORICS 2020 (ESORICS 2020)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 12308))

Included in the following conference series:

Abstract

The Controller Area Network (CAN) has been widely adopted as the de facto standard to support the communication between the ECUs and other computing components in automotive and industrial control systems. In its initial design, CAN only provided very limited security features, which is seriously behind today’s standards for secure communication. The newly proposed security add-ons are still insufficient to defend against the majority of known breaches in the literature. In this paper, we first present a new stealthy denial of service (DoS) attack against targeted ECUs on CAN. The attack is hardly detectable since the actions are perfectly legitimate to the bus. To defend against this new DoS attack and other denial and spoofing attacks in the literature, we propose a CAN firewall, namely CANSentry, that prevents malicious nodes’ misbehaviors such as injecting unauthorized commands or disabling targeted services. We implement CANSentry on a cost-effective and open-source device, to be deployed between any potentially malicious CAN node and the bus, without needing to modify CAN or existing ECUs. We evaluate CANSentry on a testing platform built with parts from a modern car. The results show that CANSentry successfully prevents attacks that have shown to lead to safety-critical implications.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Grimm co. cant. https://github.com/bitbane/CANT

  2. Checkoway, S., et al.: Comprehensive experimental analyses of automotive attack surfaces. In: USENIX Security Symposium (2011)

    Google Scholar 

  3. Cho, K.-T., Shin, K.G.: Error handling of in-vehicle networks makes them vulnerable. In: ACM CCS, pp. 1044–1055. ACM (2016)

    Google Scholar 

  4. Cho, K.-T., Shin, K.G.: Fingerprinting electronic control units for vehicle intrusion detection. In: USENIX Security Symposium (2016)

    Google Scholar 

  5. Cho, K.-T., Shin, K.G.: Viden: attacker identification on in-vehicle networks. In: ACM CCS (2017)

    Google Scholar 

  6. Choi, W., Jo, H.J., Woo, S., Chun, J.Y., Park, J., Lee, D.H.: Identifying ECUS using inimitable characteristics of signals in controller area networks. IEEE Trans. Veh. Tech. 67(6), 4757–4770 (2018)

    Article  Google Scholar 

  7. Choi, W., Joo, K., Jo, H.J., Park, M.C., Lee, D.H.: Voltageids: low-level communication characteristics for automotive intrusion detection system. IEEE TIFS 13(8), 2114–2129 (2018)

    Google Scholar 

  8. Dagan, T., Wool, A.: Parrot, a software-only anti-spoofing defense system for the can bus. ESCAR EUROPE (2016)

    Google Scholar 

  9. Dardanelli, A., et al.: A security layer for smartphone-to-vehicle communication over bluetooth. IEEE Embed. Syst. Lett. 5(3), 34–37 (2013)

    Article  Google Scholar 

  10. Foruhandeh, M., Man, Y., Gerdes, R., Li, M., Chantem, T.: Simple: single-frame based physical layer identification for intrusion detection and prevention on in-vehicle networks. In: ACSAC, pp. 229–244 (2019)

    Google Scholar 

  11. Foster, I., Prudhomme, A., Koscher, K., Savage, S.: A story of telematic failures. In: USENIX WOOT, Fast and Vulnerable (2015)

    Google Scholar 

  12. Fröschle, S., Stühring, A.: Analyzing the capabilities of the CAN attacker. In: Foley, S.N., Gollmann, D., Snekkenes, E. (eds.) ESORICS 2017. LNCS, vol. 10492, pp. 464–482. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-66402-6_27

    Chapter  Google Scholar 

  13. Gmiden, M., Gmiden, M.H., Trabelsi, H.: An intrusion detection method for securing in-vehicle can bus. In: IEEE STA (2016)

    Google Scholar 

  14. Gupta, R.A., Chow, M.-Y.: Networked control system: overview and research trends. IEEE Trans. Ind. Electron. 57(7), 2527–2535 (2010)

    Article  Google Scholar 

  15. Halder, S., Conti, M., Das, S.K.: COIDS: a clock offset based intrusion detection system for controller area networks. In: ICDCN (2020)

    Google Scholar 

  16. Han, K., Potluri, S.D., Shin, K.G.: On authentication in a connected vehicle: secure integration of mobile devices with vehicular networks. In: ACM/IEEE ICCPS, pp. 160–169 (2013)

    Google Scholar 

  17. Han, K., Weimerskirch, A., Shin, K.G.: A practical solution to achieve real-time performance in the automotive network by randomizing frame identifier. In: Proceedings of Europe Embedded Security Cars (ESCAR), pp. 13–29 (2015)

    Google Scholar 

  18. Hartkopp, O., Schilling, R.M.: Message authenticated can. In: Escar Conference, Berlin, Germany (2012)

    Google Scholar 

  19. Hoppe, T., Kiltz, S., Dittmann, J.: Security threats to automotive CAN networks – practical examples and selected short-term countermeasures. In: Harrison, M.D., Sujan, M.-A. (eds.) SAFECOMP 2008. LNCS, vol. 5219, pp. 235–248. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-87698-4_21

    Chapter  Google Scholar 

  20. Humayed, A., Lin, J., Li, F., Luo, B.: Cyber-physical systems security a survey. IEEE IoT J. 4(6), 1802–1831 (2017)

    Google Scholar 

  21. Humayed, A., Luo, B.: Cyber-physical security for smart cars: taxonomy of vulnerabilities, threats, and attacks. In: ACM/IEEE ICCPS (2015)

    Google Scholar 

  22. Humayed, A., Luo, B.: Using ID-hopping to defend against targeted DOS on CAN. In: SCAV Workshop (2017)

    Google Scholar 

  23. Iehira, K., Inoue, H., Ishida, K.: Spoofing attack using bus-off attacks against a specific ECU of the can bus. In: IEEE CCNC (2018)

    Google Scholar 

  24. Karray, K., Danger, J.-L., Guilley, S., Elaabid, M.A.: Identifier randomization: an efficient protection against CAN-bus attacks. In: Koç, Ç.K. (ed.) Cyber-Physical Systems Security, pp. 219–254. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-98935-8_11

    Chapter  Google Scholar 

  25. Kneib, M., Huth, C.: Scission: signal characteristic-based sender identification and intrusion detection in automotive networks. In: ACM CCS (2018)

    Google Scholar 

  26. Kornaros, G., Tomoutzoglou, O., Coppola, M.: Hardware-assisted security in electronic control units: secure automotive communications by utilizing one-time-programmable network on chip and firewalls. IEEE Micro 38(5), 63–74 (2018)

    Article  Google Scholar 

  27. Koscher, K., et al.: Experimental security analysis of a modern automobile. In: IEEE S&P (2010)

    Google Scholar 

  28. Kurachi, R., Matsubara, Y., Takada, H., Adachi, N., Miyashita, Y., Horihata, S.: Cacan-centralized authentication system in can (controller area network). In: International Conference on ESCAR (2014)

    Google Scholar 

  29. Lukasiewycz, M., Mundhenk, P., Steinhorst, S.: Security-aware obfuscated priority assignment for automotive can platforms. ACM Trans. Des. Autom. Electron. Syst. (TODAES) 21(2), 32 (2016)

    Google Scholar 

  30. Matsumoto, T., Hata, M., Tanabe, M., Yoshioka, K., Oishi, K.: A method of preventing unauthorized data transmission in controller area network. In: IEEE VTC (2012)

    Google Scholar 

  31. Miller, C., Valasek, C.: Adventures in automotive networks and control units. Def Con 21, 260–264 (2013)

    Google Scholar 

  32. Miller, C., Valasek, C.: Remote exploitation of an unaltered passenger vehicle. Black Hat USA 2015, 91 (2015)

    Google Scholar 

  33. Moore, E.F.: Gedanken-experiments on sequential machines. Automata Stud. 34, 129–153 (1956)

    MathSciNet  Google Scholar 

  34. Mundhenk, P., et al.: Security in automotive networks: lightweight authentication and authorization. ACM TODAES 22(2), 1–27 (2017)

    Article  Google Scholar 

  35. Murvay, P.-S., Groza, B.: Source identification using signal characteristics in controller area networks. IEEE Signal Process. Lett. 21(4), 395–399 (2014)

    Article  Google Scholar 

  36. Murvay, P.-S., Groza, B.: Dos attacks on controller area networks by fault injections from the software layer. In: ARES. ACM (2017)

    Google Scholar 

  37. Müter, M., Asaj, N.: Entropy-based anomaly detection for in-vehicle networks. In: IEEE Intelligent Vehicles Symposium (2011)

    Google Scholar 

  38. Narayanan, S.N., Mittal, S., Joshi, A.: Obd\_securealert: an anomaly detection system for vehicles. In: IEEE SMARTCOMP (2016)

    Google Scholar 

  39. Nie, S., Liu, L., Yuefeng, D.: Free-fall: hacking tesla from wireless to can bus. Brief. Black Hat USA 25, 1–16 (2017)

    Google Scholar 

  40. Nowdehi, N., Aoudi, W., Almgren, M., Olovsson, T.: CASAD: can-aware stealthy-attack detection for in-vehicle networks. arXiv:1909.08407 (2019)

  41. Nürnberger, S., Rossow, C.: – vatiCAN – vetted, authenticated CAN bus. In: Gierlichs, B., Poschmann, A.Y. (eds.) CHES 2016. LNCS, vol. 9813, pp. 106–124. Springer, Heidelberg (2016). https://doi.org/10.1007/978-3-662-53140-2_6

    Chapter  Google Scholar 

  42. Palanca, A., Evenchick, E., Maggi, F., Zanero, S.: A stealth, selective, link-layer denial-of-service attack against automotive networks. In: Polychronakis, M., Meier, M. (eds.) DIMVA 2017. LNCS, vol. 10327, pp. 185–206. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-60876-1_9

    Chapter  Google Scholar 

  43. Petit, J., Shladover, S.E.: Potential cyberattacks on automated vehicles. IEEE Trans. Intell. Transp. Syst. 16(2), 546–556 (2015)

    Google Scholar 

  44. Radu, A.-I., Garcia, F.D.: LeiA: a lightweight authentication protocol for CAN. In: Askoxylakis, I., Ioannidis, S., Katsikas, S., Meadows, C. (eds.) ESORICS 2016. LNCS, vol. 9879, pp. 283–300. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-45741-3_15

    Chapter  Google Scholar 

  45. Rizvi, S., Willet, J., Perino, D., Marasco, S., Condo, C.: A threat to vehicular cyber security and the urgency for correction. Procedia Comput. Sci. 114, 100–105 (2017)

    Article  Google Scholar 

  46. Rouf, I., et al.: Security and privacy vulnerabilities of in-car wireless networks: a tire pressure monitoring system case study. In: USENIX Security Symposium (2010)

    Google Scholar 

  47. Sagstetter, F., et al.: Security challenges in automotive hardware/software architecture design. In: DATE. IEEE (2013)

    Google Scholar 

  48. Souma, D., Mori, A., Yamamoto, H., Hata, Y.: Counter attacks for bus-off attacks. In: Gallina, B., Skavhaug, A., Schoitsch, E., Bitsch, F. (eds.) SAFECOMP 2018. LNCS, vol. 11094, pp. 319–330. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-99229-7_27

    Chapter  Google Scholar 

  49. Studnia, I., Nicomette, V., Alata, E., Deswarte, Y., Kaaniche, M., Laarouchi, Y.: Survey on security threats and protection mechanisms in embedded automotive networks. In: IEEE/IFIP DSN (2013)

    Google Scholar 

  50. Taylor, A., Leblanc, S., Japkowicz, N.: Anomaly detection in automobile control network data with long short-term memory networks. In: IEEE DSAA (2016)

    Google Scholar 

  51. Theissler, A.: Detecting known and unknown faults in automotive systems using ensemble-based anomaly detection. Knowl.-Based Syst. 123, 163–173 (2017)

    Article  Google Scholar 

  52. Tian, D., et al.: an intrusion detection system based on machine learning for CAN-Bus. In: Chen, Y., Duong, T.Q. (eds.) INISCOM 2017. LNICST, vol. 221, pp. 285–294. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-74176-5_25

    Chapter  Google Scholar 

  53. Van Bulck, J., Mühlberg, J.T., Piessens, F.: Vulcan: efficient component authentication and software isolation for automotive control networks. In: ACSAC, pp. 225–237 (2017)

    Google Scholar 

  54. Van Herrewege, A., Singelee, D., Verbauwhede, I.: Canauth-a simple, backward compatible broadcast authentication protocol for can bus. In: ECRYPT Workshop on Lightweight Cryptography, vol. 2011 (2011)

    Google Scholar 

  55. Wang, Q., Sawhney, S.: Vecure: a practical security framework to protect the can bus of vehicles. In: IEEE International Conference on IOT (2014)

    Google Scholar 

  56. Wolf, M., Weimerskirch, A., Paar, C.: Security in automotive bus systems. In: Workshop on Embedded Security in Cars (2004)

    Google Scholar 

  57. Woo, S., Jo, H.J., Lee, D.H.: A practical wireless attack on the connected car and security protocol for in-vehicle can. IEEE Trans. Intell. Transp. Syst. 16(2), 993–1006 (2014)

    Google Scholar 

  58. Woo, S., Moon, D., Youn, T.-Y., Lee, Y., Kim, Y.: Can ID shuffling technique (CIST): moving target defense strategy for protecting in-vehicle can. IEEE Access 7, 15521–15536 (2019)

    Article  Google Scholar 

  59. Wu, W., et al.: IDH-CAN: a hardware-based ID hopping can mechanism with enhanced security for automotive real-time applications. IEEE Access 6, 54607–54623 (2018)

    Article  Google Scholar 

  60. Ziermann, T., Wildermann, S., Teich, J.: Can+: a new backward-compatible controller area network (can) protocol with up to 16\(\times \) higher data rates. In: DATE. IEEE (2009)

    Google Scholar 

Download references

Acknowledgements

We would like to thank the anonymous reviewers for their constructive comments. Fengjun Li and Bo Luo were sponsored in part by NSF CNS-1422206, DGE-1565570, NSA Science of Security Initiative H98230-18-D-0009, and the Ripple University Blockchain Research Initiative. Jingqiang Lin was partially supported by National Natural Science Foundation of China (No. 61772518) and Cyber Security Program of National Key RD Plan of China (2017YFB0802100).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bo Luo .

Editor information

Editors and Affiliations

A Proof of Theorem 2

A Proof of Theorem 2

Theorem 2

Let \(I_{m}\) be the lowest arbitration ID accepted by DFA M, any (partial) ID output from M cannot win arbitration against a target ID \(I_t\) that has higher priority than \(I_m\) (i.e., \(I_t<I_m\)).

Proof

Assume that the adversary attempts to spoof arbitration ID \(I_s\) (\(I_s<I_t\)) to win against \(I_t\). Let Bit(Si) be the i-th bit of string S. If the longest common prefix of \(I_m\), \(I_s\), and \(I_t\) is an i-bit string P, then the first i bits of \(I_s\) would be accepted in M (since \(Prefix(I_s, i)=Prefix(I_m, i)\)) and sent to CAN accordingly. \(I_t\) and \(I_s\) would tie in the first i bits of arbitration (since \(Prefix(I_s, i)=Prefix(I_t, i)\)). At bit \(i+1\), we have the following three conditions:

  • If \(Bit(I_s, i+1)<Bit(I_m, i+1)\), \(I_s\) will be rejected by M, since: (1) \(I_s\) cannot be accepted by the DFA branch that contains \(I_m\), since \(Bit(I_s, i+1)\ne Bit(I_m, i+1)\); (2) if there exist another DFA branch (with ID \(I_n\)) that accepts \(Bit(I_s, i+1)\), then we have \(I_n<I_m\) (since they are identical in the first i bits and \(I_n<I_m\) at bit \(i+1\)). This violates our assumption that \(I_{m}\) be the lowest arbitration ID accepted by M. Therefore, such \(I_n\) and the corresponding DFA branch does not exist. \(I_s\) will be rejected by M, and \(I_t\) wins arbitration against \(I_s\).

  • If \(Bit(I_s, i+1)>Bit(I_m, i+1)\), then we have \(I_s>I_m\), since they are identical in the first i bits and \(I_s>I_m\) at bit \(i+1\). This violates our assumption that \(I_s<I_t<I_m\).

  • If \(Bit(I_s, i+1)=Bit(I_m, i+1)\), then \(Bit(I_s, i+1)\) will be sent to the bus. Meanwhile, we need \(Bit(I_s, i+1)\ne Bit(I_t, i+1)\), otherwise \(Prefix(I_s, i+1)\) is a longer common prefix than P. In case \(Bit(I_s, i+1)> Bit(I_t, i+1)\), \(I_s\) would lose arbitration against \(I_t\). In case \(Bit(I_s, i+1)<Bit(I_t, i+1)\), then we have \(I_m=I_s<I_t\). This violates our assumption that \(I_t<I_m\).

In summary, with the existence of M, any (partial) output generated by \(I_s<I_m\) cannot win arbitration against a higher priority ID \(I_t<I_m\).    \(\square \)

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Humayed, A., Li, F., Lin, J., Luo, B. (2020). CANSentry: Securing CAN-Based Cyber-Physical Systems against Denial and Spoofing Attacks. In: Chen, L., Li, N., Liang, K., Schneider, S. (eds) Computer Security – ESORICS 2020. ESORICS 2020. Lecture Notes in Computer Science(), vol 12308. Springer, Cham. https://doi.org/10.1007/978-3-030-58951-6_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-58951-6_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-58950-9

  • Online ISBN: 978-3-030-58951-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics