Skip to main content

A Statistical-Based Anomaly Detection Method for Connected Cars in Internet of Things Environment

  • Conference paper
  • First Online:
Book cover Internet of Vehicles - Safe and Intelligent Mobility (IOV 2015)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 9502))

Included in the following conference series:

Abstract

A connected car is the most successful thing in the era of Internet of Things (IoT). The connections between vehicles and networks grow and provide more convenience to users. However, vehicles become exposed to malicious attacks from outside. Therefore, a connected car now needs strong safeguard to protect malicious attacks that can cause security and safety problems at the same time. In this paper, we proposed a method to detect the anomalous status of vehicles. We extracted the in-vehicle traffic data from the well-known commercial car and performed the one-way ANOVA test. As a result, our statistical-based detection method can distinguish the abnormal status of the connected cars in IoT environment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    http://www.carbigs.com.

  2. 2.

    Engine-related = Intake air pressure (kPa) \(+\) Calculated load value (%) \(+\) Engine torque \(+\) Accelerator position (%) \(+\) Flywheel torque (Nm) \(+\) Fuel consumption (mcc).

References

  1. Seo, S.H., Lee, S.W., Hwang, S.H., Jeon, J.W.: Development of network gateway between CAN and FlexRay protocols for ECU embedded systems. In: International Joint Conference SICE-ICASE, pp. 2256–2261. IEEE (2006)

    Google Scholar 

  2. Kleberger, P., Olovsson, T., Jonsson, E.: Security aspects of the in-vehicle network in the connected car. In: 2011 IEEE Intelligent Vehicles Symposium (IV), pp. 528–533. IEEE (2011)

    Google Scholar 

  3. Koscher, K., Czeskis, A., Roesner, F., Patel, S., Kohno, T., Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S.: Experimental security analysis of a modern automobile. In: IEEE Symposium on Security and Privacy (SP), pp. 447–462. IEEE (2010)

    Google Scholar 

  4. Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S., Koscher, K., Czeskis, A., Roesner, F., Patel, S., Kohno, T.: Comprehensive experimental analyses of automotive attack surfaces. In: USENIX Security Symposium (2011)

    Google Scholar 

  5. Kolios, P., Panayiotou, C., Ellinas, G.: ExTraCT: expediting offloading transfers through intervehicle communication transmissions. IEEE Trans. Intell. Transp. Syst. 16, 1238–1248 (2014)

    Article  Google Scholar 

  6. Henniger, O., Ruddle, A., Seudi, H., Weyl, B., Wolf, M., Wollinger, T.: Securing vehicular on-board IT systems: The EVITA project. In: VDI/VW Automotive Security Conference (2009)

    Google Scholar 

  7. Car-hacking: Remote access and other security issues - Computerworld (2012)

    Google Scholar 

  8. Hack the diagnostics connector, steal yourself a BMW in 3 minutes - Extreme Tech (2012)

    Google Scholar 

  9. Miller, C., Valasek, C.: Adventures in automotive networks and control units. In: DEF CON 21 Hacking Conference. Las Vegas, NV: DEFCON (2013)

    Google Scholar 

  10. Oka, D.K., Furue, T., Langenhop, L., Nishimura, T.: Survey of vehicle IoT bluetooth devices. In: IEEE 7th International Conference on Service-Oriented Computing and Applications (SOCA), pp. 260–264. IEEE (2014)

    Google Scholar 

  11. Miller, C., Valasek, C.: A survey of remote automotive attack surfaces. Black Hat USA (2014)

    Google Scholar 

  12. Poulsen, K.: Hacker disables more than 100 cars remotely. Internet (2010). http://www.wired.com/threatlevel/2010/03/hacker-bricks-cars

  13. Hackers steal Subaru Outback with smartphone, USA Today (2011)

    Google Scholar 

  14. Hack of telematics device lets attackers, Car Driver (2011)

    Google Scholar 

  15. Strobel, D., Driessen, B., Kasper, T., Leander, G., Oswald, D., Schellenberg, F., Paar, C.: Fuming acid and cryptanalysis: handy tools for overcoming a digital locking and access control system. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part I. LNCS, vol. 8042, pp. 147–164. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  16. 7 On Your Side: How cars can get hacked, ABC7news (2013)

    Google Scholar 

  17. Verdult, R., Garcia, F.D., Balasch, J.: Gone in 360 seconds: Hijacking with Hitag2. In: Proceedings of the 21st USENIX Conference on Security Symposium, pp. 37–37. USENIX Association (2012)

    Google Scholar 

  18. Roufa, I., Miller, R., Mustafaa, H., Taylora, T., Oh, S., Xua, W., Gruteserb, M., Trappeb, W., Seskarb, I.: Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study. In: 19th USENIX Security Symposium, Washington DC, pp. 11–13. (2010)

    Google Scholar 

  19. Larson, U.E., Nilsson, D.K., Jonsson, E.: An approach to specification-based attack detection for in-vehicle networks. In: 2008 IEEE Intelligent Vehicles Symposium, pp. 220–225. IEEE (2008)

    Google Scholar 

  20. Hoppe, T., Kiltz, S., Dittmann, J.: Applying intrusion detection to automotive IT-early insights and remaining challenges. J. Inf. Assur. Secur. (JIAS) 4, 226–235 (2009)

    Google Scholar 

  21. OBD-II scan program, The Carbigs program supports the safety diagnosis and the driving record for all of the type of car of Hyundai-Kia Motor Group produced since (2004)

    Google Scholar 

Download references

Acknowledgments

This work was supported by Samsung Research Funding Center of Samsung Electronics under Project Number SRFC-TB1403-00.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Huy Kang Kim .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Han, M.L., Lee, J., Kang, A.R., Kang, S., Park, J.K., Kim, H.K. (2015). A Statistical-Based Anomaly Detection Method for Connected Cars in Internet of Things Environment. In: Hsu, CH., Xia, F., Liu, X., Wang, S. (eds) Internet of Vehicles - Safe and Intelligent Mobility. IOV 2015. Lecture Notes in Computer Science(), vol 9502. Springer, Cham. https://doi.org/10.1007/978-3-319-27293-1_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-27293-1_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-27292-4

  • Online ISBN: 978-3-319-27293-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics