Skip to main content

A Manipulated Overlapped Voltage Attack Detection Mechanism for Voltage-Based Vehicle Intrusion Detection System

  • Conference paper
  • First Online:
Frontiers in Cyber Security (FCS 2022)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1726))

Included in the following conference series:

  • 646 Accesses

Abstract

To evade being detected by the content-based or frequency-based IDS, the attack model in the automotive CAN has shifted from the traditional packet flooding and payload modification attacks to stealth attacks such as shutdown attacks. These new types of stealth attacks are difficult to be effectively detected by content-based IDS and frequency-based IDS. The CAN bus physical voltage-based IDS can identify the source of each message and detect these stealth attacks effectively. However, the state of art research has discovered a novel masquerade attack called DUET, which can tamper with the existing voltage-based IDS by generating overlapping voltage signals with an accomplice to distort the fingerprint of the specified ECU. We propose a detection mechanism to prevent the manipulated voltage attacks of overlapping voltage signal samples, which is based on anomaly detection by applying the LSTM autoencoder model. By filtering the overlapped signal and rectifying the voltage fingerprint instance of the original voltage signal, the improved voltage-based IDS can effectively resist the DUET attack. Experiments demonstrated the proposed detection mechanism can authenticate the victim ECU and the accomplice ECU before and after the DUET two-stage attack, and prevent the receiver ECU from being deceived by the forged messages generated by the attacker and accomplice ECUs.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Jo, H.J., Choi, W.: A survey of attacks on controller area networks and corresponding countermeasures. IEEE Trans. Intell. Transp. Syst. 99, 1–19 (2021)

    Google Scholar 

  2. Bhatia, R., Kumar, V., Serag, K., Celik, Z.B., Payer, M., Xu, D.: Evading voltage-based intrusion detection on automotive CAN. In: Proceedings of the Network and Distributed System Security Symposium, San Diego, CA, USA, pp. 1–17 (2021)

    Google Scholar 

  3. Murvay, P.S., Groza, B.: Source identification using signal characteristics in controller area networks. IEEE Signal Process. Lett. 21(4), 395–399 (2014)

    Article  Google Scholar 

  4. Cho, K.T., Kang, S.: Viden: attacker identification on in-vehicle networks. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 1109–1123 (2017)

    Google Scholar 

  5. Choi, W., Jo, H.J., Woo, S., Chun, J.Y., Park, J., Lee, D.H.: Identifying ecus using inimitable characteristics of signals in controller area networks. IEEE Trans. Veh. Technol. 67(6), 4757–4770 (2018)

    Article  Google Scholar 

  6. Choi, W., Joo, K., Jo, H.J., Park, M.C., Lee, D.H.: Voltageids: low-level communication characteristics for automotive intrusion detection system. IEEE Trans. Inf. Forensics Secur. 13(8), 2114–2129 (2018)

    Article  Google Scholar 

  7. Kneib, M., Huth, C.: Scission: signal characteristic-based sender identification and intrusion detection in automotive networks. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 787–800 (2018)

    Google Scholar 

  8. Kneib, M., Schell, O., Huth, C.: On the robustness of signal characteristic-based sender identification (2019). arXiv:1911.09881

  9. Foruhandeh, M., Man, Y., Gerdes, R., Li, M., Chantem, T.: Simple: Single-frame based physical layer identification for intrusion detection and prevention on in-vehicle networks. In: Proceedings of the 35th Annual Computer Security Applications Conference, pp. 229–244 (2019)

    Google Scholar 

  10. Rumez, M., et al.: Can radar: sensing physical devices in can networks based on time domain reflectometry. In: 2019 IEEE Vehicular Networking Conference (VNC), pp. 1–8. IEEE (2019)

    Google Scholar 

  11. Xu, T., Lu, X., Xiao, L., Tang, Y., Dai, H.: Voltage based authentication for controller area networks with reinforcement learning. In: ICC 2019–2019 IEEE International Conference on Communications (ICC), pp. 1–5. IEEE (2019)

    Google Scholar 

  12. Yang, Y., Duan, Z., Tehranipoor, M.: Identify a spoofing attack on an in-vehicle can bus based on the deep features of an ECU fingerprint signal. Smart Cities 3(1), 17–30 (2020)

    Article  Google Scholar 

  13. Hafeez, A., Topolovec, K., Awad, S.: Ecu fingerprinting through parametric signal modeling and artificial neural networks for in-vehicle security against spoofing attacks. In: 2019 15th International Computer Engineering Conference (ICENCO), pp. 29–38. IEEE (2019)

    Google Scholar 

  14. Levy, E., Shabtai, A., et al.: CAN-LOC: Spoofing Detection and Physical Intrusion Localization on an In-Vehicle CAN Bus Based on Deep Features of Voltage Signals (2021)

    Google Scholar 

  15. Marchetti, M., Stabili, D.: Anomaly detection of CAN bus messages through analysis of ID sequences. In: 2017 IEEE Intelligent Vehicles Symposium (IV). IEEE (2017)

    Google Scholar 

  16. Taylor, A., Japkowicz, N., Leblanc, S.: Frequency-based anomaly detection for the automotive CAN bus. In: 2015 World Congress on Industrial Control Systems Security (WCICSS). IEEE (2015)

    Google Scholar 

  17. Zhou, J., et al.: Btmonitor: bit-time-based intrusion detection and attacker identification in controller area network. ACM Trans. Embedded Comput. Syst. 18(6), 1–23 (2020)

    Article  Google Scholar 

  18. Zhou, J., et al.: Clock-based sender identification and attack detection for automotive CAN network. IEEE Access 99, 2665–2679 (2020)

    Google Scholar 

  19. Shin, K.G., Cho, K.T.: Fingerprinting Electronic Control Units For Vehicle Intrusion Detection. US20170286675 (2017)

    Google Scholar 

Download references

Acknowledgements

This research was funded in part by the National Natural Science Foundation of China under grants 61872069, 62072090 and 62173101, and in part by the Fundamental Research Funds for the Central Universities under grant N2017012 and N2217009.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jian Xu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yin, L., Xu, J., Chai, H., Wang, C. (2022). A Manipulated Overlapped Voltage Attack Detection Mechanism for Voltage-Based Vehicle Intrusion Detection System. In: Ahene, E., Li, F. (eds) Frontiers in Cyber Security. FCS 2022. Communications in Computer and Information Science, vol 1726. Springer, Singapore. https://doi.org/10.1007/978-981-19-8445-7_26

Download citation

  • DOI: https://doi.org/10.1007/978-981-19-8445-7_26

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-19-8444-0

  • Online ISBN: 978-981-19-8445-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics