Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

CANOA: CAN Origin Authentication through Power Side-channel Monitoring

Published: 14 May 2024 Publication History

Abstract

The lack of any sender authentication mechanism in place makes Controller Area Network (CAN) vulnerable to security threats. For instance, an attacker can impersonate an Electronic Control Unit (ECU) on the bus and send spoofed messages unobtrusively with the identifier of the impersonated ECU. To address this problem, we propose a novel source authentication technique that uses power consumption measurements of the ECU to authenticate the source of a message. A transmission of an ECU affects the power consumption and a characteristic pattern will appear. Our technique exploits the power consumption of each ECU during the transmission of a message to determine whether the message actually originated from the purported sender. We evaluate our approach in both a lab setup and a real vehicle. We also evaluate our approach against factors that can impact the power consumption measurement of the ECUs. The results of the evaluation show that the proposed technique is applicable in a broad range of operating conditions with reasonable computational power requirements and attaining good accuracy.
Appendix

A CANOA Evaluatoin in Real-vehicle with Multiple ECUs

We evaluate our approach in a truck with access to the power source of more than one ECU. We were able to capture power consumption measurements from the Engine (ECM), the Transmission (TCM), and the brake (ABS) from a truck parked in the open for a period of 24 hours. We also obtained the mapping between the ECUs and source address using hardware configuration: (ECU, 0), (TCM, 11), and (ABS, 3). For the evaluation, we captured a total of 100k CAN transmissions from the vehicle in a stationary position. The only difference observed in the power consumption measurements of the stationary vehicle from the moving vehicle is the change in the noise floor, which the model learned to ignore over training iterations. Out of the 100k transmissions, 35k transmissions each triggered from the Engine and ABS, and the remaining 30k from the Transmission. Using the same technique described in the data description of the evaluation section, we constructed 100k instances of power traces of transmission and non-transmission for all the three ECUs. For the Engine and ABS, 35k transmissions belong to the periods of transmissions with source address 0, which are triggered by Engine, and the remaining belong to the period of non-transmission. Similarly, for Transmission, 30k power traces belong to the periods of transmissions with source address 11 and the remaining to the periods of non-transmission. For the ABS, 35 k transmissions were triggered with source address three and form the features of transmission, and the remaining belong to the period of non-transmissions. We split the labeled power traces of the ECUs randomly into three chunks: train, cross-validate, and test at a ratio of 6:3:1, and a random forest-based classifier for each of the ECUs. Figure 10 shows the pictorial representation of the kernel density estimate of the five modes of the statistics of the power traces of transmissions from the three ECUs. The density estimates indicate their distinct characteristics.
Fig. 10.
Fig. 10. Statistical analysis of the ECUs power-traces corresponding to the periods of transmissions from the Engine (ECM, 0), anti-lock break system (ABS, 3), and transmission (TCM, 11) mapped with their corresponding source addresses.
We evaluated the trained models using the test set of transmissions. For each test transmission, we looked up the power trace for each of the ECUs and obtained the model’s classification score. We use the classification scores to fill a matrix, where the number of rows is the number of the test set of transmissions, and the number of columns is the number of ECUs and source address mappings available for the vehicle. The rows for every transmission are filled with the highest scores of the probability of transmissions obtained from each of the three models. We use this matrix to calculate a confusion matrix, as shown in Table 8 for the sender authentication from the model for (ECU, 0), (TCM, 11), and (ABS, 3). Our method detects 99% of transmissions each from ECM and ABS, and 94% of transmissions from TCM. The observed drop in the accuracy of the (TCM,11) was found to be associated with the presence of noise in the captured power traces. However, we observed that the noise floor is reduced if the model is trained over a longer duration. This way, the model will be able to capture the subtle variations that were left untracked with the training over a shorter duration. We also observed the response time of the models in the online setting (real-time \(E_{p}\) authentication using the stream of transmissions observed on the bus), and it is noted to be an average of 0.8 ms, which makes the technique feasible for application in real-time settings.
Table 8.
 (ECM, 0)(TCM, 11)(ABS, 3)
(ECM, 0)\({\bf 0.99} \pm {\bf 0.001}\)\(0.01 \pm 0.05\)\(0.00 \pm 0.001\)
(TCM, 11)\(0.06 \pm 0.3\)\({\bf 0.94} \pm {\bf 0.01}\)\(0.00 \pm 0.1\)
(ABS, 3)\(0.00 \pm 0.05\)\(0.00 \pm 0.4\)\({\bf 0.99} \pm {\bf 0.3}\)
Table 8. Confusion Matrix Obtained Using Mahalanobis Distance-based Sender Classification in a Real Vehicle

A.1 CANOA Evaluation with No Prior Knowledge of Source Address and ECU Mapping

An ECU can send messages with many source addresses (or IDs). In an authentic (non-attack scenario), an ECU can send messages with a set of source addresses (or IDs), which do not overlap with that of the other ECUs on the bus. That is, in properly configured hardware, a source address is unique to an ECU. However, in the case of malformed hardware, messages with the same source address may be observed from multiple ECUs, and is not a reliable source of information for locating the source of transmission. Therefore, to evaluate our approach, we use the mapping between all the combinations of ECUs and source addresses that are available on the bus. In our case, we obtained the combinations using all the source addresses on the bus and the ECUs — ECM, TCM, and ABS, for which we could capture the power source. That is, we prepared training sets of labeled power traces for the following combinations of source addresses and ECUs: (ECU, 0), (ECU, 3), (ECU, 11), (TCM, 11), (TCM, 0), (TCM, 3), (ABS, 3), (ABS, 0), and (ABS, 11). Figure 11 shows a pictorial representation of the kernel density estimate of the five modes of the statistics of the power traces of transmissions. The power traces are categorized according to the source address of the transmissions. The subtle distinction between the modes across the source addresses aids the models in learning to distinguish between the two states.
Fig. 11.
Fig. 11. Statistical analysis of the ECUs power-traces corresponding to the periods of transmissions for all the combination of ECUs and source addresses on the CAN bus.
Later, during testing, for every transmission, we looked up the power trace corresponding to the ECUs and queried the models for transmission scores. As per the CAN protocol, only one ECU transmits at a time. Therefore, the model whose estimate of transmission characteristics is closest to that of the new transmission is the most likely source of the transmission. Finally, we condensed the vector of scores obtained from the models into a single score by applying softmax on the vector, and returning the model with the highest probability score of transmission as the predicted source of transmission. Based on our analysis, we found that 97.8% of transmissions from the Engine were correctly detected, 98% of transmissions from ABs were detected, and 95.5% from the Transmission. Most of the false positives were observed due to the confusion between the models from the same ECU but with different address, which will improve with large training traces.

A.2 Model Convergence

We evaluate the convergence of the trained models for each ECU and source address mapping by plotting the models’ learning curves. The learning curve shows the loss (inversely proportional to the accuracy) of a model during training over many iterations. A model is said to have converged if the loss decreases at first over the iterations and then asymptotically approaches a minimum such that training any further has a negligible improvement on the performance of the model. In particular, we evaluate the learning curve of all the models with the source addresses 0, 11, and 3 from real-vehicle settings. From Figure 12, it is evident that the models begin to converge after 500 iterations across all the source addresses. In particular, the learning curve for source addresses 0 and 11 has a steep curve. This is also reflective in the accuracy of the corresponding model from the confusion matrix, which reports 99% of the correct classifications. From the figure, we notice that models trained with more instances of the input power traces can minimize their loss and performs better at correctly determining the states of ECUs from unseen noisy input power traces.
Fig. 12.
Fig. 12. Plots showing the learning curves of the models for sender state (transmitting/not transmitting) classification with source address 0, 11, and 3.

References

[1]
Shabbir Ahmed, Marcio Juliato, Christopher Gutierrez, and Manoj Sastry. 2021. Two-point voltage fingerprinting: Increasing detectability of ECU masquerading attacks. CoRR abs/2102.10128 (2021). https://arxiv.org/abs/2102.10128.
[2]
Eli Biham, Sara Bitan, and Eli Gavril. 2018. TCAN: Authentication without cryptography on a CAN bus based on nodes location on the bus. In Proceedings of the 16th ESCAR Europe (ESCAR’18).
[3]
Georgi Boshnakov. 2001. Fourier Analysis of Time Series: An Introduction by P. Bloomfield. Journal of the Royal Statistical Society 50 (2001). DOI:
[4]
Bosch Robert GmbH. 1991. CAN Specification V2.0. Technical report D-7000 Stuttgart 1, Bosch.
[5]
Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl Koscher, Alexei Czeskis, Franziska Roesner, and Tadayoshi Kohno. 2011. Comprehensive experimental analyses of automotive attack surfaces. In Proceedings of the 20th USENIX Conference on Security. USENIX Association, 6.
[6]
Kyong-Tak Cho and Kang G. Shin. 2017. Viden: Attacker identification on in-vehicle networks. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS’17). Association for Computing Machinery, 1109–1123.
[7]
Kyong-Tak Cho and Kang G. Shin. 2016. Fingerprinting electronic control units for vehicle intrusion detection. In Proceedings of the 25th USENIX Security Symposium.
[8]
Wonsuk Choi, Hyo Jin Jo, Samuel Woo, Ji Young Chun, Jooyoung Park, and Dong Hoon Lee. 2016. Identifying ECUs using inimitable characteristics of signals in controller area networks.
[9]
Shane S. Clark, Benjamin Ransford, Amir Rahmati, Shane Guineau, Jacob Sorber, Wenyuan Xu, and Kevin Fu. 2013. WattsUpDoc: Power side channels to nonintrusively discover untargeted malware on embedded medical devices. In Proceedings of the USENIX Workshop on Health Information Technologies.
[10]
Thomas Eisenbarth, Christof Paar, and Björn Weghenkel. 2010. Building a Side Channel Based Disassembler. Springer, Berlin.
[11]
Toni Giorgino. 2009. Computing and visualizing dynamic time warping alignments in R: The dtw package. J. Stat. Softw. 31, 7 (2009), 1–24.
[12]
Bogdan Groza and Stefan Murvay. 2013. Efficient protocols for secure broadcast in controller area networks. IEEE Trans. Industr. Inf. (2013).
[13]
M. R. Guthaus, J. S. Ringenberg, D. Ernst, T. M. Austin, T. Mudge, and R. B. Brown. 2001. MiBench: A free, commercially representative embedded benchmark suite. In Proceedings of the IEEE International Workshop on Workload Characterization (WWC-4’01).
[14]
Can Bus Hack. 2021. Retrieved from http://canbushack.com.
[15]
Trevor Hastie, Robert Tibshirani, and Jerome Friedman. 2001. The Elements of Statistical Learning. Springer New York Inc., New York, NY.
[16]
Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. 2016. Deep residual learning for image recognition. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR’16). 770–778. DOI:
[17]
Rob Hyndman, Anne Koehler, Keith Ord, and Ralph Snyder. 2008. Forecasting with exponential smoothing. DOI:
[18]
International Organization for Standardization. 2018. International Standard ISO-26262–Road Vehicles Functional Safety.
[19]
Marcel Kneib and Christopher Huth. 2018. Scission: Signal characteristic-based sender identification and intrusion detection in automotive networks. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security.
[20]
Paul C. Kocher, Joshua Jaffe, and Benjamin Jun. 1999. Differential power analysis. In Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptolog (CRYPTO’99). 388–397.
[21]
Karl Koscher, Alexei Czeskis, Franziska Roesner, Shwetak Patel, Tadayoshi Kohno, Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, and Stefan Savage. 2010. Experimental security analysis of a modern automobile. In Proceedings of the IEEE Symposium on Security and Privacy.
[22]
Karl Koscher, Tadayoshi Kohno, and David Molnar. 2015. SURROGATES: Enabling near-real-time dynamic analyses of embedded systems. In Proceedings of the 9th USENIX Workshop on Offensive Technologies (WOOT’15).
[23]
Yann LeCun, Yoshua Bengio, and Geoffrey Hinton. 2015. Deep learning. Nature (2015).
[24]
Vuk Lesi, Ilija Jovanov, and Miroslav Pajic. 2020. Integrating security in resource constrained cyber-physical systems. ACM Trans. Cyber-Phys. Syst. (2020).
[25]
Chung-Wei Lin and Alberto Sangiovanni-Vincentelli. 2012. Cyber-security for the controller area network (CAN) communication protocol. In(CYBERSECURITY’12).
[26]
Nathan Liu, Carlos Moreno, Murray Dunne, and Sebastian Fischmeister. 2021. vProfile: Voltage-based anomaly detection in controller area networks. In Proceedings of the Design, Automation and Test in Europe Conference(DATE’21).
[27]
Liu et al.2016. On code execution tracking via power side-channel. In Proceedings of the ACM Conference on Computer and Communications Security. ACM.
[28]
A. Martino, A. Ghiglietti, F. Ieva, and A. M. Paganoni. 2019. A k-means procedure based on a Mahalanobis type distance for clustering multivariate functional data.Stat. Methods Appl. (2019).
[29]
Charlie Miller and Chris Valasek. 2015. Remote exploitation of an unaltered passenger vehicle.
[30]
Charlie Miller and Chris Valasek. 2016. Advanced CAN injection techniques for vehicle networks.
[31]
D. C. Montgomery. 2008. Design and Analysis of Experiments. John Wiley & Sons.
[32]
Carlos Moreno and Sebastian Fischmeister. 2017. On the security of safety-critical embedded systems: Who watches the watchers? Who reprograms the watchers? In Proceedings of the 3rd International Conference on Information Systems Security and Privacy (ICISSP’17).
[33]
Carlos Moreno and Sebastian Fischmeister. 2019. Sender authentication for automotive in-vehicle networks through dual analog measurements to determine the location of the transmitter. In Proceedings of the 5th International Conference on Information Systems Security and Privacy (ICISSP’19).
[34]
Carlos Moreno, Sebastian Fischmeister, and M. Anwar Hasan. 2013. Non-intrusive program tracing and debugging of deployed embedded systems through side-channel analysis. In Conference on Languages, Compilers and Tools for Embedded Systems (2013).
[35]
Mehari Msgna, Konstantinos Markantonakis, and Keith Mayes. 2013. The B-side of side channel leakage: Control flow security in embedded systems. In Proceedings of the International Conference on Security and Privacy in Communication Systems.
[36]
P.-S. Murvay and Bogdan Groza. 2014. Source identification using signal characteristics in controller area networks. Sign. Process. Lett. (2014).
[37]
Foster J. Provost, Tom Fawcett, and Ron Kohavi. 1998. The case against accuracy estimation for comparing induction algorithms. InProceedings of the International Conference on Machine Learning (ICML’98).
[38]
Sang Uk Sagong, Xuhang Ying, Andrew Clark, Linda Bushnell, and Radha Poovendran. 2018. Cloaking the clock: Emulating clock skew in controller area networks. In Proceedings of the 9th ACM/IEEE International Conference on Cyber-Physical Systems.
[39]
Sang Uk Sagong, Xuhang Ying, Radha Poovendran, and Linda Bushnell. 2018. Exploring attack surfaces of voltage-based intrusion detection systems in controller area networks. In Proceedings of the 16th ESCAR Europe (ESCAR’18).
[40]
Stan Salvador and Philip Chan. 2004. FastDTW: Toward accurate dynamic time warping in linear time and space. In Proceedings of the KDD Workshop on Mining Temporal and Sequential Data.
[41]
Xiang Shiming, Feiping Nie, and Changshui Zhang. 2008. Learning a mahalanobis distance metric for data clustering and classification.Pattern Recogn. (2008).
[42]
Kvaser CAN tool. 2021. Retrieved from https://www.kvaser.com.
[43]
Anthony Van Herrewege, Dave Singelée, and Ingrid Verbauwhede. 2011. CANAuth—A simple, backward compatible broadcast authentication protocol for CAN bus. 1, 7 (2011).
[44]
Car Hacking Village. 2021. Retrieved from https://carhackingvillage.com.

Cited By

View all
  • (2023)Design and Experimental Assessment of Real-Time Anomaly Detection Techniques for Automotive CybersecuritySensors10.3390/s2322923123:22(9231)Online publication date: 16-Nov-2023
  • (2023)MAD: One-Shot Machine Activity Detector for Physics-Based Cyber Security2023 IEEE 23rd International Conference on Software Quality, Reliability, and Security (QRS)10.1109/QRS60937.2023.00072(684-695)Online publication date: 22-Oct-2023

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Cyber-Physical Systems
ACM Transactions on Cyber-Physical Systems  Volume 8, Issue 2
April 2024
342 pages
EISSN:2378-9638
DOI:10.1145/3613588
  • Editor:
  • Chenyang Lu
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Journal Family

Publication History

Published: 14 May 2024
Online AM: 18 November 2022
Accepted: 29 October 2022
Revised: 12 September 2022
Received: 09 June 2021
Published in TCPS Volume 8, Issue 2

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Automotive security
  2. CAN
  3. transmissions
  4. authentication

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)119
  • Downloads (Last 6 weeks)19
Reflects downloads up to 09 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2023)Design and Experimental Assessment of Real-Time Anomaly Detection Techniques for Automotive CybersecuritySensors10.3390/s2322923123:22(9231)Online publication date: 16-Nov-2023
  • (2023)MAD: One-Shot Machine Activity Detector for Physics-Based Cyber Security2023 IEEE 23rd International Conference on Software Quality, Reliability, and Security (QRS)10.1109/QRS60937.2023.00072(684-695)Online publication date: 22-Oct-2023

View Options

Get Access

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Full Text

View this article in Full Text.

Full Text

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media