F. Noori, Azeem Hafeez, H. Malik, Md. Zia Uddin, J. Tørresen
{"title":"Source Linking Framework in Vehicular Networks for Security of Electric Vehicles using Machine Learning","authors":"F. Noori, Azeem Hafeez, H. Malik, Md. Zia Uddin, J. Tørresen","doi":"10.1109/VNC57357.2023.10136272","DOIUrl":null,"url":null,"abstract":"Fully connected autonomous vehicles are more vulnerable than ever to hacking and data theft. The controller area network (CAN) protocol is an effective means of communication between in-vehicle control networks. However, the absence of basic security features of this protocol, like message authentication, makes it quite vulnerable to a wide range of attacks, including spoofing attacks. As traditional cybersecurity methods impose limitations in ensuring the confidentiality and integrity of transmitted messages via CAN bus, a new technique has emerged among others to approve its reliability in fully authenticating in-vehicle communication messages. At the physical layer of the communication system, the method of fingerprinting the messages is being implemented to connect the received signal to the transmitting Engine Control Unit (ECU). This paper introduces a new method to enhance the security of modern, fully autonomous electric vehicles. Errors due to digital to-analog converter (DAC) are used to estimate ECU-specific distortion distributions, which are utilized for transmitting node identification. A dataset collected from a CAN network with seven ECUs is used to evaluate the efficient performance of the suggested method. The experimental results indicate that kNNs achieved 99.2% accuracy in ECU detection and outperformed the rest of the classifiers.","PeriodicalId":185840,"journal":{"name":"2023 IEEE Vehicular Networking Conference (VNC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 IEEE Vehicular Networking Conference (VNC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/VNC57357.2023.10136272","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Fully connected autonomous vehicles are more vulnerable than ever to hacking and data theft. The controller area network (CAN) protocol is an effective means of communication between in-vehicle control networks. However, the absence of basic security features of this protocol, like message authentication, makes it quite vulnerable to a wide range of attacks, including spoofing attacks. As traditional cybersecurity methods impose limitations in ensuring the confidentiality and integrity of transmitted messages via CAN bus, a new technique has emerged among others to approve its reliability in fully authenticating in-vehicle communication messages. At the physical layer of the communication system, the method of fingerprinting the messages is being implemented to connect the received signal to the transmitting Engine Control Unit (ECU). This paper introduces a new method to enhance the security of modern, fully autonomous electric vehicles. Errors due to digital to-analog converter (DAC) are used to estimate ECU-specific distortion distributions, which are utilized for transmitting node identification. A dataset collected from a CAN network with seven ECUs is used to evaluate the efficient performance of the suggested method. The experimental results indicate that kNNs achieved 99.2% accuracy in ECU detection and outperformed the rest of the classifiers.