An Intrusion Detection System in Connected Vehicles

An Intrusion Detection System in Connected Vehicles

electronics Article Cybersecurity in Automotive: An Intrusion Detection System in Connected Vehicles Francesco Pascale 1,* , Ennio Andrea Adinolfi 2 , Simone Coppola 2 and Emanuele Santonicola 2 1 Department of Energy, Polytechnic of Milan, 20156 Milan, Italy 2 Department of Industrial Engineering, University of Salerno, 84084 Fisciano, Italy; eadinolfi@unisa.it (E.A.A.); [email protected] (S.C.); [email protected] (E.S.) * Correspondence: [email protected] Abstract: Today’s modern vehicles are connected to a network and are considered smart objects of IoT, thanks to the capability to send and receive data from the network. One of the greatest challenges in the automotive sector is to make the vehicle secure and reliable. In fact, there are more connected instruments on a vehicle, such as the infotainment system and/or data interchange systems. Indeed, with the advent of new paradigms, such as Smart City and Smart Road, the vision of Internet of Things has evolved substantially. Today, we talk about the V2X systems in which the vehicle is strongly connected with the rest of the world. In this scenario, the main aim of all connected vehicles vendors is to provide a secure system to guarantee the safety of the drive and persons against a possible cyber-attack. So, in this paper, an embedded Intrusion Detection System (IDS) for the automotive sector is introduced. It works by adopting a two-step algorithm that provides detection of a possible cyber-attack. In the first step, the methodology provides a filter of all the messages on the Controller Area Network (CAN-Bus) thanks to the use of a spatial and temporal Citation: Pascale, F.; Adinolfi, E.A.; analysis; if a set of messages are possibly malicious, these are analyzed by a Bayesian network, which Coppola, S.; Santonicola, E. gives the probability that a given event can be classified as an attack. To evaluate the efficiency and Cybersecurity in Automotive: An effectiveness of our method, an experimental campaign was conducted to evaluate them, according to Intrusion Detection System in the classic evaluation parameters for a test’s accuracy. These results were compared with a common Connected Vehicles. Electronics 2021, data set on cyber-attacks present in the literature. The first experimental results, obtained in a test 10, 1765. https://doi.org/10.3390/ scenario, seem to be interesting. The results show that our method has good correspondence in electronics10151765 the presence of the most common cyber-attacks (DDoS, Fuzzy, Impersonating), obtaining a good score relative to the classic evaluation parameters for a test’s accuracy. These results have decreased Academic Editor: performance when we test the system on a Free State Attack. Krzysztof Szczypiorski Received: 18 June 2021 Keywords: cybersecurity; automotive; Bayesian network; intrusion detection system; CAN-bus; Accepted: 21 July 2021 Internet of Things; embedded systems Published: 23 July 2021 Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in 1. Introduction published maps and institutional affil- Modern vehicles are considered smart objects of an IoT ecosystem [1]. Automated iations. and connected vehicles have a complex architecture, as they integrate multiple automated driving functions and a wide variety of communication interfaces [2,3]. An external attack can compromise these functions, not only endangering the safety of motorists, but can have repercussions in the privacy, financial and operational aspects of companies and Copyright: © 2021 by the authors. passengers. Consequently, increased vehicle connectivity increases the potential risk of Licensee MDPI, Basel, Switzerland. cyber-attacks [4]. This article is an open access article To integrate a safety assessment into connected and automated vehicle prototypes, it is distributed under the terms and necessary to ensure that threats to the security and privacy of drivers, business models and conditions of the Creative Commons the operator’s intellectual property are well countered [5–7]. An IoT security assessment of Attribution (CC BY) license (https:// automated vehicles allows manufacturers to do the following: creativecommons.org/licenses/by/ 4.0/). Electronics 2021, 10, 1765. https://doi.org/10.3390/electronics10151765 https://www.mdpi.com/journal/electronics Electronics 2021, 10, 1765 2 of 16 • Strengthen interest in automated vehicles, demonstrating that security risks have been mitigated, the concept of cyber security has been validated and verified, and systems have been systematically tested. • Protect motorists and manufacturers by ensuring that cybersecurity threats are han- dled following state-of-the-art standards and best practices. • Develop safe and state-of-the-art AV technologies by ensuring that the automated guidance systems adopted are developed with security-by-design and defense-in- depth in mind. • Gain a competitive advantage by collaborating with international experts who have up- to-date knowledge on information security, vulnerabilities, and applicable standards. Today, after various attempts to analyze the problem and find a remedy, the ISO 21434 standard has been introduced: this new standard represents an effort aimed at strengthening the culture and presence of cybersecurity within companies involved in automotive product development. It also integrates the cybersecurity process into existing safety processes, especially in the impact assessment and software development process. ISO 21434 sets the clear objective of ensuring that all major players in the automotive sector, be they vehicle manufacturers (so-called OEMs) or component suppliers (so-called TIERs), are aware of the importance of cybersecurity in the development process of products, creating what is called the “security by design” approach [8]. Taking into account the issues outlined above, a framework aimed at cybersecurity should, therefore, foresee different aspects of the life cycle of a connected vehicle, focusing in particular on the following [9,10]: • Continuous vulnerability management: defining authorized channels for firmware and application updates that restrict the perimeter of attack. • Security maintainability: if we want to refer, for example, to the cryptographic protec- tion of data, it is unlikely that the keys and algorithms adopted in the initial phase will guarantee the same level of protection over time. For this reason, Security-by-design must be associated with a modular development approach that allows the creation of products capable of adapting to emerging threats. • Cybersecurity evolution: from this point of view, it is useful to refer to the experi- ence gained by the aeronautical industry, where the use of partitioned embedded systems and domain segregation have made it possible to achieve particularly high security standards. • The definition of a chain-of-trust, from the prototyping of the individual components of a vehicle, and the system that drives it, to the cloud infrastructure used for data exchange and communications. Solutions based on distributed technologies and blockchain can provide a fundamental contribution in the certification of the phases that participate in the production chain and in the dynamics of the supply chain. • The implementation of interfaces dedicated to the sector that refer to specialized security policies. The need to develop such countermeasures is accentuated by the frequent use of technologies borrowed from other sectors, such as OTA and blue- tooth connections. In this work, it is proposed an intrusion detection system capable of analyzing traffic over the CAN-Bus and of understanding whether the messages that transmit over the communication channel are malicious or not. After extracting this information status, a two-step algorithm for identifying possible attacks is used: in the first phase, the parameters of the various ECUs of interest are analyzed, comparing them with spatial and temporal analyses that identify possible anomalies in the values. If positive, through the use of Bayesian networks, it is possible to calculate, through a process of inference, the probability that the combination of messages present over the bus represents an anomalous state given by a possible cyber-attack. In this article, we want to analyze a subsystem of the onboard network as a case study. In particular, we focus on some units highlighted by experts as critical to the vehicle’s correct functioning. In fact, the aim is to have a preliminary analysis of the possible use Electronics 2021, 10, 1765 3 of 16 of these methodologies inside the connected vehicles [11]. The paper is organized in the following way: In the next section, some related works are presented. After, we discuss the backgrounds of cybersecurity in IoT, machine learning and Bayesian networks, and finally, the automotive sector and CAN-Bus. The next section presents our case of study and follows the proposed approach. Finally, some experimental results are discussed with conclusions. 2. Related Works With the advent of technology, the automotive sector is progressively equipping vehicles with new features, which were unimaginable a few years ago. In the immediate future, the main news will be linked to the connectivity of such vehicles and the raising of autonomous driving levels based on them. It is estimated that by 2022, new vehicles will be connected and capable of communicating with each other [12]. Nowadays, many connected vehicles exchange information via APIs, Wi-Fi, or ad hoc cloud systems. However,

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    16 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us