论文标题

网络网络的网络攻击和对策

Cyberattacks and Countermeasures For In-Vehicle Networks

论文作者

Aliwa, Emad, Rana, Omer, Perera, Charith, Burnap, Peter

论文摘要

随着车辆之间和内部之间的连通性的增加,人们对安全和保障的关注也会增加。各种汽车串行协议在车辆内使用,例如控制器区域网络(CAN),本地互连网络(LIN)和FlexRay。 CAN BUS是最常用的车载网络协议,用于支持电子控制单元(ECU)之间的车辆参数的交换。该协议缺乏设计的安全机制,因此容易受到各种攻击的影响。此外,车辆的连通性不仅使车辆内部容易受到易受伤害,而且从外部也很容易受到伤害。随着连接汽车的兴起,板载车上已经引入了更多的入口点和接口,从而导致了更广泛的潜在攻击面。现有的安全机制着重于使用加密,身份验证和车辆入侵检测系统(IDS),这些系统在各种约束下运行,例如低带宽,较小的帧大小(例如,在CAN协议中),计算资源的可用性有限和实时敏感性。我们调查已经分组为:直接接口引发的攻击,远程信息处理和信息娱乐发动的攻击以及传感器引发的攻击的攻击的车载网络(IVN)攻击。我们根据标准,例如实时约束,使用的硬件类型,CAN BUS行为的更改,缓解攻击的类型以及用于验证这些方法的软件/硬件,我们调查和分类当前的加密和ID方法,并根据诸如实时限制,使用的硬件类型,CAN BUS行为类型以及用于验证这些方法的软件的类型进行比较这些方法。我们以潜在的缓解策略和对未来的研究挑战结束。

As connectivity between and within vehicles increases, so does concern about safety and security. Various automotive serial protocols are used inside vehicles such as Controller Area Network (CAN), Local Interconnect Network (LIN) and FlexRay. CAN bus is the most used in-vehicle network protocol to support exchange of vehicle parameters between Electronic Control Units (ECUs). This protocol lacks security mechanisms by design and is therefore vulnerable to various attacks. Furthermore, connectivity of vehicles has made the CAN bus not only vulnerable from within the vehicle but also from outside. With the rise of connected cars, more entry points and interfaces have been introduced on board vehicles, thereby also leading to a wider potential attack surface. Existing security mechanisms focus on the use of encryption, authentication and vehicle Intrusion Detection Systems (IDS), which operate under various constrains such as low bandwidth, small frame size (e.g. in the CAN protocol), limited availability of computational resources and real-time sensitivity. We survey In-Vehicle Network (IVN) attacks which have been grouped under: direct interfaces-initiated attacks, telematics and infotainment-initiated attacks, and sensor-initiated attacks. We survey and classify current cryptographic and IDS approaches and compare these approaches based on criteria such as real time constrains, types of hardware used, changes in CAN bus behaviour, types of attack mitigation and software/ hardware used to validate these approaches. We conclude with potential mitigation strategies and research challenges for the future.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源