skip to main content
10.1145/3240765.3243488guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
research-article

Network and System Level Security in Connected Vehicle Applications

Published: 05 November 2018 Publication History

Abstract

Connected vehicle applications such as autonomous intersections and intelligent traffic signals have shown great promises in improving transportation safety and efficiency. However, security is a major concern in these systems, as vehicles and surrounding infrastructures communicate through ad-hoc networks. In this paper, we will first review security vulnerabilities in connected vehicle applications. We will then introduce and discuss some of the defense mechanisms at network and system levels, including (1) the Security Credential Management System (SCMS) proposed by the United States Department of Transportation, (2) an intrusion detection system (IDS) that we are developing and its application on collaborative adaptive cruise control, and (3) a partial consensus mechanism and its application on lane merging. These mechanisms can assist to improve the security of connected vehicle applications.

References

[1]
2–17. SECURITY CREDENTIAL MANAGEMENT SYSTEM (SCMS) PROOF OF CONCEPT (POC). https://www.its.dot.gov/factsheets/pdf/CV_SCMS.pdf
[2]
2016. Security Credential Management System Proof-of-Concept Implementation EE Requirements and Specifications Supporting SCMS Software Release 1.0.
[3]
Gabriel Bracha. 1987. Asynchronous Byzantine agreement protocols. Information and Computation 75, 2 (1987), 130–143.
[4]
Christian Cachin, Klaus Kursawe, and Victor Shoup. 2005. Random Oracles in Constantinople: Practical Asynchronous Byzantine Agreement Using Cryptography. Journal of Cryptology 18, 3 (01 Jul 2005), 219–246. https://doi.org/10.1007/s00145-005-0318-0
[5]
Soma Chaudhuri. 1993. More choices allow more faults: Set consensus problems in totally asynchronous systems. Information and Computation 105, 1 (1993), 132–158.
[6]
Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl Koscher, Alexei Czeskis, Franziska Roesner, Tadayoshi Kohno, et al. 2011. Comprehensive experimental analyses of automotive attack surfaces. In USENIX Security Symposium. San Francisco, 77–92.
[7]
Kyong-Tak Cho and Kang G. Shin. 2016. Fingerprinting Electronic Control Units for Vehicle Intrusion Detection. In 25th USENIX Security Symposium (USENIX Security 16). USENIX Association, Austin, TX, 911–927. https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/cho
[8]
Michael J Fischer, Nancy A Lynch, and Michael S Paterson. 1985. Impossibility of distributed consensus with one faulty process. Journal of the ACM (JACM) 32, 2 (1985), 374–382.
[9]
Matthew Jagielski, Nicholas Jones, Chung-Wei Lin, Cristina Nita-Rotaru, and Shinichi Shiraishi. 2018. Threat Detection for Collaborative Adaptive Cruise Control in Connected Cars. In Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec '18). ACM, New York, NY, USA, 184–189. https://doi.org/10.1145/3212480.3212492
[10]
John B Kenney. 2011. Dedicated short-range communications (DSRC) standards in the United States. Proc. IEEE 99, 7 (2011), 1162–1182.
[11]
Mohammad Khodaei and Panos Papadimitratos. 2018. Efficient, Scalable, and Resilient Vehicle-Centric Certificate Revocation List Distribution in VANETs. In Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec '18). ACM, New York, NY, USA, 172–183. https://doi.org/10.1145/3212480.3212481
[12]
Karl Koscher, Alexei Czeskis, Franziska Roesner, Shwetak Patel, Tadayoshi Kohno, Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, et al. 2010. Experimental security analysis of a modern automobile. In Security and Privacy (SP), 2010 IEEE Symposium on. IEEE, 447–462.
[13]
Leslie Lamport et al. 2001. Paxos made simple. ACM Sigact News 32, 4 (2001), 18–25.
[14]
Leslie Lamport, Robert Shostak, and Marshall Pease. 1982. The Byzantine generals problem. ACM Transactions on Programming Languages and Systems (TOPLAS) 4, 3 (1982), 382–401.
[15]
Charlie Miller and Chris Valasek. 2015. Remote exploitation of an unaltered passenger vehicle. Black Hat USA 2015 (2015), 91.
[16]
M. Pease, R. Shostak, and L. Lamport. 1980. Reaching Agreement in the Presence of Faults. J. ACM 27, 2 (April 1980), 228–234. https://doi.org/10.1145/322186.322188
[17]
Marshall Pease, Robert Shostak, and Leslie Lamport. 1980. Reaching agreement in the presence of faults. Journal of the ACM (JACM) 27, 2 (1980), 228–234.
[18]
Mei-Ling Shyu, Shu-Ching Chen, Kanoksri Sarinnapakorn, and Li Wu Chang. 2003. A novel anomaly detection scheme based on principal component classifier. Technical Report. MIAMI UNIV CORAL GABLES FL DEPT OF ELECTRICAL AND COMPUTER ENGINEERING.
[19]
H.M. Song, H.R. Kim, and H.K. Kim. 2016. Intrusion detection system based on the analysis of time intervals of CAN messages for in-vehicle network. In 2016 International Conference on Information Networking (ICOIN), Vol. 00. 63–68. https://doi.org/10.1109/ICOIN.2016.7427089
[20]
P. Waszecki, P. Mundhenk, S. Steinhorst, M. Lukasiewycz, R. Karri, and S. Chakraborty. 2017. Automotive Electrical and Electronic Architecture Security via Distributed In-Vehicle Traffic Monitoring. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 36, 11 (Nov 2017), 1790–1803. https://doi.org/10.1109/TCAD.2017.2666605
[21]
W. Whyte, A. Weimerskirch, V. Kumar, and T. Hehn. 2013. A security credential management system for V2V communications. In 2013 IEEE Vehicular Networking Conference. 1–8. https://doi.org/10.1109/VNC.2013.6737583
[22]
Feng Xiao and Long Wang. 2008. Asynchronous consensus in continuous-time multi-agent systems with switching topology and time-varying delays. IEEE Trans. Automat. Control 53, 8 (2008), 1804–1816.
[23]
Bowen Zheng, Chung-Wei Lin, Huafeng Yu, Hengyi Liang, and Qi Zhu. November 2016. CONVINCE: A Cross-Layer Modeling, Exploration and Validation Framework for Next-generation Connected Vehicles. In Computer-Aided Design (ICCAD), 2016 IEEE/ACM International Conference on. Article, 8 pages. https://doi.org/10.1145/2966986.2980078
[24]
B. Zheng, M. O. Sayin, C. W. Lin, S. Shiraishi, and Q. Zhu. 2017. Timing and security analysis of VANET-based intelligent transportation systems: (Invited paper). In 2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD). 984–991. https://doi.org/10.1109/ICCAD.2017.8203888

Cited By

View all
  • (2023)Connectivity Enhanced Safe Neural Network Planner for Lane Changing in Mixed TrafficProceedings of the 2023 International Conference on Autonomous Agents and Multiagent Systems10.5555/3545946.3599004(2568-2570)Online publication date: 30-May-2023
  • (2023)A Novel Multi-Attack IDS Framework for Intelligent Connected Terminals Based on Over-the-Air Signature UpdatesElectronics10.3390/electronics1210226712:10(2267)Online publication date: 17-May-2023
  • (2023)Tree-IDS: An Incremental Intrusion Detection System for Connected Vehicles2023 IEEE 48th Conference on Local Computer Networks (LCN)10.1109/LCN58197.2023.10223397(1-4)Online publication date: 2-Oct-2023
  • Show More Cited By

Index Terms

  1. Network and System Level Security in Connected Vehicle Applications
            Index terms have been assigned to the content through auto-classification.

            Recommendations

            Comments

            Information & Contributors

            Information

            Published In

            cover image Guide Proceedings
            2018 IEEE/ACM International Conference on Computer-Aided Design (ICCAD)
            Nov 2018
            939 pages

            Publisher

            IEEE Press

            Publication History

            Published: 05 November 2018

            Permissions

            Request permissions for this article.

            Qualifiers

            • Research-article

            Contributors

            Other Metrics

            Bibliometrics & Citations

            Bibliometrics

            Article Metrics

            • Downloads (Last 12 months)0
            • Downloads (Last 6 weeks)0
            Reflects downloads up to 16 Oct 2024

            Other Metrics

            Citations

            Cited By

            View all
            • (2023)Connectivity Enhanced Safe Neural Network Planner for Lane Changing in Mixed TrafficProceedings of the 2023 International Conference on Autonomous Agents and Multiagent Systems10.5555/3545946.3599004(2568-2570)Online publication date: 30-May-2023
            • (2023)A Novel Multi-Attack IDS Framework for Intelligent Connected Terminals Based on Over-the-Air Signature UpdatesElectronics10.3390/electronics1210226712:10(2267)Online publication date: 17-May-2023
            • (2023)Tree-IDS: An Incremental Intrusion Detection System for Connected Vehicles2023 IEEE 48th Conference on Local Computer Networks (LCN)10.1109/LCN58197.2023.10223397(1-4)Online publication date: 2-Oct-2023
            • (2023)Intrusion Detection for Internet of Vehicles using Machine Learning2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT)10.1109/ICCCNT56998.2023.10307254(1-6)Online publication date: 6-Jul-2023
            • (2023)A systematic review on security and safety of self-adaptive systemsJournal of Systems and Software10.1016/j.jss.2023.111716203:COnline publication date: 13-Jul-2023
            • (2023)A lightweight intrusion detection system for internet of vehicles based on transfer learning and MobileNetV2 with hyper-parameter optimizationMultimedia Tools and Applications10.1007/s11042-023-15771-683:8(22347-22369)Online publication date: 16-Jun-2023
            • (2023)Security-Aware Design of Time-Critical Automotive Cyber-Physical SystemsMachine Learning and Optimization Techniques for Automotive Cyber-Physical Systems10.1007/978-3-031-28016-0_4(121-153)Online publication date: 2-Sep-2023
            • (2022)MTH-IDS: A Multitiered Hybrid Intrusion Detection System for Internet of VehiclesIEEE Internet of Things Journal10.1109/JIOT.2021.30847969:1(616-632)Online publication date: 1-Jan-2022
            • (2022)Classification of Traffic in 5G Internet of Things Networks: A New Framework2022 International Conference on Artificial Intelligence of Things (ICAIoT)10.1109/ICAIoT57170.2022.10121821(1-4)Online publication date: 29-Dec-2022
            • (2021)Safety-Assured Design and Adaptation of Learning-Enabled Autonomous SystemsProceedings of the 26th Asia and South Pacific Design Automation Conference10.1145/3394885.3431623(753-760)Online publication date: 18-Jan-2021
            • Show More Cited By

            View Options

            View options

            Get Access

            Login options

            Media

            Figures

            Other

            Tables

            Share

            Share

            Share this Publication link

            Share on social media