Model Checking Resiliency and Sustainability of In-Vehicle Network for Real-Time Authenticity
Abstract
:Featured Application
Abstract
1. Introduction
- The centralized authentication of MAuth-CAN never fails to make AFR messages reach individual ECUs within a specific bounded time,
- The authentication of MAuth-CAN can never be a victim of BoA.
- In terms of MAuth-CAN security, it shows that MAuth-CAN is resilient and sustainable against a message flooding attack and bus-off attack under the specific conditions this paper provides;
- It presents a usage of formal methods to obtain certificates of safety and security standards and regulations, such as ISO (International Organization for Standardization) 26262;
- It presents new formal models of CAN bus at the level of MAC (Media Access Control) of the data link layer that can be useful for verification of properties of other applications running on CAN bus.
2. Related Work
3. Preliminaries
3.1. Our Approach
3.2. Model Checking
- Probability estimation: What is the probability PM(♢(x≤C) AP) for a given M?
- Hypothesis testing: Is the probability PM(♢(x≤C) AP) for a given M greater or equal to p [0, 1]?
- Probability comparison: Is the probability PM(♢(x≤C)AP1) greater than the probability PM(♢(x≤C)AP2)?
- simulate [bound; N] {E1, E2, …, Ek}: Simulate a model and return results in E1, …, Ek expressions. N represents the number of simulations.
- E[bound; N] (min|max: expr): Simulate a model N rounds of which each precedes up to bound time units and return the min or max of the expression expr.
3.3. CAN (Controller Area Network)
4. MAuth-CAN
4.1. System and Adversary Assumptions
4.1.1. System Assumptions
4.1.2. Adversary Assumptions
4.2. Attack Scenarios
4.2.1. Masquerade Attack
4.2.2. Denial of Service Leading to Bus-Off
4.3. Countermeasures of MAuth-CAN
4.3.1. Countermeasure to Masquerade Attack
4.3.2. Countermeasure to DoS and Bus-Off Attacks
4.4. Sufficient Conditions for MAuth-CAN Resiliency and Sustainability
5. Formal Analysis of MAuth-CAN
5.1. Model Checking Analysis of Theorem 1
5.2. Model Checking Analysis of Theorem 2
- Processor: Intel Core i7 CPU, 1.80GHz, 2.30GHz
- RAM: 16.0GB
- OS: Windows 10-64Bits
6. Implementation and Experiments
6.1. Message Authentication Time
6.2. Reception Time of an AFR Message
6.2.1. Reception Time of an AFR Message under Message Flooding Attacks
6.2.2. Reception Time of an AFR Message under BoA
7. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Koscher, K.; Czeskis, A.; Roesner, F.; Patel, S.; Kohno, T.; Checkoway, S.; McCoy, D.; Kantor, B.; Anderson, D.; Shacham, H.; et al. Experimental Security Analysis of a Modern Automobile. In Proceedings of the 2010 IEEE Symposium on Security and Privacy, Berkeley, CA, USA, 22–25 May 2011; pp. 447–462. [Google Scholar] [CrossRef] [Green Version]
- Checkoway, S.; McCoy, D.; Kantor, B.; Anderson, D.; Shacham, H.; Savage, S.; Koscher, K.; Czeskis, A.; Roesner, F.; Kohno, T. Comprehensive Experimental Analyses of Automotive Attack Surfaces. In Proceedings of the 20th USENIX Conference on Security; SEC’11; USENIX Association: Berkeley, CA, USA, 2011; p. 6. [Google Scholar]
- Foster, I.; Prudhomme, A.; Koscher, K.; Savage, S. Fast and Vulnerable: A Story of Telematic Failures. In Proceedings of the 9th USENIX Workshop on Offensive Technologies (WOOT 15), Washington, DC, USA, 10–11 August 2015. [Google Scholar]
- Miller, C.; Valasek, C. Remote Exploition of an Unaltered Passenger Vehicle. Black Hat USA 2015, 2015, 91. [Google Scholar]
- Woo, S.; Jo, H.; Lee, D. A Practical Wireless Attack on the Connected Car and Security Protocol for In-Vehicle CAN. IEEE Intell. Transp. Syst. 2015, 16, 993–1006. [Google Scholar] [CrossRef]
- Jo, H.J.; Choi, W.; Na, S.Y.; Woo, S.; Lee, D.H. Vulnerabilities of Android OS-Based Telematics System. Wirel. Pers. Commun. 2017, 92, 1511–1530. [Google Scholar] [CrossRef]
- Taylor, A.; Japkowicz, N.; Leblanc, S. Frequency-based anomaly detection for the automotive CAN bus. In Proceedings of the 2015 World Congress on Industrial Control Systems Security (WCICSS), London, UK, 14–16 December 2015; pp. 45–49. [Google Scholar] [CrossRef]
- Song, H.M.; Kim, H.R.; Kim, H.K. Intrusion detection system based on the analysis of time intervals of CAN messages for in-vehicle network. In Proceedings of the 2016 IEEE International Conference on Information Networking (ICOIN), Kota Kinabalu, Malaysia, 13–15 January 2016; pp. 63–68. [Google Scholar] [CrossRef]
- Tomlinson, A.; Bryans, J.; Shaikh, S.A.; Kalutarage, H.K. Detection of Automotive CAN Cyber-Attacks by Identifying Packet Timing Anomalies in Time Windows. In Proceedings of the 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W), Luxembourg, 25–28 June 2018; pp. 231–238. [Google Scholar] [CrossRef]
- Marchetti, M.; Stabili, D. Anomaly detection of CAN bus messages through analysis of ID sequences. In Proceedings of the 2017 IEEE Intelligent Vehicles Symposium (IV), Los Angeles, CA, USA, 11–14 June 2017; pp. 1577–1583. [Google Scholar] [CrossRef] [Green Version]
- Kang, M.J.; Kang, J.W. Intrusion Detection System Using Deep Neural Network for In-Vehicle Network Security. PLoS ONE 2016, 11, 1–17. [Google Scholar] [CrossRef] [PubMed]
- Song, H.M.; Woo, J.; Kim, H.K. In-vehicle network intrusion detection using deep convolutional neural network. Veh. Commun. 2020, 21, 1–13. [Google Scholar] [CrossRef]
- Cho, K.T.; Shin, K.G. Fingerprinting Electronic Control Units for Vehicle Intrusion Detection. In Proceedings of the 25th USENIX Security Symposium (USENIX Security 16), Austin, TX, USA, 10–12 August 2016; pp. 911–927. [Google Scholar]
- Hartkopp, O.; Reuber, C.; Schilling, R. MaCAN—Message Authenticated CAN. In Proceedings of the 10th International Conference on Embedded Security in Cars (Escar Euroupe 2012), Berlin, Germany, 28–29 November 2012. [Google Scholar]
- Kang, K.D.; Baek, Y.; Lee, S.; Son, S.H. An Attack-Resilient Source Authentication Protocol in Controller Area Network. In Proceedings of the 2017 ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS), Beijing, China, 18–19 May 2017; pp. 109–118. [Google Scholar] [CrossRef]
- Nürnberger, S.; Rossow, C. vatiCAN—Vetted, Authenticated CAN Bus. In Proceedings of the 18th International Conference on Cryptographic Hardware and Embedded Systems (CHES 2016), Santa Barbara, CA, USA, 17–19 August 2016; Springer: Berlin/Heidelberg, Germany, 2016; pp. 106–124. [Google Scholar] [CrossRef]
- Radu, A.I.; Garcia, F.D. LeiA: A Lightweight Authentication Protocol for CAN. In Proceedings of the 21st European Symposium on Research in Computer Security (ESORICS 2016), Heraklion, Greece, 28–30 September 2016; Springer: Berlin/Heidelberg, Germany, 2016. [Google Scholar]
- Kurachi, R.; Matsubara, Y.; Takada, H.; Adachi, N.; Miyashita, Y.; Horihata, S. CaCAN—Centralized Authentication System in CAN (Controller Area Network). In Proceedings of the 12th International Conference on Embedded Security in Cars (escar Euroupe 2014), Hamburg, Germany, 18–19 November 2014. [Google Scholar]
- Groza, B.; Murvay, S.; Herrewege, A.V.; Verbauwhede, I. LiBrA-CAN: Lightweight Broadcast Authentication for Controller Area Networks. ACM Trans. Embed. Comput. Syst. 2017, 16, 1–28. [Google Scholar] [CrossRef] [Green Version]
- Wang, E.; Xu, W.; Sastry, S.; Liu, S.; Zeng, K. Hardware Module-based Message Authentication in Intra-vehicle Networks. In Proceedings of the 8th International Conference on Cyber-Physical Systems, ICCPS ’17, Pittsburgh, PA, USA, 18–20 April 2017; ACM: New York, NY, USA, 2017; pp. 207–216. [Google Scholar] [CrossRef]
- Jo, H.J.; Kim, J.H.; Choi, H.; Choi, W.; Lee, D.H.; Lee, I. MAuth-CAN: Masquerade-Attack-Proof Authentication for In-Vehicle Networks. IEEE Trans. Veh. Technol. 2020, 69, 2204–2218. [Google Scholar] [CrossRef]
- Sagong, S.U.; Ying, X.; Clark, A.; Bushnell, L.; Poovendran, R. Cloaking the Clock: Emulating Clock Skew in Controller Area Networks. In Proceedings of the 9th ACM/IEEE International Conference on Cyber-Physical Systems, ICCPS ’18, Porto, Portugal, 11–13 April 2018; IEEE Press: Piscataway, NJ, USA, 2018; pp. 32–42. [Google Scholar] [CrossRef] [Green Version]
- Testa, A.C.M.; Coronato, A. Heuristic strategies for assessing wireless sensor network resiliency: An event-based formal approach. J. Heuristics 2015, 21, 145–175. [Google Scholar] [CrossRef] [Green Version]
- Bengtsson, J.; Yi, W. Timed automata: Semantics, algorithms and tools. Lect. Notes Comput. Sci. 2004, 3098, 87–124. [Google Scholar]
- Behrmann, G.; David, A.; Larsen, K. A Tutorial on Uppaal. In Formal Methods for the Design of Real-Time Systems; Springer: Berlin/Heidelberg, Germany, 2004; pp. 33–35. [Google Scholar]
- Alur, R.; Feder, T.; Henzinger, T.A. The benefits of relaxing punctuality. JACM 1996, 43, 116–146. [Google Scholar] [CrossRef]
- David, A.; Larsen, K.G.; Legay, A.; Mikučionis, M.; Poulsen, D.B. Uppaal SMC tutorial. Int. J. Softw. Tools Technol. Transf. 2015, 17, 397–415. [Google Scholar] [CrossRef] [Green Version]
- Eldefrawy, K.; Francillon, A.; Perito, D.; Tsudik, G. SMART: Secure and Minimal Architecture for (Establishing a Dynamic) Root of Trust. In Proceedings of the 19th Annual Network and Distributed System Security Symposium (NDSS 2012), San Diego, CA, USA, 5–8 February 2012. [Google Scholar]
- Koeberl, P.; Schulz, S.; Sadeghi, A.R.; Varadharajan, V. TrustLite: A Security Architecture for Tiny Embedded Devices. In Proceedings of the Ninth European Conference on Computer Systems, EuroSys ’14, Graz, Austria, 7–13 May 2006; ACM: New York, NY, USA, 2014; pp. 1–14. [Google Scholar] [CrossRef]
- Wikipedia. CAN Bus. Available online: https://en.wikipedia.org/wiki/CAN_bus (accessed on 20 January 2021).
- Luykx, A.; Mennink, B.; Neves, S. Security Analysis of BLAKE2’s Modes of Operation. IACR Trans. Symmetric Cryptol. 2016, 2016, 158–176. [Google Scholar] [CrossRef]
SOF | ID | Control | Data | CRC | ACK | EOF |
---|---|---|---|---|---|---|
1 | 11 | 6 | 0–64 | 16 | 1 | 7 |
Var | UPPAAL Var | Description |
---|---|---|
ECUi | nodid | ECU with id i |
AUTH | Authenticator | |
CANIDi | canid | CAN id used by ECUi |
Msgi | Message with absolute sequence id i | |
AFRi,1|2 | AFR message for message Msgi | |
Auth(Msgi) | Authentication of message Msgi | |
Tran(Msgi) | Transmission by CAN bus for message Msgi | |
Accept(Msgi) | Action of accepting message Msgi by ECU | |
TxMsgi | txMsg[i] | Message released by CANIDi |
RxMsgi | rxMsg[i] | Message read by CANIDi |
CANBus | canstat | Predicate to indicate whether CAN bus is occupied or not |
Tauth | AUTU_TIME | Authentication processing time of authenticator |
Ttx | TX_TIME | Transmission time of CAN bus |
UCMsgCnt | AttkMsgCnt | The number of messages that remain unchecked by the authenticator |
TB | A waiting time that CAN controller waits for AFR message | |
IQSizei | MAX_QSIZEi | The reception queue size of CANIDi |
Case | IQSizeAUTH | Tauth~Ttx | CTL-Property-2 | Case | IQSizeAUTH | Tauth~Ttx | CTL-Property-2 |
---|---|---|---|---|---|---|---|
1 | 1 | = | Not Satisfied | 4 | 2 | = | Not Satisfied |
2 | 1 | < | Not Satisfied | 5 | 2 | < | Satisfied |
3 | 1 | > | Not Satisfied | 6 | 2 | > | Not Satisfied |
Authenticator | ECU | |||
---|---|---|---|---|
Message | Report | Message | Report | |
Authentication ( | Generation () | Generation () | Verification () | |
Mean | 28.26 | 28.14 | 258.8 | 516.4 |
Std. Dev. | 0.46 | 0.34 | 0.43 | 1.02 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Kim, J.H.; Jo, H.J.; Lee, I. Model Checking Resiliency and Sustainability of In-Vehicle Network for Real-Time Authenticity. Appl. Sci. 2021, 11, 1068. https://doi.org/10.3390/app11031068
Kim JH, Jo HJ, Lee I. Model Checking Resiliency and Sustainability of In-Vehicle Network for Real-Time Authenticity. Applied Sciences. 2021; 11(3):1068. https://doi.org/10.3390/app11031068
Chicago/Turabian StyleKim, Jin Hyun, Hyo Jin Jo, and Insup Lee. 2021. "Model Checking Resiliency and Sustainability of In-Vehicle Network for Real-Time Authenticity" Applied Sciences 11, no. 3: 1068. https://doi.org/10.3390/app11031068
APA StyleKim, J. H., Jo, H. J., & Lee, I. (2021). Model Checking Resiliency and Sustainability of In-Vehicle Network for Real-Time Authenticity. Applied Sciences, 11(3), 1068. https://doi.org/10.3390/app11031068