On November 2, the Southwest Research Institute (SwRI) developed an intrusion detection system (IDS) to protect ground vehicles from cyber threats in embedded systems and connected vehicle networks. The system was developed for military vehicles, but can also be used in passenger cars and commercial vehicles to detect anomalies.
(Image source: SwRI)
Developed by SwRI in collaboration with the U.S. Army Ground Vehicle Systems Center (GVSC) Ground Systems Cyber Engineering (GSCE), the IDS technology uses digital fingerprints and algorithms to identify communication anomalies between automotive systems and components. Military, passenger and commercial vehicles use the standard Controller Area Network (CAN) bus protocol to enable communication across various nodes or electronic control units (ECUs).
For example, the CAN protocol notifies the dashboard display when a sensor detects low oil pressure or when the headlights are activated. It also relays operational communications for systems such as the transmission and other key automotive technologies.
“A cyberattack could be to send false information through the CAN protocol to alter or impede vehicle operation,” said Jonathan Wolford, an engineer at SwRI. “Such an attack on a connected vehicle could have catastrophic consequences.”
CAN has been the standard automotive protocol since 1986, providing a reliable and flexible platform for transmitting information, but cybersecurity protection was not designed in. As modern vehicles are increasingly connected via external networks, the CAN system is increasingly vulnerable to potential cyberattacks, especially sending false messages.
SwRI's new algorithms extract information using digital fingerprints on nodes that transmit information over the CAN bus protocol. The digital fingerprints enable SwRI's intrusion detection system to identify when unknown/invalid nodes or computers are connected to a vehicle network. Using the message transmissions of a CAN transceiver, the algorithms track low-level physical layer characteristics, such as minimum and maximum voltages and voltage slew rates for each CAN frame, to create these digital fingerprints.
The researchers used baseline data to train the system to establish a fingerprint for each node to learn the characteristics and better identify anomalies. Through digital fingerprinting, the intrusion system can accurately identify messages from unauthorized nodes, or when a valid node sends a false message, indicating a "masquerade attack."
After training the system, SwRI engineers injected fake data, which the algorithm immediately flagged, so the system was able to identify threats and defend against them.
“In theory, these attacks are simple enough for a hacker with physical access to the vehicle, but vehicles are also vulnerable to wireless attacks,” said Peter Moldenhauer, an engineer at SwRI and a participant in the research. “As we move toward more connected and automated vehicle networks, our system aims to build cyber resilience into the CAN protocol.”
Previous article:Australian researchers develop new technology to detect pedestrians in blind spots and improve autonomous driving safety
Next article:In 2022, black boxes will be mandatory, and traffic accidents will have a basis for investigation.
- Popular Resources
- Popular amplifiers
- A new chapter in Great Wall Motors R&D: solid-state battery technology leads the future
- Naxin Micro provides full-scenario GaN driver IC solutions
- Interpreting Huawei’s new solid-state battery patent, will it challenge CATL in 2030?
- Are pure electric/plug-in hybrid vehicles going crazy? A Chinese company has launched the world's first -40℃ dischargeable hybrid battery that is not afraid of cold
- How much do you know about intelligent driving domain control: low-end and mid-end models are accelerating their introduction, with integrated driving and parking solutions accounting for the majority
- Foresight Launches Six Advanced Stereo Sensor Suite to Revolutionize Industrial and Automotive 3D Perception
- OPTIMA launches new ORANGETOP QH6 lithium battery to adapt to extreme temperature conditions
- Allegro MicroSystems Introduces Advanced Magnetic and Inductive Position Sensing Solutions
- TDK launches second generation 6-axis IMU for automotive safety applications
- LED chemical incompatibility test to see which chemicals LEDs can be used with
- Application of ARM9 hardware coprocessor on WinCE embedded motherboard
- What are the key points for selecting rotor flowmeter?
- LM317 high power charger circuit
- A brief analysis of Embest's application and development of embedded medical devices
- Single-phase RC protection circuit
- stm32 PVD programmable voltage monitor
- Introduction and measurement of edge trigger and level trigger of 51 single chip microcomputer
- Improved design of Linux system software shell protection technology
- What to do if the ABB robot protection device stops
- Analysis of the application of several common contact parts in high-voltage connectors of new energy vehicles
- Wiring harness durability test and contact voltage drop test method
- From probes to power supplies, Tektronix is leading the way in comprehensive innovation in power electronics testing
- From probes to power supplies, Tektronix is leading the way in comprehensive innovation in power electronics testing
- Sn-doped CuO nanostructure-based ethanol gas sensor for real-time drunk driving detection in vehicles
- Design considerations for automotive battery wiring harness
- Do you know all the various motors commonly used in automotive electronics?
- What are the functions of the Internet of Vehicles? What are the uses and benefits of the Internet of Vehicles?
- Power Inverter - A critical safety system for electric vehicles
- Analysis of the information security mechanism of AUTOSAR, the automotive embedded software framework
- Selection and application of DCDC module power supply
- When a person gets an electric shock, is the current more harmful or the voltage more harmful?
- Variable assignment in Verilog parallel statements
- [National Technology N32G430] 7. CAN test
- ZYNQ Booting Linux system from nand and burning always fails?
- 5G daily KPI optimization ideas
- Album of outstanding works of the National Undergraduate Electronic Design Competition (Part 1)
- Notes on programming the Hezhongda DM6446 development board
- IMX6 development board creates the first Android application HelloWorld
- Why does the cell phone turn off as soon as it rings?