论文标题
关于智能车辆中网络控制系统的安全性及其自适应巡航控制
On the Security of Networked Control Systems in Smart Vehicle and its Adaptive Cruise Control
论文作者
论文摘要
有了车辆互联网(IOV)范式的好处,就面临着前所未有的安全挑战。在连接系统的许多应用中,车辆网络和智能汽车是已经推出的示例。智能车辆不仅具有连接其内部组件的网络,例如通过控制器区域网络(CAN)巴士,但也通过路边单元和其他车辆连接到外界。在某些情况下,内部和外部网络数据包通过相同的硬件,仅通过软件定义的规则隔离。任何错误配置都为黑客侵入车辆内部组件,例如中央锁系统,发动机控制单元(ECU),防锁制动系统(ABS)或自适应巡航控制(ACC)系统。这些妥协中的任何一个都可能导致灾难性的结果。在本文中,我们研究了在秘密攻击的情况下,智能车辆自适应巡航控制系统的安全性。我们在巡航控制的背景下定义了两次秘密/隐形攻击,并提出了一种新颖的入侵检测和补偿方法,以披露和应对此类攻击。更确切地说,我们专注于损害巡航控制器完整性并在IDS引擎中使用神经网络标识符的秘密网络攻击,以动态估算系统输出并将其与ACC输出进行比较。如果检测到任何异常,则嵌入式替代控制器踢入并接管控件。我们在MATLAB中进行了广泛的实验,以评估模拟环境中提出的方案的有效性。
With the benefits of Internet of Vehicles (IoV) paradigm, come along unprecedented security challenges. Among many applications of inter-connected systems, vehicular networks and smart cars are examples that are already rolled out. Smart vehicles not only have networks connecting their internal components e.g. via Controller Area Network (CAN) bus, but also are connected to the outside world through road side units and other vehicles. In some cases, the internal and external network packets pass through the same hardware and are merely isolated by software defined rules. Any misconfiguration opens a window for the hackers to intrude into vehicles' internal components e.g. central lock system, Engine Control Unit (ECU), Anti-lock Braking System (ABS) or Adaptive Cruise Control (ACC) system. Compromise of any of these can lead to disastrous outcomes. In this paper, we study the security of smart vehicles' adaptive cruise control systems in the presence of covert attacks. We define two covert/stealth attacks in the context of cruise control and propose a novel intrusion detection and compensation method to disclose and respond to such attacks. More precisely, we focus on the covert cyber attacks that compromise the integrity of cruise controller and employ a neural network identifier in the IDS engine to estimate the system output dynamically and compare it against the ACC output. If any anomaly is detected, an embedded substitute controller kicks in and takes over the control. We conducted extensive experiments in MATLAB to evaluate the effectiveness of the proposed scheme in a simulated environment.