Cybersecurity in Automotive: An Intrusion Detection System in Connected Vehicles
Today’s modern vehicles are connected to a network and are considered smart objects of IoT, thanks to the capability to send and receive data from the network. One of the greatest challenges in the automotive sector is to make the vehicle secure and reliable. In fact, there are more connected instru...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2021-07-01
|
Series: | Electronics |
Subjects: | |
Online Access: | https://www.mdpi.com/2079-9292/10/15/1765 |
id |
doaj-836b2eba2e2242818fbb2502dd8b9693 |
---|---|
record_format |
Article |
spelling |
doaj-836b2eba2e2242818fbb2502dd8b96932021-08-06T15:21:03ZengMDPI AGElectronics2079-92922021-07-01101765176510.3390/electronics10151765Cybersecurity in Automotive: An Intrusion Detection System in Connected VehiclesFrancesco Pascale0Ennio Andrea Adinolfi1Simone Coppola2Emanuele Santonicola3Department of Energy, Polytechnic of Milan, 20156 Milan, ItalyDepartment of Industrial Engineering, University of Salerno, 84084 Fisciano, ItalyDepartment of Industrial Engineering, University of Salerno, 84084 Fisciano, ItalyDepartment of Industrial Engineering, University of Salerno, 84084 Fisciano, ItalyToday’s modern vehicles are connected to a network and are considered smart objects of IoT, thanks to the capability to send and receive data from the network. One of the greatest challenges in the automotive sector is to make the vehicle secure and reliable. In fact, there are more connected instruments on a vehicle, such as the infotainment system and/or data interchange systems. Indeed, with the advent of new paradigms, such as Smart City and Smart Road, the vision of Internet of Things has evolved substantially. Today, we talk about the V2X systems in which the vehicle is strongly connected with the rest of the world. In this scenario, the main aim of all connected vehicles vendors is to provide a secure system to guarantee the safety of the drive and persons against a possible cyber-attack. So, in this paper, an embedded Intrusion Detection System (IDS) for the automotive sector is introduced. It works by adopting a two-step algorithm that provides detection of a possible cyber-attack. In the first step, the methodology provides a filter of all the messages on the Controller Area Network (CAN-Bus) thanks to the use of a spatial and temporal analysis; if a set of messages are possibly malicious, these are analyzed by a Bayesian network, which gives the probability that a given event can be classified as an attack. To evaluate the efficiency and effectiveness of our method, an experimental campaign was conducted to evaluate them, according to the classic evaluation parameters for a test’s accuracy. These results were compared with a common data set on cyber-attacks present in the literature. The first experimental results, obtained in a test scenario, seem to be interesting. The results show that our method has good correspondence in the presence of the most common cyber-attacks (DDoS, Fuzzy, Impersonating), obtaining a good score relative to the classic evaluation parameters for a test’s accuracy. These results have decreased performance when we test the system on a Free State Attack.https://www.mdpi.com/2079-9292/10/15/1765cybersecurityautomotiveBayesian networkintrusion detection systemCAN-busInternet of Things |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Francesco Pascale Ennio Andrea Adinolfi Simone Coppola Emanuele Santonicola |
spellingShingle |
Francesco Pascale Ennio Andrea Adinolfi Simone Coppola Emanuele Santonicola Cybersecurity in Automotive: An Intrusion Detection System in Connected Vehicles Electronics cybersecurity automotive Bayesian network intrusion detection system CAN-bus Internet of Things |
author_facet |
Francesco Pascale Ennio Andrea Adinolfi Simone Coppola Emanuele Santonicola |
author_sort |
Francesco Pascale |
title |
Cybersecurity in Automotive: An Intrusion Detection System in Connected Vehicles |
title_short |
Cybersecurity in Automotive: An Intrusion Detection System in Connected Vehicles |
title_full |
Cybersecurity in Automotive: An Intrusion Detection System in Connected Vehicles |
title_fullStr |
Cybersecurity in Automotive: An Intrusion Detection System in Connected Vehicles |
title_full_unstemmed |
Cybersecurity in Automotive: An Intrusion Detection System in Connected Vehicles |
title_sort |
cybersecurity in automotive: an intrusion detection system in connected vehicles |
publisher |
MDPI AG |
series |
Electronics |
issn |
2079-9292 |
publishDate |
2021-07-01 |
description |
Today’s modern vehicles are connected to a network and are considered smart objects of IoT, thanks to the capability to send and receive data from the network. One of the greatest challenges in the automotive sector is to make the vehicle secure and reliable. In fact, there are more connected instruments on a vehicle, such as the infotainment system and/or data interchange systems. Indeed, with the advent of new paradigms, such as Smart City and Smart Road, the vision of Internet of Things has evolved substantially. Today, we talk about the V2X systems in which the vehicle is strongly connected with the rest of the world. In this scenario, the main aim of all connected vehicles vendors is to provide a secure system to guarantee the safety of the drive and persons against a possible cyber-attack. So, in this paper, an embedded Intrusion Detection System (IDS) for the automotive sector is introduced. It works by adopting a two-step algorithm that provides detection of a possible cyber-attack. In the first step, the methodology provides a filter of all the messages on the Controller Area Network (CAN-Bus) thanks to the use of a spatial and temporal analysis; if a set of messages are possibly malicious, these are analyzed by a Bayesian network, which gives the probability that a given event can be classified as an attack. To evaluate the efficiency and effectiveness of our method, an experimental campaign was conducted to evaluate them, according to the classic evaluation parameters for a test’s accuracy. These results were compared with a common data set on cyber-attacks present in the literature. The first experimental results, obtained in a test scenario, seem to be interesting. The results show that our method has good correspondence in the presence of the most common cyber-attacks (DDoS, Fuzzy, Impersonating), obtaining a good score relative to the classic evaluation parameters for a test’s accuracy. These results have decreased performance when we test the system on a Free State Attack. |
topic |
cybersecurity automotive Bayesian network intrusion detection system CAN-bus Internet of Things |
url |
https://www.mdpi.com/2079-9292/10/15/1765 |
work_keys_str_mv |
AT francescopascale cybersecurityinautomotiveanintrusiondetectionsysteminconnectedvehicles AT ennioandreaadinolfi cybersecurityinautomotiveanintrusiondetectionsysteminconnectedvehicles AT simonecoppola cybersecurityinautomotiveanintrusiondetectionsysteminconnectedvehicles AT emanuelesantonicola cybersecurityinautomotiveanintrusiondetectionsysteminconnectedvehicles |
_version_ |
1721218717201727488 |