Visible to the public CAN Radar: Sensing Physical Devices in CAN Networks based on Time Domain Reflectometry

TitleCAN Radar: Sensing Physical Devices in CAN Networks based on Time Domain Reflectometry
Publication TypeConference Paper
Year of Publication2019
AuthorsRumez, Marcel, Dürrwang, Jürgen, Brecht, Tim, Steinshorn, Timo, Neugebauer, Peter, Kriesten, Reiner, Sax, Eric
Conference Name2019 IEEE Vehicular Networking Conference (VNC)
Keywordsanomaly detection, automotive networks, automotive security, broadcast medium, CAN radar networks, controller area network, controller area network security, controller area networks, Cyber-physical systems, Distance measurement, IDS, Impedance, Impedance measurement, Internet of Things, Intrusion detection, Intrusion Detection Systems, malicious message transmission, power transmission lines, protocol, pubcrawl, radar detection, radar receivers, Resiliency, Resistance, Resistors, security mechanisms, security vulnerabilities, sensing unit, Sensors, TDR technique, time domain reflectometry technique, time-domain reflectometry, transceivers, Transmission line measurements, vehicle network
AbstractThe presence of security vulnerabilities in automotive networks has already been shown by various publications in recent years. Due to the specification of the Controller Area Network (CAN) as a broadcast medium without security mechanisms, attackers are able to read transmitted messages without being noticed and to inject malicious messages. In order to detect potential attackers within a network or software system as early as possible, Intrusion Detection Systems (IDSs) are prevalent. Many approaches for vehicles are based on techniques which are able to detect deviations from specified CAN network behaviour regarding protocol or payload properties. However, it is challenging to detect attackers who secretly connect to CAN networks and do not actively participate in bus traffic. In this paper, we present an approach that is capable of successfully detecting unknown CAN devices and determining the distance (cable length) between the attacker device and our sensing unit based on Time Domain Reflectometry (TDR) technique. We evaluated our approach on a real vehicle network.
DOI10.1109/VNC48660.2019.9062819
Citation Keyrumez_can_2019