Computer Science ›› 2021, Vol. 48 ›› Issue (1): 34-39.doi: 10.11896/jsjkx.200900181

• Intelligent Edge Computing • Previous Articles     Next Articles

Mobile Edge Computing Based In-vehicle CAN Network Intrusion Detection Method

YU Tian-qi1, HU Jian-ling1, JIN Jiong2, YANG Jian-feng1   

  1. 1 School of Electronic and Information Engineering,Soochow University,Suzhou,Jiangsu 215006,China
    2 School of Software and Electrical Engineering,Swinburne University of Technology,Melbourne 3122,Australia
  • Received:2020-09-25 Revised:2020-12-07 Online:2021-01-15 Published:2021-01-15
  • About author:YU Tian-qi,born in 1991,Ph.D,lectu-rer.Her main research interests include Internet of Things,edge computing and sensor data analytics.
    YANG Jian-feng,born in 1978,Ph.D,senior experimentalist.His main research interests include signal proces-sing and electronic countermeasure.
  • Supported by:
    Natural Science Foundation of Jiangsu Province,China(BK20200858).

Abstract: With the rapid development and pervasive deployment of the Internet of Vehicles (IoV),it provides the services of Internet and big data analytics to the intelligent and connected vehicles,while incurs the issues of security and privacy.The closure of traditional in-vehicle networks leads to the communications protocols,particularly,the most commonly applied controller area network (CAN) bus protocol,lack of security and privacy protection mechanisms.Thus,to detect the network intrusions and protect the vehicles from being attacked,a support vector data description (SVDD) based intrusion detection method is proposed in this paper.Specifically,the weighted self-information of message IDs and the normalized values of IDs are selected as features for SVDD modeling,and the SVDD models are trained at the mobile edge computing (MEC) servers.The vehicles use the trained SVDD models for identifying the abnormal values of the selected features to detect the network intrusions.Simulations are conducted based on the CAN network dataset published by the HCR Lab of Korea University,where three conventional information entropy based in-vehicle network intrusion detection methods are adopted as the benchmarks.As compared to the benchmarks,the proposed method has dramatically improved the intrusion detection accuracy,especially when the number of intruded messages is small.

Key words: Internet of Vehicles, Mobile edge computing, In-vehicle network, Network intrusion detection, Support vector data description algorithm

CLC Number: 

  • TN915
[1] LIU Z,ZHANG T.Research on automatic lane change method based on vehicle network information[J].Journal of Chongqing University of Technology (Natural Science),2020,34(4):11-17.
[2] CHEN L,ZHANG D,LIANG J.The Driving active service selection method based on QoS for Internet of Vehicle environment[J].Journal of Chongqing University of Technology (Na-tural Science),2019,33(12):8-17.
[3] LI Y,LUO Q,LIU J,et al.TSP security in intelligent and connected vehicles:challenges and solutions [J].IEEE Wireless Communications,2019,26(3):125-131.
[4] WU W,LI R,XIE G,et al.A survey of intrusion detection for in-vehicle networks [J].IEEE Transactions on Intelligent Transportation System,2020,13(3):919-933.
[5] MILLER C,VALASEK C.Remote exploitation of an unaltered passenger vehicle [R].BlackHat USA,2015.
[6] KEEN SECURITY LAB.Car hacking research:Remote attack Tesla motors [EB/OL].[2020-09-24].https://www.blackhat.com/docs/us-17/thursday/us-17-Nie-Free-Fall-Hacking-Tesla-From-Wireless-To-CAN-Bus.pdf.
[7] YOUNG C,ZAMBRENO J,OLUFOWOBI H,et al.Survey of automotive controller area network intrusion detection systems [J].IEEE Design & Test,2019,36(6):48-55.
[8] CHOI W,JOO K,JO H J,et al.VoltageIDS:Low-level communication characteristics for automotive intrusion detection system[J].IEEE Transactions on Information Forensics Security,2018,13(8):2114-2129.
[9] CHO K T,SHIN K G.Fingerprinting electronic control units for vehicle intrusion detection[C]//25th USENIX Conference on Security Symposium.2016:911-927.
[10] SHIN K G,CHO K T.Viden:Attacker identification on in-vehicle networks[C]//ACM SIGSAC Conference on Computer Communication Security.2017:1109-1123.
[11] SONG H M,KIM H R,KIM H K.Intrusion detection system based on the analysis of time intervals of CAN messages for in-vehicle network[C]//International Conference on Information Networks (ICOIN).2016:63-68.
[12] LEE H,JEONG S H,KIM H K.OTIDS:A novel intrusion detection system for in-vehicle network by using remote frame[C]//15th IEEE PST.2017:5709-5757.
[13] MÜTER M,ASAJ N.Entropy-based anomaly detection for in-vehicle networks[C]//IEEE Intelligent Vehicles Symposium.2011:1110-1115.
[14] YU H,QIN G H,SUN M H,et al.Cyber security and anomaly detection method for in-vehicle CAN[J].Journal of Jilin University (Engineering Edition),2016,46(4):1246-1253.
[15] WU W,HUANG Y,KURACHI R,et al.Sliding window optimized information entropy analysis method for intrusion detection on in-vehicle networks[J].IEEE Access,2018,6:45233-45245.
[16] YU C,LIN B,GUI P,et al.Deployment and dimensioning of fog computing-based Internet of Vehicle infrastructure for autonomous driving[J].IEEE Internet of Things Journal,2019,6(1):149-160.
[17] YU X,LIU Y,SHI X,et al.Mobile edge computing offloading strategy under Internet of Vehicles scenario[J].Computer Engineering,2020,46(11):29-34,41.
[18] LING F,DUAN J,LI C,et al.Research on dynamic load balancing algorithm for C-V2X edge server[J].Computer Enginee-ring,2020,46(12):201-206,221.
[19] TAX M J D,DUIN P W R.Support Vector Data Description[J].Machine Learning,2004,54:45-66.
[20] Support Vector Data Description (SVDD) Toolkit [EB/OL].[2020-09-24].https://github.com/iqiukp/SVDD.
[1] LIANG Jun-bin, TIAN Feng-sen, JIANG Chan, WANG Tian-shu. Survey on Task Offloading Techniques for Mobile Edge Computing with Multi-devices and Multi-servers in Internet of Things [J]. Computer Science, 2021, 48(1): 16-25.
[2] MAO Ying-chi, ZHOU Tong, LIU Peng-fei. Multi-user Task Offloading Based on Delayed Acceptance [J]. Computer Science, 2021, 48(1): 49-57.
[3] LI Rui-xiang, MAO Ying-chi, HAO Shuai. Cache Management Method in Mobile Edge Computing Based on Approximate Matching [J]. Computer Science, 2021, 48(1): 96-102.
[4] GUO Fei-yan, TANG Bing. Mobile Edge Server Placement Method Based on User Latency-aware [J]. Computer Science, 2021, 48(1): 103-110.
[5] HU Jin-tian, WANG Gao-cai, XU Xiao-tong. Task Migration Strategy with Energy Optimization in Mobile Edge Computing [J]. Computer Science, 2020, 47(6): 260-265.
[6] TIAN Xian-zhong, YAO Chao, ZHAO Chen, DING Jun. 5G Network-oriented Mobile Edge Computation Offloading Strategy [J]. Computer Science, 2020, 47(11A): 286-290.
[7] WANG Chun-dong, LUO Wan-wei, MO Xiu-liang, YANG Wen-jun. Survey on Mutual Trust Authentication and Secure Communication of Internet of Vehicles [J]. Computer Science, 2020, 47(11): 1-9.
[8] LIU Dan. Fog Computing and Self-assessment Based Clustering and Cooperative Perception for VANET [J]. Computer Science, 2020, 47(10): 55-62.
[9] GU Xiao-hui,ZHANG Guo-an. Survey of SDN Applications in Vehicular Networks [J]. Computer Science, 2020, 47(1): 237-244.
[10] XUE Ling-ling, FAN Xiu-mei. Cognitive Spectrum Allocation Mechanism in Internet of Vehicles Based on Clustering Structure [J]. Computer Science, 2019, 46(9): 143-149.
[11] YIN Jia, GUAN Xin-jie, BAI Guang-wei. Task Offloading and Cooperative Load Balancing Mechanism Based on Mobile Edge Computing [J]. Computer Science, 2019, 46(12): 126-131.
[12] CHENG Xian-yi, SHI Quan, ZHU Jian-xin, CHEN Feng-mei, DAI Ran-ran. VID Model of Vehicles-infrastructure-driver Collaborative Control in Big Data Environment [J]. Computer Science, 2019, 46(11A): 185-188.
[13] DONG Si-qi, LI Hai-long, QU Yu-ben, ZHANG Zhao, HU Lei. Survey of Research on Computation Unloading Strategy in Mobile Edge Computing [J]. Computer Science, 2019, 46(11): 32-40.
[14] ZHANG Jun-hui, LI Qing and CHEN Da-peng. Implementation Method and System for EV Self-diagnosis [J]. Computer Science, 2016, 43(Z6): 34-36.
[15] HUA Hui-you, CHEN Qi-mai, LIU Hai, ZHANG Yang and YUAN Pei-quan. Hybrid Kmeans with KNN for Network Intrusion Detection Algorithm [J]. Computer Science, 2016, 43(3): 158-162.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99 .
[2] GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph[J]. Computer Science, 2018, 45(4): 112 -116 .
[3] GUO Shuai, LIU Liang and QIN Xiao-lin. Spatial Keyword Range Query with User Preferences Constraint[J]. Computer Science, 2018, 45(4): 182 -189 .
[4] GUO Jun-xia, GUO Ren-fei, XU Nan-shan and ZHAO Rui-lian. Study on Construction of EFSM Model for Web Application Based on Session[J]. Computer Science, 2018, 45(4): 203 -207 .
[5] ZHANG Jing and ZHU Guo-bin. Hot Topic Discovery Research of Stack Overflow Programming Website Based on CBOW-LDA Topic Model[J]. Computer Science, 2018, 45(4): 208 -214 .
[6] LI Hao-yang and FU Yun-qing. Collaborative Filtering Recommendation Algorithm Based on Tag Clustering and Item Topic[J]. Computer Science, 2018, 45(4): 247 -251 .
[7] ZHAO Li-bo, LIU Qi, FU Fang-ling and HE Ling. Automatic Detection of Hypernasality Grades Based on Discrete Wavelet Transformation and Cepstrum Analysis[J]. Computer Science, 2018, 45(4): 278 -284 .
[8] ZHANG Wen-bo and HOU Xiao-rong. Estimation Algorithm of Atmospheric Light Based on Gaussian Distribution[J]. Computer Science, 2018, 45(4): 301 -305 .
[9] FENG Yan-hong, YU Hong, SUN Geng, PENG Song. Diversity Measures Method in High-dimensional Semantic Vector Based on Asymmetric Multi-valued Feature Jaccard Coefficient[J]. Computer Science, 2018, 45(6): 57 -66 .
[10] ZHU Wen-qiang. Personalized Trustworthy Group Identifying Model Based on O2O Service-oriented Mobile Social Network[J]. Computer Science, 2018, 45(6): 76 -83 .