The present invention relates to an attack detection apparatus that detects an attack against a communication network between devices and improves information security of the communication network.
As a communication network between devices, CAN (Controller Area Network) is widely known. CAN was first developed as communication technology between in-vehicle devices, and then standardized as ISO 11898 and ISO 11519. CAN is now adopted in a wide range of fields, such as industrial equipment and medical equipment, in addition to in-vehicle networks. CAN is divided into high-speed CAN and low-speed CAN depending on the transmission rate. The protocol is common to both of them, but the maximum transmission rate and the physical layer are different. Background art will be described below on the assumption of high-speed CAN.
As described in Non-Patent Literature 1, CAN has a small number of signal lines and allows a plurality of nodes to be additionally connected easily, providing flexibility in configuring a network. Communication is performed using a differential voltage, so that it is not readily susceptible to external noise. Moreover, various error detection features are also provided. As a result, high reliability is provided. Because of these factors, CAN is widely used in systems in which a large number of nodes are installed in a limited space and high reliability is desired, such as an automobile, for example.
In CAN, it is a general rule that a message having a particular ID is transmitted only by a particular node. However, if an unauthorized node transmits a message with a fake ID, this message cannot be recognized as an unauthorized message because information to identify a transmission node is only an ID in the CAN protocol, causing a receiving node to receive it as an authorized message and malfunction. This is called an impersonation attack of CAN, and is currently considered to be a major problem in the security of automobiles. Such an impersonation attack can be realized, for example, by methods such as altering a program of an ECU (Engine Control Unit) connected to the CAN to an unauthorized program via a network, or additionally connecting an unauthorized ECU to the CAN physically.
Matsumoto et al. proposed a countermeasure method described in Non-Patent Literature 2 and Non-Patent Literature 3 against impersonation attacks of CAN. This countermeasure method makes use of the fact that a node connected to the CAN monitors signal values on the CAN. Specifically, a node immediately inserts an error frame to stop communication of an unauthorized message upon detecting that an ID assigned to the node itself is being transmitted by another node. This countermeasure method has been considered as one of promising countermeasure methods against impersonation attacks of CAN.
Recently, however, it has become known that a short circuit attack to cause a short circuit on the CAN to prevent insertion of an error frame is possible against the countermeasure method of Matsumoto, et al. After proposing the countermeasure method of Non-Patent Literature 2 and Non-Patent Literature 3, Matsumoto, et al. then presented an attack method to electrically forge CAN signals by connecting two lines connected to an unauthorized node in Non-Patent Literature 4. This attack is also included in short circuit attacks.
As conventional techniques for detecting a short circuit on the CAN, there are short circuit detection techniques described in Patent Literature 1, Patent Literature 2, and Patent Literature 3, although not intended for countermeasures against security attacks such as a short circuit attack. As techniques for detecting an unauthorized node on the CAN, there are unauthorized node detection techniques described in Patent Literature 4 and Patent Literature 5.
A CAN bus has a linear architecture using two signal lines. A state in which the potential difference between the two signal lines is large is called dominant, and a state in which the potential difference is small is called recessive. In the countermeasure method described in Non-Patent Literature 2 and Non-Patent Literature 3, an error frame is inserted by forcibly changing recessive in an unauthorized message to dominant. This functions effectively due to the electrical specification of CAN that when a collision between dominant and recessive occurs, dominant is detected on the CAN, that is, dominant is stronger. However, there has been a problem as follows. If a short circuit can be caused between the two signal lines of the CAN at selective timing, it is possible to make the potential difference between the two signal lines not sufficiently large during dominant. As a result, recessive is detected on the CAN and an error frame cannot be inserted, so that an impersonation attack cannot be prevented.
The technique described in Patent Literature 1 monitors abnormality in a current flowing from a power supply in a vehicle. However, the technique of Patent Literature 1 monitors momentary abnormal changes in the current using a current probe, and thus is not suitable for detecting a non-dynamic abnormal current. That is, if an attacker gradually reduces the impedance between the two CAN lines, an abnormal current cannot be detected and an impersonation attack cannot be prevented.
The technique described in Patent Literature 2 monitors abnormality in the potential difference between the two CAN lines. However, the technique of Patent Literature 2 assumes accidental abnormality such as a failure, and thus is vulnerable to malicious attacks. For example, if an attacker of a short circuit attack acts maliciously such as removing a node device dedicated to monitoring abnormality, a short circuit cannot be detected.
The technique described in Patent Literature 3 aims to identify a short circuit point when a non-dynamic short circuit occurs on the CAN, and is applied in order to manually analyze a failure using a tester. Therefore, a dynamic short circuit such as a short circuit attack cannot be detected.
The techniques described in Patent Literature 4 and Patent Literature 5 aim to detect addition of an unauthorized node to the CAN, and monitor a voltage drop and impedance on the CAN and compare them with pre-stored values. If an attacker of a short circuit attack connects an unauthorized node, the addition of the unauthorized node may be detected with these techniques. However, also in this case, the attacker can connect an unauthorized node by methods such as replacing an authorized node with the unauthorized node or altering an authorized node. Once the unauthorized node is connected, a dynamic short circuit such as a short circuit attack cannot be detected with the techniques of Patent Literature 4 and Patent Literature 5.
As described above, the conventional techniques have problems that a dynamic short circuit such as a short circuit attack cannot be detected and an impersonation attack cannot be prevented.
The present invention has been conceived to solve the above-described problems, and aims to detect a dynamic short circuit such as a short circuit attack and improve the security of the CAN to prevent an impersonation attack.
In order to solve the above-described problems, an attack detection apparatus according to the present invention includes a CAN (Controller Area Network) to transfer a signal to a plurality of nodes by a differential voltage between two signal lines; and a short circuit detector to monitor the signal transferred by the two signal lines of the CAN, and detect a short circuit between the two signal lines on a basis of a change in the signal indicating a characteristic of a short circuit attack by an unauthorized node.
According to the present invention, a short circuit between two CAN lines is monitored to detect a short circuit attack, and occurrence of the short circuit attack is notified to each node on the CAN and a system control unit at an upper level, thereby providing the effect of being able to detect a dynamic short circuit such as a short circuit attack and improve the security of the CAN to prevent an impersonation attack.
In this embodiment, an outline of CAN and a short circuit attack in detail will be described first. Then, the configuration and operation of an attack detection apparatus according to this embodiment will be described.
<Outline of CAN>
The CAN bus has a linear architecture using two signal lines CAN_H and CAN_L, and is terminated at each end with 120Ω. A plurality of nodes, namely a node 1 to a node n, are each connected to the CAN bus via a CAN transceiver. These nodes can access the bus equally according to a multi-master method. In CAN, serial communication is performed by transferring a signal by a differential voltage between CAN H and CAN L.
As illustrated in
In CAN, there is no dedicated signal line for performing arbitration before communication is started, so that a plurality of nodes may start transmission at the same time. In such a case, arbitration is performed as described below. It is important here that when different nodes transmit dominant and recessive, respectively, the state on the CAN becomes dominant (for details, refer to the international specification of CAN, Non-Patent Literature 1, etc.). It is arranged that each node monitors signals on the CAN, and upon detecting a signal value different from a signal value each node itself has transmitted, the node that has transmitted recessive stops transmitting and only the node that has transmitted dominant continues transmitting. With this arrangement, arbitration is realized.
CAN communication is performed in units of a time-series bit sequence called a frame. There are frames of a plurality of types, and one that is mainly used is a data frame illustrated in
<Short Circuit Attack in Detail>
A short circuit attack against the CAN will now be described in detail.
First, a conventional method of countermeasure against an impersonation attack described in Non-Patent Literature 2 and Non-Patent Literature 3 will be described with reference to
In
Next, a short circuit attack against the conventional method of countermeasure against an impersonation attack will be described.
In
When the countermeasure method of Non-Patent Literature 2 and Non-Patent Literature 3 is implemented on a regular CAN, if the attacker transmits an unauthorized message with a certain ID, a node which is an authorized transmitter of this ID transmits six consecutive dominant bits, thereby turning subsequent recessive in the unauthorized message to dominant so that it becomes an error frame. That is, the unauthorized message is invalidated.
On the other hand, as described above, in the CAN modified to allow a short circuit between the two CAN lines at selective timing, when the attacker transmits an unauthorized message, the attacker controls the switch to be set to ON at a bit which the attacker wants to be recessive. A short circuit occurs between the two lines during this ON period, and even if another node transmits dominant to insert an error message during transmission of the unauthorized message, it is recognized as recessive by a receiver, as intended by the attacker.
In addition to hindering insertion of an error frame, a short circuit attack can also be used to alter data included in a message transmitted by an authorized node. Recessive data can be altered to dominant by means other than the short circuit attack, but the short circuit attack allows arbitrary alteration in both directions. However, in either case, the attacker needs to alter data such that no CRC error occurs, or needs to also alter a CRC field.
Unlike a remote attack via a network, the attacker of a short circuit attack is limited to a person who can touch the target to be attacked. In the case of an automobile, countermeasures to reduce occasions to be attacked by unspecified third parties can be considered, such as locking the doors without fail when a user leaves the automobile, and the like. However, when there are a plurality of users such as with a rental car or a shared car, such countermeasures are ineffective if one user performs such an attack to inflict damage on another user. There is also a possibility that a user becomes an attacker against the CAN for its own sake. For example, it is possible for the user to disguise the engine revolution speed so as to not decrease the travel speed. Thus, countermeasures are needed against sophisticated attacks in which the attackers are limited, such as a short circuit attack. The present invention provides means for that.
The attack detection apparatus according to a first embodiment will now be described.
First, an outline of the attack detection apparatus will be described. The attack detection apparatus improves the security of the CAN by realizing the following three functions concerning short circuit attacks.
(a.) Detection by electrical means of occurrence of a short circuit attack.
(b.) Notification of occurrence of a short circuit attack to a CAN node and a system control unit at an upper level.
(c.) Identification of a domain where a short circuit attack has occurred.
For detection of occurrence of a short circuit attack of the above (a.), there are three forms of implementation: monitoring a potential difference, monitoring impedance, and monitoring a current. For notification of a short circuit attack of the above (b.), there are two forms of implementation: broadcasting by a CAN message (notification to a node on the CAN) and notification using a channel other than the CAN (notification to the system control unit). With regard to identification of a domain of the above (c.), in a system such as an automobile, there are generally CANs in a plurality of domains sharing two CAN power supplies (3.5 V and 1.5 V). In such a system, if one domain receives a short circuit attack, there is a possibility that the domain where the short circuit attack has occurred cannot be identified by simply monitoring short circuits in each domain. The above-mentioned form of implementation of (c.) allows identification of the domain that has received the attack.
With reference to
Compared with
The countermeasure node 2 is a node that monitors, detects and notifies a short circuit attack. The countermeasure node 2 monitors a signal transmitted by the two signal lines of the CAN, and detects a short circuit between the two signal lines on the basis of a change in the signal that indicates the characteristic of a short circuit attack by an unauthorized node. A specific method for implementing the monitoring, detection, and notification of a short circuit attack will be described later.
The system control unit 3 manages the system state and security of the entire automobile, including the CAN.
The communication channel 4 is a channel for notifying the system control unit 3 of occurrence of a short circuit attack without fail. The communication channel 4 is not defined in CAN of conventional art, and it is a communication channel newly provided in this embodiment.
The operation of the attack detection apparatus 1 according to the first embodiment will now be described.
First, at start-up of the system including the CAN, it is checked that the countermeasure node 2 is properly connected to the CAN in a configuration at start-up of the system, so as to protect against a threat of detachment of the countermeasure node 2 by an attacker when modifying the CAN to be attacked or adding an unauthorized node in order to cause a short circuit attack to occur. Several means of checking are possible. For example, a CAN message to query each node whether each node exists on the CAN may be defined, and this CAN message may be transmitted to each node. Alternatively, for example, the existence of the countermeasure node 2 may be checked by performing communication between the system control unit 3 and the countermeasure node 2 using the communication channel 4. Note that in order to protect the countermeasure node 2 from being faked, it is desirable to use authentication means in view of information security, for example, a challenge-response authentication method. It is still more desirable that the countermeasure node 2 and the communication channel 4 be surrounded solidly so as not to be altered physically.
The monitoring operation of short circuit attacks in the attack detection apparatus 1 will now be described.
As a method for electrically detecting a short circuit between the two CAN lines, the following three types can be conceived: monitoring a potential difference, monitoring impedance, and monitoring a current. In the first embodiment, the monitoring operation of short circuit attacks by monitoring a potential difference will be described.
With reference to
The CAN transceiver 6, the CAN protocol controller 7, and the ECU 8 of
The ECU 8 and the AD converter 9 communicate via the ECU communication channel 10. Note that any element or circuit may be used as long as the potential difference between the two lines can be transferred to the ECU 8 as a digital signal, and it is not limited to the AD converter 9.
The countermeasure node 2 detects a short circuit attack as described below, for example. The ECU 8 regularly reads the potential difference between the two CAN lines which has been converted into digital data by the AD converter 9. The countermeasure node 2 monitors the potential difference between the two signal lines of the CAN, and detects a short circuit between the two signal lines if the potential difference is in a range indicating the characteristic of a short circuit attack. Specifically, if the value of the potential difference read from the AD converter 9 is a value in a predetermined range a fixed number of times or more in succession, the countermeasure node 2 considers that a short circuit has occurred between the two lines by a short circuit attack, and notifies each node on the CAN and the system control unit 3 at the upper level. As illustrated in
Next, a method for notifying occurrence of a short circuit attack when the attack detection apparatus 1 has detected a short circuit attack will be described. When a short circuit attack is received, it is necessary to notify each node on the CAN and the system control unit 3 at the upper level of occurrence of the short circuit attack as quickly as possible, in order to prevent serious damage. First, in order to notify each node on the CAN, the countermeasure node 2 broadcasts the occurrence of the short circuit attack to each node on the CAN. In order to implement this, an ID for notifying a short circuit attack is pre-defined in message IDs of the CAN. As a general rule, each node is implemented such that a message having the ID for notifying a short circuit attack is transmitted by the countermeasure node 2 and is received by every node. At least, a node for which there is a possibility that malfunction may lead to serious damage is implemented to accept a message having the ID for notifying a short circuit attack and perform appropriate operation. What constitutes the appropriate operation depends on the system, so that the appropriate operation is implemented in accordance with the functionality of the system.
When notification is performed by broadcasting, a message authentication technique of CAN may be used in combination in order to prevent an unauthorized node from transmitting a short circuit attack notification message even though no short circuit attack has occurred.
In this way, the above-described notification by broadcasting makes it possible to notify each node on the CAN of an attack by only additionally implementing one ID for notifying a short circuit attack in the message IDs. Thus, a short circuit attack can be notified at low cost.
Next, another method for notifying occurrence of a short circuit attack will be described.
The above-described notification by broadcasting is communicated using the CAN which has been the target of the short circuit attack, and thus may potentially have insufficient reliability. That is, if a short circuit attack notification message itself upon detection of a short circuit attack is subject to another short circuit attack again, there is a possibility that notification may not be performed properly. However, the most important is notifying the system control unit 3, which is at the upper level than the CAN, of the occurrence of the attack without fail. Thus, as illustrated in
As described above, the attack detection apparatus according to the first embodiment monitors a short circuit between the two CAN lines to detect a short circuit attack, and notifies each node on the CAN and the system control unit at the upper level of occurrence of the short circuit attack, and thereby provides the effect of being able to detect a dynamic short circuit such as a short circuit attack, and improve the security of the CAN to prevent an impersonation attack.
In the first embodiment, the case where a short circuit attack is detected by monitoring the potential difference between the two CAN lines has been described. An embodiment in which a short circuit attack is detected by monitoring the impedance between the two CAN lines will now be described.
In
In this embodiment, the impedance between the two CAN lines is measured by the impedance monitor 11.
With reference to
Normally, during transmission of dominant on the CAN, the power supplies of 3.5 V and 1.5 V are connected via two termination resistors of 120Ω. Thus, if the countermeasure node 2 of
On the other hand, during transmission of recessive on the CAN, the two power supplies of 3.5 V and 1.5 V are electrically disconnected normally. Thus, almost no current flows through the resistor 12 of
In the second embodiment, the case in which a short circuit attack is detected by monitoring the impedance between the two CAN lines has been described. An embodiment in which a short circuit attack is detected by monitoring the current between the two CAN lines will now be described.
Unlike the case where the potential difference or impedance is monitored, this embodiment is not implemented inside the countermeasure node 2, but is implemented on a power supply circuit of the system using the CAN, or on a power supply line or a power supply cable connecting the power supply circuit and the CAN. This is because even if the current flowing in a particular node connected to the CAN is monitored, the all currents flowing between the two CAN power supplies (3.5 V and 1.5 V) is not monitored.
With reference to
In the first to third embodiments, the cases in which a short circuit attack is detected by monitoring the potential difference, impedance, current, or the like between the two CAN lines have been described. An embodiment in which when there are CANs in a plurality of domains, the domain where a short circuit attack has occurred can be identified will now be described.
There may be a case in which CANs in a plurality of domains that share the two CAN power supplies (3.5 V and 1.5 V) exist in one system. If one of the domains receives a short circuit attack in such a system, there is a possibility that the domain where the short circuit attack has occurred cannot be identified by monitoring the potential difference or impedance between the two CAN lines in each domain individually, as in the first to third embodiments. For example, if dominant is transmitted at the same time in each of CANs in two domains and the CAN in one of the domains receives a short circuit attack, the potential difference or impedance between the two lines in the other domain may also indicate a value in an abnormal range as in the domain that has received the attack. In this case, it is difficult to identify the domain that has received the attack. An example of implementation for solving this problem will be described.
The configuration of
By configuring the attack monitoring apparatus as described above, even when CANs in a plurality of domains share the power supplies, it is possible to identify the domain where a short circuit attack has occurred.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/JP2015/064025 | 5/15/2015 | WO | 00 |