Intrusion Resilience Systems for Modern Vehicles

Ali Shoker, Vincent Rahli, Jérémie Decouchant, Paulo Esteves-Verissimo

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Abstract

Current vehicular Intrusion Detection and Prevention Systems either incur high false-positive rates or do not capture zero-day vulnerabilities, leading to safety-critical risks. In addition, prevention is limited to few primitive options like dropping network packets or extreme options, e.g., ECU Bus-off state. To fill this gap, we introduce the concept of vehicular Intrusion Resilience Systems (IRS) that ensures the resilience of critical applications despite assumed faults or zero-day attacks, as long as threat assumptions are met. IRS enables running a vehicular application in a replicated way, i.e., as a Replicated State Machine, over several ECUs, and then requiring the replicated processes to reach a form of Byzantine agreement before changing their local state. Our study rides the mutation of modern vehicular environments, which are closing the gap between simple and resource-constrained "real-time and embedded systems", and complex and powerful "information technology" ones. It shows that current vehicle (e.g., Zonal) architectures and networks are becoming plausible for such modular fault and intrusion tolerance solutions—deemed too heavy in the past. Our evaluation on a simulated Automotive Ethernet network running two state-of-the-art agreement protocols (Damysus and Hotstuff) shows that the achieved latency and throughout are feasible for many Automotive applications.
Original languageEnglish (US)
Title of host publication2023 IEEE 97th Vehicular Technology Conference (VTC2023-Spring)
PublisherIEEE
DOIs
StatePublished - Jun 2023

Bibliographical note

KAUST Repository Item: Exported on 2023-08-21

Fingerprint

Dive into the research topics of 'Intrusion Resilience Systems for Modern Vehicles'. Together they form a unique fingerprint.

Cite this