A Formal Modeling and Verification Scheme with an RNN-Based Attacker for CAN Communication System Authenticity

To enhance the attack resistance of the Controller Area Network (CAN) system and optimize the communication software design, a comprehensive model that combines a variable attacker with the CAN bus (VACB) is proposed to evaluate the bus communication risk. The VACB model consists of a variable attac...

Full description

Bibliographic Details
Main Authors: Yihua Wang, Qing Zhou, Yu Zhang, Xian Zhang, Jiahao Du
Format: Article
Language:English
Published: MDPI AG 2022-06-01
Series:Electronics
Subjects:
Online Access:https://www.mdpi.com/2079-9292/11/11/1773
_version_ 1797493643313938432
author Yihua Wang
Qing Zhou
Yu Zhang
Xian Zhang
Jiahao Du
author_facet Yihua Wang
Qing Zhou
Yu Zhang
Xian Zhang
Jiahao Du
author_sort Yihua Wang
collection DOAJ
description To enhance the attack resistance of the Controller Area Network (CAN) system and optimize the communication software design, a comprehensive model that combines a variable attacker with the CAN bus (VACB) is proposed to evaluate the bus communication risk. The VACB model consists of a variable attacker and the CAN bus model. A variable attacker is a visualized generation of the attack traffic based on a recurrent neural network (RNN), which is used to evaluate the anti-attack performance of the CAN bus; the CAN bus model combines the data link layer and the application layer to analyze the anomalies in CAN bus data transmission after the attack message. The simulation results indicate that the transmission accuracy and successful response rate decreased by 1.8% and 4.3% under the constructed variable attacker. The CAN bus’s authenticity was promoted after the developers adopted this model to analyze and optimize the software design. The transmission accuracy and the successful response rate were improved by 2.5% and 5.1%, respectively. Moreover, the model can quantify the risk of potential attacks on the CAN bus, prompting developers to avoid it in early development to reduce the loss caused by system crashes. The comprehensive model can provide theoretical guidance for the timing design of embedded software.
first_indexed 2024-03-10T01:22:58Z
format Article
id doaj.art-75401af5789745c5a4624fe87dbdc85b
institution Directory Open Access Journal
issn 2079-9292
language English
last_indexed 2024-03-10T01:22:58Z
publishDate 2022-06-01
publisher MDPI AG
record_format Article
series Electronics
spelling doaj.art-75401af5789745c5a4624fe87dbdc85b2023-11-23T13:55:39ZengMDPI AGElectronics2079-92922022-06-011111177310.3390/electronics11111773A Formal Modeling and Verification Scheme with an RNN-Based Attacker for CAN Communication System AuthenticityYihua Wang0Qing Zhou1Yu Zhang2Xian Zhang3Jiahao Du4Key Laboratory of Electronics and Information Technology for Space System, National Space Science Center, Chinese Academy of Sciences, Beijing 100190, ChinaKey Laboratory of Electronics and Information Technology for Space System, National Space Science Center, Chinese Academy of Sciences, Beijing 100190, ChinaBeijing Jinghang Research Institute of Computing and Communication, Beijing 100074, ChinaBeijing Jinghang Research Institute of Computing and Communication, Beijing 100074, ChinaKey Laboratory of Electronics and Information Technology for Space System, National Space Science Center, Chinese Academy of Sciences, Beijing 100190, ChinaTo enhance the attack resistance of the Controller Area Network (CAN) system and optimize the communication software design, a comprehensive model that combines a variable attacker with the CAN bus (VACB) is proposed to evaluate the bus communication risk. The VACB model consists of a variable attacker and the CAN bus model. A variable attacker is a visualized generation of the attack traffic based on a recurrent neural network (RNN), which is used to evaluate the anti-attack performance of the CAN bus; the CAN bus model combines the data link layer and the application layer to analyze the anomalies in CAN bus data transmission after the attack message. The simulation results indicate that the transmission accuracy and successful response rate decreased by 1.8% and 4.3% under the constructed variable attacker. The CAN bus’s authenticity was promoted after the developers adopted this model to analyze and optimize the software design. The transmission accuracy and the successful response rate were improved by 2.5% and 5.1%, respectively. Moreover, the model can quantify the risk of potential attacks on the CAN bus, prompting developers to avoid it in early development to reduce the loss caused by system crashes. The comprehensive model can provide theoretical guidance for the timing design of embedded software.https://www.mdpi.com/2079-9292/11/11/1773controller area network busanti-attackattack traffic generationrecurrent neural networkmodel checkingUPPAAL
spellingShingle Yihua Wang
Qing Zhou
Yu Zhang
Xian Zhang
Jiahao Du
A Formal Modeling and Verification Scheme with an RNN-Based Attacker for CAN Communication System Authenticity
Electronics
controller area network bus
anti-attack
attack traffic generation
recurrent neural network
model checking
UPPAAL
title A Formal Modeling and Verification Scheme with an RNN-Based Attacker for CAN Communication System Authenticity
title_full A Formal Modeling and Verification Scheme with an RNN-Based Attacker for CAN Communication System Authenticity
title_fullStr A Formal Modeling and Verification Scheme with an RNN-Based Attacker for CAN Communication System Authenticity
title_full_unstemmed A Formal Modeling and Verification Scheme with an RNN-Based Attacker for CAN Communication System Authenticity
title_short A Formal Modeling and Verification Scheme with an RNN-Based Attacker for CAN Communication System Authenticity
title_sort formal modeling and verification scheme with an rnn based attacker for can communication system authenticity
topic controller area network bus
anti-attack
attack traffic generation
recurrent neural network
model checking
UPPAAL
url https://www.mdpi.com/2079-9292/11/11/1773
work_keys_str_mv AT yihuawang aformalmodelingandverificationschemewithanrnnbasedattackerforcancommunicationsystemauthenticity
AT qingzhou aformalmodelingandverificationschemewithanrnnbasedattackerforcancommunicationsystemauthenticity
AT yuzhang aformalmodelingandverificationschemewithanrnnbasedattackerforcancommunicationsystemauthenticity
AT xianzhang aformalmodelingandverificationschemewithanrnnbasedattackerforcancommunicationsystemauthenticity
AT jiahaodu aformalmodelingandverificationschemewithanrnnbasedattackerforcancommunicationsystemauthenticity
AT yihuawang formalmodelingandverificationschemewithanrnnbasedattackerforcancommunicationsystemauthenticity
AT qingzhou formalmodelingandverificationschemewithanrnnbasedattackerforcancommunicationsystemauthenticity
AT yuzhang formalmodelingandverificationschemewithanrnnbasedattackerforcancommunicationsystemauthenticity
AT xianzhang formalmodelingandverificationschemewithanrnnbasedattackerforcancommunicationsystemauthenticity
AT jiahaodu formalmodelingandverificationschemewithanrnnbasedattackerforcancommunicationsystemauthenticity