Please use this identifier to cite or link to this item: http://hdl.handle.net/10125/64519

Protecting Temporal Fingerprints with Synchronized Chaotic Circuits

File Size Format  
0627.pdf 1.22 MB Adobe PDF View/Open

Item Summary

Title:Protecting Temporal Fingerprints with Synchronized Chaotic Circuits
Authors:Tang, Fengyi
Cheng, Betty
Keywords:Cybersecurity and Software Assurance
chaos cryptography
cybersecurity
multi-agent systems
Date Issued:07 Jan 2020
Abstract:In recent years, connected autonomous vehicles (CAVs) feature an increasing number of Ethernet-enabled electronic control units (ECUs), thereby creating more threat vectors that provide access to the Controller Area Network (CAN) Bus. Currently, mitigation techniques to protect the CAN bus from compromised ECU units in vehicle ad hoc networks (VANET) often utilize classical cryptographic techniques. However, ECUs often have temporal signatures that leak internal state information to eavesdropping attackers who can leverage temporal properties for longitudinal attacks. Unfortunately, these types of attacks are difficult to defend against using classical encryption schemes and intrusion detection systems (IDS) due to their high computational demands and ineffectiveness at protecting CAVs throughout the duration of their long lifespans. In order to address these problems, we propose a novel cryptographic framework that protects information embedded in ECU network communications by delivering an encryption system that periodically "salts" the temporal dynamics of individual ECU units with chaotic signals that are difficult to learn. We demonstrate the framework on two datasets, and our results show that the underlying temporal signatures cannot be approximated by state-of-the-art learning algorithms over finite time horizons.
Pages/Duration:10 pages
URI:http://hdl.handle.net/10125/64519
ISBN:978-0-9981331-3-3
DOI:10.24251/HICSS.2020.777
Rights:Attribution-NonCommercial-NoDerivatives 4.0 International
https://creativecommons.org/licenses/by-nc-nd/4.0/
Appears in Collections: Cybersecurity and Software Assurance


Please email libraryada-l@lists.hawaii.edu if you need this content in ADA-compliant format.

This item is licensed under a Creative Commons License Creative Commons