DoS Protection through Credit Based Metering - Simulation Based Evaluation for Time-Sensitive Networking in Cars

@article{Meyer2019DoSPT,
  title={DoS Protection through Credit Based Metering - Simulation Based Evaluation for Time-Sensitive Networking in Cars},
  author={Philipp Meyer and Timo H{\"a}ckel and Franz Korf and Thomas C. Schmidt},
  journal={ArXiv},
  year={2019},
  volume={abs/1908.09646}
}
Ethernet is the most promising solution to reduce complexity and enhance the bandwidth in the next generation in-car networks. Dedicated Ethernet protocols enable the real-time aspects in such networks. One promising candidate is the IEEE 802.1Q Time-Sensitive Networking protocol suite. Common Ethernet technologies, however, increases the vulnerability of the car infrastructure as they widen the attack surface for many components. In this paper proposes an IEEE 802.1Qci based algorithm that on… 
3 Citations

Figures from this paper

Network Anomaly Detection in Cars: A Case for Time-Sensitive Stream Filtering and Policing
TLDR
This paper shows how Per-Stream Filtering and Policing of IEEE Time-Sensitive Networking (TSN) can be used as a core technology for identifying misbehaving traffic flows in cars, and thereby serve as network anomaly detectors.
Network Anomaly Detection in Cars based on Time-Sensitive Ingress Control
TLDR
The findings confirm that abnormally behaving individual flows can indeed be reliably segregated with zero false positives and build on the idea that already defined TSN traffic descriptors for in-car network configurations are rigorous, and hence any observed violation should not be a false positive.

References

SHOWING 1-10 OF 11 REFERENCES
Extending IEEE 802.1 AVB with time-triggered scheduling: A simulation study of the coexistence of synchronous and asynchronous traffic
TLDR
This paper investigates the coexistence of synchronous and asynchronous traffic by experimentally adding time-triggered messages to the credit-based shaper of AVB in a straightforward way, and provides recommendations for configurations that can improve end-to-end network performance for in-car applications by over 100%.
Simulation of Mixed Critical In-vehicular Networks
TLDR
This chapter introduces the domain-specific aspects and simulation models for in-vehicular networks and presents an overview of the car-centric network design process.
An extension of the OMNeT++ INET framework for simulating real-time ethernet with high accuracy
TLDR
This paper introduces an extension of the OMNeT++ INET framework for simulating real-time Ethernet with high temporal accuracy, and implements the TTEthernet protocol, a real- time extension to standard Ethernet that is proposed for standardisation.
Protecting an automobile network using distributed firewall system
TLDR
The proposed HSS uses the distributed firewalls to filter malicious content placed at each module and an electronic control unit (ECU) and creates two layers of defense within an automobile network that allows flexibility for manufactures who want extra security for their cars without causing abandonment or redesigning their current security architectures.
Automotive Ethernet
Spoofing attack using bus-off attacks against a specific ECU of the CAN bus
TLDR
This paper reports spoofing attacks that exploit a vulnerability of the controller area network (CAN) protocol, which is often used in in-vehicle networks, and proposes a spoofing attack method that uses a bus-off attack and is not detected by the authorized ECUs.
Comprehensive Experimental Analyses of Automotive Attack Surfaces
TLDR
This work discovers that remote exploitation is feasible via a broad range of attack vectors (including mechanics tools, CD players, Bluetooth and cellular radio), and further, that wireless communications channels allow long distance vehicle control, location tracking, in-cabin audio exfiltration and theft.
Königseder. Automotive Ethernet
  • 2015
IEEE Standard for Local and metropolitan area networks -Bridges and Bridged Networks -Amendment 25: Enhancements for Scheduled Traffic
    Remote exploitation of an unaltered passenger vehicle
    • Black Hat USA,
    • 2015
    ...
    ...