CAD: Command-Level Anomaly Detection for Vehicle-Road Collaborative Charging Network

A large number of charging piles installed on roadside parking spaces and smart poles on the roadside of the Internet have become essential substation infrastructure (roadside) for building a vehicle-road coordinated charging network for electric vehicles. The management system of China National Grid’s network-load interaction includes the interaction between these main stations (traffic control stations) and substations (roadsides). The Internet-friendly interactive communication protocol for China’s vehicle-road coordination is IEC 60870-5-104 (104 protocol). The control network of the vehicle-road collaborative charging network has many characteristics, such as multiple levels, multiple types, and frequent information exchange for monitoring and control. Various types of operational information and control commands are subject to eavesdropping, tampering, and interruption during collection, transmission, and triggering. This paper proposes a command-level anomaly detection (CAD) method for a vehicle-road collaborative charging network. The CAD method analyzes the protocol for the specification format and business command characteristics of the 104 protocol. This paper uses the dynamic analysis protocol fuzzy test to realize the dynamic information in the program to guide the generation of test cases and pass the Markov state transition diagram. We describe the state transition and abnormality identification of protocol messages. We also design a long-term memory network to implement instruction-level anomaly feature mining. The experiment proved the validity of CAD. If we adopt other new protocols for the vehicle-road coordinated network in different countries or regions, the analysis of the new protocol can be completed in the same way, which has strong application value and prospect.

[1]  Hiro Onishi,et al.  Paradigm change of vehicle cyber security , 2012, 2012 4th International Conference on Cyber Conflict (CYCON 2012).

[2]  Deyu Wang,et al.  Cognitive-inspired class-statistic matching with triple-constrain for camera free 3D object retrieval , 2019, Future Gener. Comput. Syst..

[3]  Rongbo Zhu,et al.  Dynamic Spectrum Access Algorithm Based on Game Theory in Cognitive Radio Networks , 2015, Mob. Networks Appl..

[4]  Christoph Schmittner,et al.  The Need for Safety and Cyber-Security Co-engineering and Standardization for Highly Automated Automotive Vehicles , 2016 .

[5]  Araz Taeihagh,et al.  Governing autonomous vehicles: emerging responses for safety, liability, privacy, cybersecurity, and industry risks , 2018, Transport Reviews.

[6]  Sankalp Bagaria,et al.  Flexi-DNP3: Flexible distributed network protocol version 3 (DNP3) for SCADA security , 2011, 2011 International Conference on Recent Trends in Information Systems.

[7]  Mark Talabis,et al.  Information Security Risk Assessment: Risk Assessment , 2012 .

[8]  N. Sklavos,et al.  Aiming at Higher Network Security through Extensive Penetration Tests , 2012, IEEE Latin America Transactions.

[9]  Chao Zhang,et al.  CollAFL: Path Sensitive Fuzzing , 2018, 2018 IEEE Symposium on Security and Privacy (SP).

[10]  Morshed U. Chowdhury,et al.  A New Cyber Security Framework Towards Secure Data Communication for Unmanned Aerial Vehicle (UAV) , 2017, ATCS/SePrIoT@SecureComm.

[11]  Li,et al.  Rough Outlier Detection Based Security Risk Analysis Methodology , 2012 .

[12]  Xue Zhang,et al.  ERDT: Energy-Efficient Reliable Decision Transmission for Intelligent Cooperative Spectrum Sensing in Industrial IoT , 2015, IEEE Access.

[13]  Xiangyu Zhou,et al.  Deep Belief Network for Meteorological Time Series Prediction in the Internet of Things , 2019, IEEE Internet of Things Journal.

[14]  Weiqing Sun,et al.  Cyber security threat analysis and modeling of an unmanned aerial vehicle system , 2012, 2012 IEEE Conference on Technologies for Homeland Security (HST).

[15]  Paul Ammann,et al.  Using model checking to analyze network vulnerabilities , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[16]  Zhuhua Cai,et al.  Software Vulnerability Discovery Techniques: A Survey , 2012, 2012 Fourth International Conference on Multimedia Information Networking and Security.

[17]  Jürgen Schmidhuber,et al.  LSTM: A Search Space Odyssey , 2015, IEEE Transactions on Neural Networks and Learning Systems.

[18]  Herbert Bos,et al.  VUzzer: Application-aware Evolutionary Fuzzing , 2017, NDSS.

[19]  Okyeon Yi,et al.  Vulnerability Analysis and Security Modeling of MODBUS , 2016 .

[20]  Tom Bartman,et al.  Securing communications for SCADA and critical industrial systems , 2016, 2016 69th Annual Conference for Protective Relay Engineers (CPRE).

[21]  Shaohua Wan,et al.  A long video caption generation algorithm for big video data retrieval , 2019, Future Gener. Comput. Syst..

[22]  Yudong Zhang,et al.  On the Construction of Data Aggregation Tree With Maximizing Lifetime in Large-Scale Wireless Sensor Networks , 2016, IEEE Sensors Journal.

[23]  Naixue Xiong,et al.  Real Time MODBUS Transmissions and Cryptography Security Designs and Enhancements of Protocol Sensitive Information , 2015, Symmetry.

[24]  Kim-Kwang Raymond Choo,et al.  Multi-dimensional data indexing and range query processing via Voronoi diagram for internet of things , 2019, Future Gener. Comput. Syst..

[25]  Ciyun Lin,et al.  Research on Short-Term Traffic Flow Prediction Method Based on Similarity Search of Time Series , 2014 .

[26]  Xuyun Zhang,et al.  An edge computing-enabled computation offloading method with privacy preservation for internet of connected vehicles , 2019, Future Gener. Comput. Syst..

[27]  Yang Xiao,et al.  Cyber Security and Privacy Issues in Smart Grids , 2012, IEEE Communications Surveys & Tutorials.

[28]  Mehul Motani,et al.  An Optimal Cross-Layer Framework for Cognitive Radio Network Under Interference Temperature Model , 2016, IEEE Systems Journal.