2022
DOI: 10.1109/tdsc.2021.3068213
|View full text |Cite
|
Sign up to set email alerts
|

Covert Channel-Based Transmitter Authentication in Controller Area Networks

Abstract: In recent years, the security of automotive Cyber-Physical Systems (CPSs) is facing urgent threats due to the widespread use of legacy in-vehicle communication systems. As a representative legacy bus system, the Controller Area Network (CAN) hosts Electronic Control Units (ECUs) that are crucial for the vehicles functioning. In this scenario, malicious actors can exploit the CAN vulnerabilities, such as the lack of built-in authentication and encryption schemes, to launch CAN bus attacks (e.g., suspension, inj… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
17
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 16 publications
(17 citation statements)
references
References 26 publications
0
17
0
Order By: Relevance
“…Among the software solutions is TACAN [33], a covertchannel based solution. It shares a master key between an ECU and the Monitor Node to generate shared session keys.…”
Section: Related Workmentioning
confidence: 99%
“…Among the software solutions is TACAN [33], a covertchannel based solution. It shares a master key between an ECU and the Monitor Node to generate shared session keys.…”
Section: Related Workmentioning
confidence: 99%
“…The covert traffic is encoded within the output noise of the covertly-transmitting sensor, whose distribution is indistinguishable from that of a benign sensor. Finally, in [34], Ying et al utilised covert channels to build an effective defensive technique that facilitates transmitter authentication via a trusted monitor node for automotive applications. In particular, the authors presented transmitter authentication for controller area network (TACAN), which provides secure authentication of electronic control units (ECUs) by exploiting the covert channels without introducing CAN protocol modifications or traffic overheads.…”
Section: Related Workmentioning
confidence: 99%
“…Security solutions for CAN can be broadly classified into schemes that add cryptographic measures to the CAN bus [8]- [10], [18] and anomaly-based IDSs that 1) analyze the traffic on the CAN bus including message contents [19]- [21], timing/frequency [15], [22]- [25], entropy [26], and survival rates [27], 2) exploit the physical characteristics of ECUs extracted from in-vehicle sensing data [28]- [30] or measurements [11], [13], [14], [31], [32], and 3) exploit the characteristics of the CAN protocol, such as the remote frame [33]. Compared to the CAN traffic, it is more difficult for adversaries to imitate the physical characteristics of ECUs, such as the mean squared error of voltage measurements [11].…”
Section: Related Workmentioning
confidence: 99%