2017 IEEE Workshop on Information Forensics and Security (WIFS) 2017
DOI: 10.1109/wifs.2017.8267643
|View full text |Cite
|
Sign up to set email alerts
|

Linking received packet to the transmitter through physical-fingerprinting of controller area network

Abstract: Abstract-The Controller Area Network (CAN) bus serves as a legacy protocol for in-vehicle data communication. Simplicity, robustness, and suitability for real-time systems are the salient features of the CAN bus protocol. However, it lacks the basic security features such as massage authentication, which makes it vulnerable to the spoofing attacks. In a CAN network, linking CAN packet to the sender node is a challenging task. This paper aims to address this issue by developing a framework to link each CAN pack… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
21
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 34 publications
(21 citation statements)
references
References 9 publications
0
21
0
Order By: Relevance
“…However, the CAN is nowadays connected to the driver and the external world through smartphones and tablets plugged in through Bluetooth or USB ports. This paves the way to security attacks to the car and to privacy leaks of the transferred data, as Checkoway et al, 8 Koscher et al, 6 and Avatefipour et al 40 show. Such articles exemplify how an attacker can get complete control over the vehicle's systems 8 .…”
Section: Related Workmentioning
confidence: 93%
“…However, the CAN is nowadays connected to the driver and the external world through smartphones and tablets plugged in through Bluetooth or USB ports. This paves the way to security attacks to the car and to privacy leaks of the transferred data, as Checkoway et al, 8 Koscher et al, 6 and Avatefipour et al 40 show. Such articles exemplify how an attacker can get complete control over the vehicle's systems 8 .…”
Section: Related Workmentioning
confidence: 93%
“…However, the proposed IDS did not attempt to utilize features of the CAN message time series and was therefore only able to authenticate ECUs sending periodic CAN messages and not those that send periodic messages, which are likely spoofing frames. In [4,5], the classification of electrical CAN signal using a support vector machine (SVM), a neural network (NN), and a bagged decision tree (BDT) was investigated. In [4], by comparing time and frequency domain features of physical CAN signal with an extended CAN ID field, an even lower average misclassification rate at 0.36% was reported.…”
Section: Related Work and Motivationmentioning
confidence: 99%
“…In [4,5], the classification of electrical CAN signal using a support vector machine (SVM), a neural network (NN), and a bagged decision tree (BDT) was investigated. In [4], by comparing time and frequency domain features of physical CAN signal with an extended CAN ID field, an even lower average misclassification rate at 0.36% was reported.…”
Section: Related Work and Motivationmentioning
confidence: 99%
See 1 more Smart Citation
“…For this reason, artificial impairments are added to the signal and increase classification accuracy. Still in the same context, the work in [1] deals with wired communications to increase security and prevent intrusion of malicious systems in the network inside a car.…”
Section: Introductionmentioning
confidence: 99%