2023
DOI: 10.1016/j.vehcom.2023.100652
|View full text |Cite
|
Sign up to set email alerts
|

CAVIDS: Real time intrusion detection system for connected autonomous vehicles using logical analysis of data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
0
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 42 publications
0
0
0
Order By: Relevance
“…It becomes challenging to confirm the legitimacy and integrity of the messages transferred across the network in the absence of adequate authentication procedures. Due to the lack of encryption, CAN network data transmissions are vulnerable to eavesdropping and unauthorized access (Kumar & Das, 2023;Palaniswamy et al, 2020). Due to the lack of authentication in the CAN protocol, it is possible to masquerade an ECU or replace a legitimate ECU with a malicious one using a hardware device (Boudguiga et al, 2016).…”
Section: Overview Of Can Protocol In Vehiclesmentioning
confidence: 99%
See 1 more Smart Citation
“…It becomes challenging to confirm the legitimacy and integrity of the messages transferred across the network in the absence of adequate authentication procedures. Due to the lack of encryption, CAN network data transmissions are vulnerable to eavesdropping and unauthorized access (Kumar & Das, 2023;Palaniswamy et al, 2020). Due to the lack of authentication in the CAN protocol, it is possible to masquerade an ECU or replace a legitimate ECU with a malicious one using a hardware device (Boudguiga et al, 2016).…”
Section: Overview Of Can Protocol In Vehiclesmentioning
confidence: 99%
“…In order to avoid disastrous crashes and disruptive effects, real-time intrusion detection with little processing resources is required. In order to enable real-time intrusion detection in CAVs with the least amount of processing resources, Kumar and Das (2023) suggested an intrusion detection approach based on logical analysis of data. The result showed a FP rate of 0.078.…”
Section: For Intrusion Detectionmentioning
confidence: 99%