2021
DOI: 10.1109/access.2020.3046862
|View full text |Cite
|
Sign up to set email alerts
|

Clock-Based Sender Identification and Attack Detection for Automotive CAN Network

Abstract: Building the security mechanism for Controller Area Network (CAN) to defend against attack has drawn substantial attention recently. Fingerprinting ECUs to provide the ability of authentication based on the physical characteristics can protect the CAN network effectively. The clock skew which is unique and stable can be exploited to pinpoint the attacker and detect intrusion. However, a common downside of existing clock-skew-based approaches is that the estimation process can be affected by the message schedul… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(10 citation statements)
references
References 31 publications
0
10
0
Order By: Relevance
“…The method is described in [12], where N represents the number of data frames required for fingerprint extraction;…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…The method is described in [12], where N represents the number of data frames required for fingerprint extraction;…”
Section: Resultsmentioning
confidence: 99%
“…We have configured the three ECU message simulation modules to send messages with different intervals. Specifically, module #1 is set to transmit messages with ID 38A at intervals of 10 ms, module #2 is set to transmit messages with ID 0BA at intervals of 25 ms, and module #3 is set to transmit messages with ID 2B6 at intervals of 500 ms. Then The method is described in [11]; c The method is described in [12], where N represents the number of data frames required for fingerprint extraction; d The method is described in [6].…”
Section: Intrusion Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…The detection approaches can be broadly categorized into either rule-based, where humans design detection rules manually, or ML-based, where an ML model is trained from data. Rule-based approaches include: methods based on physical fingerprints, e.g., clock [59] or voltage measurements [14]; methods based on message timing [39,44] or frequency [48]; methods based on message ID entropy [51] or Hamming distance [46], and many others. Due to the increasing complexity and diversity of in-vehicle network workloads, rule-based methods are generally viewed as not as accurate or flexible/adaptable as ML-based methods [56].…”
Section: Related Workmentioning
confidence: 99%
“…When the skews are similar or they are both still at a certain threshold, the device is called a valid device. Other area exploring clock skew are distributed anonymity architecture [20], [27], non-cryptography security [28], [35] and wireless sensor network [32], [33]. All areas used clock skew depends on the accurate value of the measured clock skew.…”
Section: Introductionmentioning
confidence: 99%