2019 16th International Multi-Conference on Systems, Signals &Amp; Devices (SSD) 2019
DOI: 10.1109/ssd.2019.8893165
|View full text |Cite
|
Sign up to set email alerts
|

Cryptographic and Intrusion Detection System for automotive CAN bus: Survey and contributions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(9 citation statements)
references
References 7 publications
0
9
0
Order By: Relevance
“…Young et al [48] presented a very deep survey on IDS approaches. In [49], a detailed survey of security mechanisms is presented with focus on specifically on cryptography and IDS. Wu et al [50] presented the characteristics and constraints for designing the intrusion detection system (IDS).…”
Section: Related Existing Surveysmentioning
confidence: 99%
“…Young et al [48] presented a very deep survey on IDS approaches. In [49], a detailed survey of security mechanisms is presented with focus on specifically on cryptography and IDS. Wu et al [50] presented the characteristics and constraints for designing the intrusion detection system (IDS).…”
Section: Related Existing Surveysmentioning
confidence: 99%
“…[5] 42 LIN, CAN, FlexRay, Ethernet, MOST [6] 15 CAN [7] 25 CAN [16] 24 CAN [17] 6 CAN [18] 19 CAN [9] 9 CAN [19] 17 CAN The authors in [14] review cyberattacks and the relevant countermeasures for CANbased IVN. The paper gives a brief analysis of the main communication protocols (CAN, LIN, and FlexRay), but basically focuses on CAN only.…”
Section: Related Workmentioning
confidence: 99%
“…Moreover, 24 IDS approaches for the CAN bus are analyzed by [16] based on the information they extract from the network and the way they build their model. Additionally in the same direction, [17] proposes five criteria to classify CAN-based VIDS approaches: data source, detection method, data analysis location, analysis frequency, and behavior after detection. Besides describing some of the main CAN vulnerabilities, the authors analyze six papers considering such classification.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The scope of the survey papers already mentioned is limited to secure in-vehicle networks using IDS mechanisms while ignoring other potential solutions. Additionally, Gmiden et al (2019) provide a survey of the existing approaches interested in protecting CAN bus. Nonetheless, this work focuses only on cryptography based solutions.…”
Section: Sate-of-art Surveysmentioning
confidence: 99%