2022
DOI: 10.1007/978-3-031-08819-3_10
|View full text |Cite
|
Sign up to set email alerts
|

Efficient CAN Dataset Collection Method for Accurate Security Threat Analysis on Vehicle Internal Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 7 publications
0
1
0
Order By: Relevance
“…Its main functions include simulation, test analysis, and development. It can not only simulate and analyze the traditional CAN bus based on the real network environment, but also analyze almost all vehicle network protocols [37], including vehicle Ethernet, so it is widely used by many developers and scholars. We leverage CANoe's powerful capabilities to perform design analysis based on our solutions and SOME/IP protocol specifications.…”
Section: Improvement Scheme Performance Analysis and Methods Comparisonmentioning
confidence: 99%
“…Its main functions include simulation, test analysis, and development. It can not only simulate and analyze the traditional CAN bus based on the real network environment, but also analyze almost all vehicle network protocols [37], including vehicle Ethernet, so it is widely used by many developers and scholars. We leverage CANoe's powerful capabilities to perform design analysis based on our solutions and SOME/IP protocol specifications.…”
Section: Improvement Scheme Performance Analysis and Methods Comparisonmentioning
confidence: 99%
“…Although OBD-II is commonly used by researchers to collect data for diagnostic purposes, not all types of data can be collected through this method because not all ECUs are connected to the OBD-II port. In order to collect data from these ECUs, we use a method called ECU direct approach (EDA) [38], which involves collecting data directly from the internal gateway of the vehicle using line-tapping tools. The PEAK CAN system is used as an interfacing device to access the CAN network.…”
Section: Data Collectionmentioning
confidence: 99%