2020
DOI: 10.3390/smartcities3010002
|View full text |Cite
|
Sign up to set email alerts
|

Identify a Spoofing Attack on an In-Vehicle CAN Bus Based on the Deep Features of an ECU Fingerprint Signal

Abstract: An in-vehicle controller area network (CAN) bus is vulnerable because of increased sharing among modern autonomous vehicles and the weak protocol design principle. Spoofing attacks on a CAN bus can be difficult to detect and have the potential to enable devastating attacks. To effectively identify spoofing attacks, we propose the authentication of sender identities using a recurrent neural network with long short-term memory units (RNN-LSTM) based on the features of a fingerprint signal. We also present a way … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 36 publications
(10 citation statements)
references
References 19 publications
0
10
0
Order By: Relevance
“…As a potential application, an enhanced automotive CAN bus network [7] can be implemented based on a new structure relying on an authentication technique [8,9,10]. Considering the issue that a CAN bus lacks the security features such as message authentication and is therefore vulnerable to spoofing attacks [11,12,13], an effective solution may consist in implementing a hash process. Each message on the bus must be hashed with a key using a hash algorithm to form a message authentication code (MAC), thus allowing each node to check the authenticity of a received message.…”
Section: Introductionmentioning
confidence: 99%
“…As a potential application, an enhanced automotive CAN bus network [7] can be implemented based on a new structure relying on an authentication technique [8,9,10]. Considering the issue that a CAN bus lacks the security features such as message authentication and is therefore vulnerable to spoofing attacks [11,12,13], an effective solution may consist in implementing a hash process. Each message on the bus must be hashed with a key using a hash algorithm to form a message authentication code (MAC), thus allowing each node to check the authenticity of a received message.…”
Section: Introductionmentioning
confidence: 99%
“…Automotive suppliers and vendors have also explored hybrid FPGA-based ECUs for improved functional consolidation and reliability [19]. Specifically for network security, ML-based anomaly detection (bit-timing [52], transmission timing [53]) models, probabilistic attack models [54] and generalised multi-attack detection models [37], [38] have leveraged FPGA platforms for improved latency and detection performance. With the rising computational complexity in vehicles, it is expected that hybrid FPGA based ECUs will gain more traction for complex vehicular functions.…”
Section: Machine Learning On Fpgasmentioning
confidence: 99%
“…Their work had a low detection rate when compared to other ML algorithms. Yang et al [ 33 ] proposed an IDS using a recurrent neural network with long short-term memory (RNN-LSTM). The selected model had a higher validation accuracy score especially for detecting only spoofing attacks in the CAN network traffic, which motivates additional research into this field to detect other cyber-attacks.…”
Section: Background and Related Workmentioning
confidence: 99%