2014
DOI: 10.1109/lsp.2014.2304139
|View full text |Cite
|
Sign up to set email alerts
|

Source Identification Using Signal Characteristics in Controller Area Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
63
1

Year Published

2018
2018
2021
2021

Publication Types

Select...
4
3
3

Relationship

0
10

Authors

Journals

citations
Cited by 134 publications
(64 citation statements)
references
References 4 publications
0
63
1
Order By: Relevance
“…Statistical features represent the various characteristics of a sampled signal. As a result, numerous studies on signal processing and wireless communication area employed statistical features for node or channel identification [33], [34], [54]. Since the hardware characteristics of an attack device and channel condition affect the signal characteristics, we employed the statistical features to differentiate an attack signal.…”
Section: Feature Extractionmentioning
confidence: 99%
“…Statistical features represent the various characteristics of a sampled signal. As a result, numerous studies on signal processing and wireless communication area employed statistical features for node or channel identification [33], [34], [54]. Since the hardware characteristics of an attack device and channel condition affect the signal characteristics, we employed the statistical features to differentiate an attack signal.…”
Section: Feature Extractionmentioning
confidence: 99%
“…Observation time of IDS Given that CAN has a preset tight bit budget for messages and resource-constrained ECUs have real-time requirements, it has not been a practical option to incorporate cryptographic primitives as in [8]- [10] into CAN. As an alternative, Intrusion Detection Systems (IDSs) have been proposed that exploit physical properties such as message periodicity and network entropy without modifying the CAN protocol [11]- [14].…”
Section: Accumulated Offsetmentioning
confidence: 99%
“…However, in our case, these features are utilized to attack the system. The authors in [19] use simple features such as meansquare error between bit samples, and convolution amplitude to fingerprint and identify the ECUs. However, the performance of these mechanisms is highly dependent on the message value, which can vary significantly for our schemes.…”
Section: Intrusion Detection Systems (Ids) Based On Can Signal Characmentioning
confidence: 99%