Proceedings of the 1st International Workshop on Safe Control of Connected and Autonomous Vehicles 2017
DOI: 10.1145/3055378.3055382
|View full text |Cite
|
Sign up to set email alerts
|

Using ID-Hopping to Defend Against Targeted DoS on CAN

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
11
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 26 publications
(12 citation statements)
references
References 14 publications
1
11
0
Order By: Relevance
“…The T 1 of the similarity-based IDS meets the 10 ms of the requirement, whereas the entropy-based IDS's T 1 does not meet the requirement. Thus, we confirmed that the similarity-based Incidentally, in ID-Hopping Mechanism [6]- [8] which avoids Targeted DoS attacks, the average overhead required for AES encryption to generate a one-time ID and for newly setting the CAN ID register are 20.23 µs and 0.2 µs respectively. Therefore, the impact of achieving rapid IDS 14 µs faster than the entropy-based IDS is worth to cancel the overhead for utilizing the conventional IDS and the ID-Hopping Mechanism together.…”
Section: B Detection Timesupporting
confidence: 74%
See 2 more Smart Citations
“…The T 1 of the similarity-based IDS meets the 10 ms of the requirement, whereas the entropy-based IDS's T 1 does not meet the requirement. Thus, we confirmed that the similarity-based Incidentally, in ID-Hopping Mechanism [6]- [8] which avoids Targeted DoS attacks, the average overhead required for AES encryption to generate a one-time ID and for newly setting the CAN ID register are 20.23 µs and 0.2 µs respectively. Therefore, the impact of achieving rapid IDS 14 µs faster than the entropy-based IDS is worth to cancel the overhead for utilizing the conventional IDS and the ID-Hopping Mechanism together.…”
Section: B Detection Timesupporting
confidence: 74%
“…There are three types of DoS attacks on CAN according to the report [6] Here, we describe that the realization of the entropymanipulated attack. Firstly, after an adversary intrudes an ECU from some external network, the adversary sniffs the messages of CAN.…”
Section: ) Attack Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…ID hopping: Humayed and Luo [11] proposed an ID hopping method to prevent target DoS attack. When the attack was detected, the proposed method changed IDs by adding an offset to original IDs.…”
Section: Related Workmentioning
confidence: 99%
“…• A range division algorithm divides the all ID spaces (2 11 ) into random sizes. Through the key, H, and RN, a range division algorithm distributes the range randomly each session.…”
Section: ) Substitution Table Initializationmentioning
confidence: 99%