This content is not included in
your SAE MOBILUS subscription, or you are not logged in.
Exploiting Channel Distortion for Transmitter Identification for In-Vehicle Network Security
Journal Article
11-02-02-0005
ISSN: 2572-1046, e-ISSN: 2572-1054
Sector:
Citation:
Hafeez, A., Ponnapali, S., and Malik, H., "Exploiting Channel Distortion for Transmitter Identification for In-Vehicle Network Security," SAE Int. J. Transp. Cyber. & Privacy 3(1):5-17, 2020, https://doi.org/10.4271/11-02-02-0005.
Language:
English
References
- Shin , K.G. and Kyusuk , H. May 10, 2018
- Marchetti , M. and Stabili , D. Read: Reverse Engineering of Automotive Data Frames IEEE Transactions on Information Forensics and Security 14 4 1083 1097 2018
- Liu , J. , Zhang , S. , Sun , W. , and Shi , Y. In-Vehicle Network Attacks and Countermeasures: Challenges and Future Directions IEEE Network 31 5 50 58 2017
- Fröschle , S. and Stühring , A. Analyzing the Capabilities of the Can Attacker European Symposium on Research in Computer Security Oslo, Norway Springer 2017 464 482
- Miller , C. and Valasek , C. A Survey of Remote Automotive Attack Surfaces Black Hat USA 2014 94
- Koscher , K. , Czeskis , A. , Roesner , F. , Patel , S. et al. Experimental Security Analysis of a Modern Automobile 2010 IEEE Symposium on Security and Privacy Claremont Resort, Berkeley, CA, USA IEEE 2010 447 462
- Checkoway , S. , McCoy , D. , Kantor , B. , Anderson , D. et al. Comprehensive Experimental Analyses of Automotive Attack Surfaces USENIX Security Symposium San Francisco 2011 4 447 462
- Petit , J. and Shladover , S.E. Potential Cyberattacks on Automated Vehicles IEEE Transactions on Intelligent Transportation Systems 16 2 546 556 2014
- Gierlichs , B. and Poschmann , A.Y. Cryptographic Hardware and Embedded Systems-CHES 2016 Santa Barbara, CA, USA Springer 2016
- Hazem , A. and Fahmy , H.A. LCAP-a Lightweight Can Authentication Protocol for Securing In-Vehicle Networks 10th ESCAR Embedded Security in Cars Conference Berlin, Germany 2012 6
- Doan , T.P. and Ganesan , S. Can Crypto FPGA Chip to Secure Data Transmitted Through Can FD Bus Using AES-128 and SHA-1 Algorithms with a Symmetric Key SAE Technical Paper 2017-01-1612 2017 https://doi.org/10.4271/2017-01-1612
- Ueda , H. , Kurachi , R. , Takada , H. , Mizutani , T. et al. Security Authentication System for In-Vehicle Network SEI Technical Review 81 5 9 2015
- Sugashima , T. , Oka , D.K. , and Vuillaume , C. Approaches for Secure and Efficient In-Vehicle Key Management SAE Int. J. Passeng. Cars - Electron. Electr. Syst. 9 1 100 106 2016 https://doi.org/10.4271/2016-01-0070
- Hafeez , A. , Malik , H. , Avatefipour , O. , Rongali , P.R. et al. Comparative Study of Can-Bus and Flexray Protocols for In-Vehicle Communication SAE Technical Paper 2017-01-0017 2017 https://doi.org/10.4271/2017-01-0017
- Wolf , M. , Weimerskirch , A. , and Paar , C. Security in Automotive Bus Systems Workshop on Embedded Security in Cars Bochum, Germany 2004
- Lee , H. , Jeong , S.H. , and Kim , H.K. Otids: A Novel Intrusion Detection System for In-Vehicle Network by Using Remote Frame 2017 15th Annual Conference on Privacy, Security and Trust (PST) IEEE Calgary, Alberta, Canada 2017 57 5709
- Taylor , A. , Japkowicz , N. , and Leblanc , S. Frequency-Based Anomaly Detection for the Automotive Can Bus 2015 World Congress on Industrial Control Systems Security (WCICSS) United Kingdom IEEE 2015 45 49
- Song , H.M. , Kim , H.R. , and Kim , H.K. Intrusion Detection System Based on the Analysis of Time Intervals of Can Messages for In-Vehicle Network 2016 International Conference on Information Networking (ICOIN) Kota Kinabalu, Malaysia IEEE 2016 63 68
- Marchetti , M. , Stabili , D. , Guido , A. , and Colajanni , M. Evaluation of Anomaly Detection for In-Vehicle Networks through Information-Theoretic Algorithms 2016 IEEE 2nd International Forum on Research and Technologies for Society and Industry Leveraging a Better Tomorrow (RtSi) Bologna, Italy IEEE 2016 1 6
- Wu , W. , Huang , Y. , Kurachi , R. , Zeng , G. et al. Sliding Window Optimized Information Entropy Analysis Method for Intrusion Detection on In-Vehicle Networks IEEE Access 6 45233 45245 2018
- Stabili , D. , Marchetti , M. , and Colajanni , M. Detecting Attacks to Internal Vehicle Networks through Hamming Distance 2017 AEIT International Annual Conference Cagliari, Italy IEEE 2017 1 6
- Taylor , A. , Leblanc , S. , and Japkowicz , N. Anomaly Detection in Automobile Control Network Data with Long Short-Term Memory Networks 2016 IEEE International Conference on Data Science and Advanced Analytics (DSAA) Montreal, Canada IEEE 2016 130 139
- Kang , M.-J. and Kang , J.-W. Intrusion Detection System Using Deep Neural Network for In-Vehicle Network Security PloS One 11 6 e0155781 2016
- Markovitz , M. and Wool , A. Field Classification, Modeling and Anomaly Detection in Unknown Can Bus Networks Vehicular Communications 9 43 52 2017
- Jain , N. and Sharma , S. The Role of Decision Tree Technique for Automating Intrusion Detection System International Journal of Computational Engineering Research (ijceronline. com) 2 4 1076 1078 2012
- Rieke , R. , Seidemann , M. , Talla , E.K. , Zelle , D. et al. Behavior Analysis for Safety and Security in Automotive Systems 2017 25th Euromicro International Conference on Parallel, Distributed and Network-based Processing (PDP) St. Petersburg, Russia IEEE 2017 381 385
- Narayanan , S.N. , Mittal , S. , and Joshi , A. : 2015
- Marchetti , M. and Stabili , D. Anomaly Detection of Can Bus Messages through Analysis of ID Sequences 2017 IEEE Intelligent Vehicles Symposium (IV) California, USA IEEE 2017 1577 1583
- Choi , W. , Joo , K. , Jo , H.J. , Park , M.C. et al. Voltageids: Low-Level Communication Characteristics for Automotive Intrusion Detection System IEEE Transactions on Information Forensics and Security 13 8 2114 2129 2018
- Cho , K.T. and Shin , K.G. Viden: Attacker Identification on In-Vehicle Networks Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security Dallas, Texas, USA ACM 2017 1109 1123
- Kneib , M. and Huth , C. Scission: Signal Characteristic-Based Sender Identification and Intrusion Detection in Automotive Networks Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security Toronto, Canada ACM 2018 787 800
- Choi , W. , Jo , H.J. , Woo , S. , Chun , J.Y. et al. Identifying ECUS Using Inimitable Characteristics of Signals in Controller Area Networks IEEE Transactions on Vehicular Technology 67 6 4757 4770 2018
- Cho , K.T. and Shin , K.G. Fingerprinting Electronic Control Units for Vehicle Intrusion Detection USENIX Security Symposium Austin, Texas 2016 911 927
- Avatefipour , O. , Hafeez , A. , Tayyab , M. , and Malik , H. Linking Received Packet to the Transmitter through Physical-Fingerprinting of Controller Area Network 2017 IEEE Workshop on Information Forensics and Security (WIFS) Rennes France IEEE 2017 1 6
- Groza , B. and Murvay , P.S. Efficient Intrusion Detection with Bloom Filtering in Controller Area Networks (CAN) IEEE Transactions on Information Forensics and Security 2018
- Hafeez , A. , Tayyab , M. , Zolo , C. , and Awad , S. Finger Printing of Engine Control Units by Using Frequency Response for Secure In-Vehicle Communication 2018 14th International Computer Engineering Conference (ICENCO) Cairo, Egypt IEEE 2018 79 83
- Wasicek , A. , Derler , P. , and Lee , E.A. Aspect-Oriented Modeling of Attacks in Automotive Cyber-Physical Systems 2014 51st ACM/EDaC/IEEE Design Automation Conference (DAC) San Francisco, USA IEEE 2014 1 6
- Wang , Q. and Sawhney , S. Vecure: A practical security framework to protect the can bus of vehicles 2014 International Conference on the Internet of Things (IOT) Cambridge, MA IEEE 2014 13 18
- Tayyab , M. , Hafeez , A. , and Malik , H. Spoofing Attack on Clock Based Intrusion Detection System in Controller Area Networks 2018 Ground Vehicle Systems Engineering and Technology Symposium, Proceedings GVSETS Novi, Michigan 2018
- Miller , C. and Valasek , C. Remote Exploitation of an Unaltered Passenger Vehicle Black Hat USA 2015 91
- Fuchsberger , A. Intrusion Detection Systems and Intrusion Prevention Systems Information Security Technical Report 10 3 134 139 2005
- Wu , W. , Li , R. , Xie , G. , An , J. et al. A Survey of Intrusion Detection for In-Vehicle Networks IEEE Transactions on Intelligent Transportation Systems 2019
- Han , M.L. , Lee , J. , Kang , A.R. , Kang , S. et al. A Statistical-Based Anomaly Detection Method for Connected Cars in Internet of Things Environment International Conference on Internet of Vehicles Chengdu, China Springer 2015 89 97
- Wang , E. , Xu , W. , Sastry , S. , Liu , S. et al. Hardware Module-Based Message Authentication in Intra-Vehicle Networks 2017 ACM/IEEE 8th International Conference on Cyber-Physical Systems (ICCPS) Pittsburgh, Pennsylvania IEEE 2017 207 216
- Müter , M. and Asaj , N. Entropy-Based Anomaly Detection for In-Vehicle Networks 2011 IEEE Intelligent Vehicles Symposium (IV) Baden-Baden, Germany IEEE 2011 1110 1115
- Ulaby , F.T. , Michielssen , E. , and Ravaioli , U. Fundamentals of Applied Electromagnetics 6e Boston Prentice Hall 2001
- Malik , H. Steganalysis of QIM Steganography Using Irregularity Measure Proceedings of the 10th ACM Workshop on Multimedia and Security New York, NY, United States 2008 149 158
- Møller , M.F. A Scaled Conjugate Gradient Algorithm for Fast Supervised Learning Neural Networks 6 4 525 533 1993