Your Selections

SS, Narendra Kumar
Show Only

Collections

File Formats

Content Types

Dates

Sectors

Topics

Authors

Publishers

Affiliations

Events

   This content is not included in your SAE MOBILUS subscription, or you are not logged in.

Securing the Secret Key

KPIT Technologies-Narendra Kumar SS
Published 2019-01-16 by SAE International in United States
Recent advances in automotive technologies have paved way to a new era of connectivity. Advanced Driver Assistance Systems are getting deployed in automobiles; many companies are developing driverless cars; connected cars are no more a work of mere research. [1] Vehicle manufacturers are developing ways to interface mobile devices with vehicles. However, all these advances in technology has introduced security risks. Unlike traditional computing systems, the security risk of an automobile can be fatal and can result in loss of lives [2]. The in-vehicle network of an automobile was originally designed to operate in a closed environment and hence network security was not considered during its design [3]. Several studies have already shown that an in-vehicle network can be easily compromised and an intruder can take full control of the vehicle. Researchers are working on various ways to solve this problem. Securing the in-vehicle communication by encrypting the messages is one such way. This depends on the strength of the secret key used to encrypt the messages. In an automobile, these secret keys will be…
This content contains downloadable datasets
Annotation ability available
   This content is not included in your SAE MOBILUS subscription, or you are not logged in.

Practical Approaches for Detecting DoS Attacks on CAN Network

KPIT Technologies, Ltd.-Pallavi Kalyanasundaram, Venkatesh Kareti, Meghana Sambranikar, Narendra Kumar SS, Priti Ranadive
Published 2018-04-03 by SAE International in United States
Some of the recent studies reveal that it is possible to access the in-vehicle networks and inject malicious messages to alter the behavior of the vehicle. Researchers have shown that, it is possible to hack a car’s communication network and remotely take control of brake, steering, power window systems, etc. Hence, it becomes inevitable to implement schemes that detect anomalies and prevent attacks on Controller Area Network (CAN). Our work explores the complete anomaly detection process for CAN. We cover the techniques followed, available tools and challenges at every stage. Beginning with what makes CAN protocol vulnerable, we discuss case studies about attacks on CAN with major focus on Denial of Service (DoS) attack. We analyze the pattern of normal CAN messages obtained from real vehicle, along with patterns of simulated attack data using different methods/tools. The work in this paper presents a statistical data analysis based machine learning algorithm with two approaches “time-based” and “message-based” to detect DoS attack on CAN bus. Comparative analysis of observations and accuracy results are highlighted. The average accuracy…
This content contains downloadable datasets
Annotation ability available