Communities & Collections
Researchers & Labs
Titles
DGIST
LIBRARY
DGIST R&D
Detail View
Department of Electrical Engineering and Computer Science
CSP(Communication and Signal Processing) Lab
1. Journal Articles
CAN에서의 자기상관 기반 침입 탐지 시스템
Jeong, Woojin
;
Choi, Eunmin
;
Choi, Ji-Woong
Department of Electrical Engineering and Computer Science
CSP(Communication and Signal Processing) Lab
1. Journal Articles
Citations
WEB OF SCIENCE
Citations
SCOPUS
Metadata Downloads
XML
Excel
Title
CAN에서의 자기상관 기반 침입 탐지 시스템
Alternative Title
Autocorrelation-based Intrusion Detection System for Controller Area Network (CAN)
DGIST Authors
Jeong, Woojin
;
Choi, Eunmin
;
Choi, Ji-Woong
Issued Date
2021-02
Citation
Jeong, Woojin. (2021-02). CAN에서의 자기상관 기반 침입 탐지 시스템. doi: 10.5302/J.ICROS.2021.20.0191
Type
Article
Author Keywords
Autocorrelation
;
Controller area network (CAN)
;
Intrusion detection system (IDS)
;
Source node identification
Keywords
Agricultural robots
;
Authentication
;
Autocorrelation
;
Computer crime
;
Control system synthesis
;
Controllers
;
Correlation detectors
;
Cryptography
;
Embedded systems
;
Process control
;
Bus topology
;
Controller area network
;
Encryption protocols
;
Human lives
;
Intrusion Detection Systems
;
Physical layer security
;
Source nodes
;
System robustness
;
Intrusion detection
ISSN
1976-5622
Abstract
This paper proposes an autocorrelation-based intrusion detection system for a controller area network (CAN). The CAN is a bus topology network used in cyber-physical systems such as vehicles, robots, and trains. As the applications of the CAN are closely related to human life, and any malfunctions may lead to accidents, the system robustness is critical. However, the CAN is vulnerable to attacks because no authentication or encryption exists in the CAN protocol. The proposed system uses the autocorrelation of the CAN signals to identify the source node and detects the attack signals. Moreover, we evaluate the performance of the proposed system through a simulation and in a real-car environment. As the proposed system involves physical layer security, no modification of the CAN protocol is necessary. In addition, redundant security can be implemented when the system is applied with authentication or encryption protocols. © ICROS 2021.
URI
http://hdl.handle.net/20.500.11750/13474
DOI
10.5302/J.ICROS.2021.20.0191
Publisher
제어·로봇·시스템학회
Show Full Item Record
File Downloads
There are no files associated with this item.
공유
공유하기
Related Researcher
Choi, Ji-Woong
최지웅
Department of Electrical Engineering and Computer Science
read more
Total Views & Downloads