Detail View

Adaptive Controller Area Network Intrusion Detection System Considering Temperature Variations
Citations

WEB OF SCIENCE

Citations

SCOPUS

Metadata Downloads

Title
Adaptive Controller Area Network Intrusion Detection System Considering Temperature Variations
Issued Date
2022-10
Citation
Jeong, Woojin. (2022-10). Adaptive Controller Area Network Intrusion Detection System Considering Temperature Variations. IEEE Transactions on Information Forensics and Security, 17, 3925–3933. doi: 10.1109/TIFS.2022.3217389
Type
Article
Author Keywords
Controller area network (CAN)intrusion detection system (IDS)transmitter identificationtemperaturephysical-layer security
ISSN
1556-6013
Abstract

Security threats increase as connectivity among vehicles increases. In particular, a lack of authentication, integrity, and confidentiality makes the controller area network (CAN) protocol, which is used in critical domains such as vehicle body and powertrain, vulnerable to threats. In this paper, we propose methods for CAN security enhancement that use a support vector machine (SVM) and the autocorrelation of the received signal to detect a malicious node. Robustness to temperature variation is also considered because autocorrelation is affected by temperature variation. There are two methods based on the degree of uniformity of the temperature distribution. If the temperature is uniformly distributed over the vehicle and the temperature sensor is embedded in the secure node, the first scheme (temperature measurement system) trains data in each segmented temperature range more precisely using multiple classifiers. If not (i.e., a nonuniform temperature distribution or an absence of a temperature sensor), the alternative scheme (all-temperature training system) trains data in all temperature ranges with a single classifier. The performances of the proposed systems are evaluated on a testbed. The proposed method can operate without modifying the CAN protocol because it is based on the characteristics of the physical layer. In addition, security can be enhanced redundantly by the system running independently without authentication protocols. IEEE

더보기
URI
http://hdl.handle.net/20.500.11750/17364
DOI
10.1109/TIFS.2022.3217389
Publisher
Institute of Electrical and Electronics Engineers Inc.
Show Full Item Record

File Downloads

  • There are no files associated with this item.

공유

qrcode
공유하기

Related Researcher

최지웅
Choi, Ji-Woong최지웅

Department of Electrical Engineering and Computer Science

read more

Total Views & Downloads