Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

MAuth-CAN: Masquerade-Attack-Proof Authentication for In-Vehicle Networks

Full metadata record
DC Field Value Language
dc.contributor.authorJo, Hyo Jin-
dc.contributor.authorKim, Jin Hyun-
dc.contributor.authorChoi, Hyon-Young-
dc.contributor.authorChoi, Wonsuk-
dc.contributor.authorLee, Dong Hoon-
dc.contributor.authorLee, Insup-
dc.date.accessioned2021-08-31T11:24:21Z-
dc.date.available2021-08-31T11:24:21Z-
dc.date.created2021-06-18-
dc.date.issued2020-02-
dc.identifier.issn0018-9545-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/57797-
dc.description.abstractNumerous hacking attempts on modern vehicles have recently demonstrated that an adversary can remotely control a vehicle using vulnerable telematics services. In these attempts, a masquerade attack impersonating some safety-critical electronic control units (ECUs) is usually performed to control a vehicle. In the last decade, several message authentication protocols for controller area network (CAN) have been proposed to protect vehicles from masquerade attacks. However, some message authentication protocols are not enough to protect a vehicle from masquerade attacks by compromised ECUs. Other protocols that are secure against masquerade attacks fill the network capacity of CAN up to 100% or require hardware modifications of the CAN-controller, dedicated hardware used for CAN communications. In this paper, we propose a new authentication protocol, MAuth-CAN, that is secure against masquerade attacks. MAuth-CAN neither fills up to 100% of the network capacity nor requires hardware modifications of a CAN-controller. In addition, we propose a technique that protects ECUs from bus-off attacks, and apply the technique to MAuth-CAN for handling bus-off attacks.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC-
dc.titleMAuth-CAN: Masquerade-Attack-Proof Authentication for In-Vehicle Networks-
dc.typeArticle-
dc.contributor.affiliatedAuthorLee, Dong Hoon-
dc.identifier.doi10.1109/TVT.2019.2961765-
dc.identifier.scopusid2-s2.0-85079777424-
dc.identifier.wosid000519957800085-
dc.identifier.bibliographicCitationIEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, v.69, no.2, pp.2204 - 2218-
dc.relation.isPartOfIEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY-
dc.citation.titleIEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY-
dc.citation.volume69-
dc.citation.number2-
dc.citation.startPage2204-
dc.citation.endPage2218-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalResearchAreaTransportation-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.relation.journalWebOfScienceCategoryTransportation Science & Technology-
dc.subject.keywordAuthorAuthentication-
dc.subject.keywordAuthorController Area Network-
dc.subject.keywordAuthorMasquerade attack-
dc.subject.keywordAuthorDual CAN-controller-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Dong Hoon photo

Lee, Dong Hoon
정보보호학과
Read more

Altmetrics

Total Views & Downloads

BROWSE