Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Identifying ECUs Using Inimitable Characteristics of Signals in Controller Area Networks

Authors
Choi, WonsukJo, Hyo JinWoo, SamuelChun, Ji YoungPark, JooyoungLee, Dong Hoon
Issue Date
6월-2018
Publisher
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
Keywords
Controller Area Network; Electronic Control Unit; Automotive ID; Device Fingerprinting
Citation
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, v.67, no.6, pp.4757 - 4770
Indexed
SCIE
SCOPUS
Journal Title
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
Volume
67
Number
6
Start Page
4757
End Page
4770
URI
https://scholar.korea.ac.kr/handle/2021.sw.korea/75078
DOI
10.1109/TVT.2018.2810232
ISSN
0018-9545
Abstract
As the functions of vehicles are more computerized for the safety and convenience of drivers, attack surfaces of vehicle are accordingly increasing. Many attack results have shown that an attacker could intentionally control vehicles. Most of them exploit the vulnerability that controller area network (CAN) protocol, a de-facto standard for the in-vehicle networks, does not support message origin authentication. Although a number of methods to resolve this security vulnerability have been suggested, they have their each limitation to be applied into the current system. They have required either the modification of the CAN standard or dramatical communication load increase, which is infeasible in practice. In this paper, we propose a novel identification method, which works in the physical layer of the in-vehicle CAN network. Our method identifies electronic control units (ECUs) using inimitable characteristics of electrical CAN signals enabling detection of a malicious ECU. Unlike previous attempts to address the security problem in the in-vehicle CAN network, our method works by simply adding a monitoring unit to the existing network, making it deployable in current systems and compliant with required CAN standards. Our experimental results show that our method is able to correctly identify ECUs. In case of misclassfication rate for ECU idnetification, our method yields 0.36% in average which is approximate four times lower than the method proposed by P.-S. Murvay et al. This paper is also the first to identify potential attack models that systems should be able to detect.
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Science and Technology > Department of Electro-Mechanical Systems Engineering > 1. Journal Articles
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Dong Hoon photo

Lee, Dong Hoon
정보보호학과
Read more

Altmetrics

Total Views & Downloads

BROWSE