Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Identifying ECUs Using Inimitable Characteristics of Signals in Controller Area Networks

Full metadata record
DC Field Value Language
dc.contributor.authorChoi, Wonsuk-
dc.contributor.authorJo, Hyo Jin-
dc.contributor.authorWoo, Samuel-
dc.contributor.authorChun, Ji Young-
dc.contributor.authorPark, Jooyoung-
dc.contributor.authorLee, Dong Hoon-
dc.date.accessioned2021-09-02T10:42:13Z-
dc.date.available2021-09-02T10:42:13Z-
dc.date.created2021-06-19-
dc.date.issued2018-06-
dc.identifier.issn0018-9545-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/75078-
dc.description.abstractAs the functions of vehicles are more computerized for the safety and convenience of drivers, attack surfaces of vehicle are accordingly increasing. Many attack results have shown that an attacker could intentionally control vehicles. Most of them exploit the vulnerability that controller area network (CAN) protocol, a de-facto standard for the in-vehicle networks, does not support message origin authentication. Although a number of methods to resolve this security vulnerability have been suggested, they have their each limitation to be applied into the current system. They have required either the modification of the CAN standard or dramatical communication load increase, which is infeasible in practice. In this paper, we propose a novel identification method, which works in the physical layer of the in-vehicle CAN network. Our method identifies electronic control units (ECUs) using inimitable characteristics of electrical CAN signals enabling detection of a malicious ECU. Unlike previous attempts to address the security problem in the in-vehicle CAN network, our method works by simply adding a monitoring unit to the existing network, making it deployable in current systems and compliant with required CAN standards. Our experimental results show that our method is able to correctly identify ECUs. In case of misclassfication rate for ECU idnetification, our method yields 0.36% in average which is approximate four times lower than the method proposed by P.-S. Murvay et al. This paper is also the first to identify potential attack models that systems should be able to detect.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC-
dc.subjectMOBILE SOCIAL NETWORKS-
dc.subjectAUTHENTICATION PROTOCOL-
dc.subjectROAD NETWORKS-
dc.subjectIDENTIFICATION-
dc.subjectSYSTEMS-
dc.subjectFRAMEWORK-
dc.titleIdentifying ECUs Using Inimitable Characteristics of Signals in Controller Area Networks-
dc.typeArticle-
dc.contributor.affiliatedAuthorPark, Jooyoung-
dc.contributor.affiliatedAuthorLee, Dong Hoon-
dc.identifier.doi10.1109/TVT.2018.2810232-
dc.identifier.scopusid2-s2.0-85042853013-
dc.identifier.wosid000435553400006-
dc.identifier.bibliographicCitationIEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, v.67, no.6, pp.4757 - 4770-
dc.relation.isPartOfIEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY-
dc.citation.titleIEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY-
dc.citation.volume67-
dc.citation.number6-
dc.citation.startPage4757-
dc.citation.endPage4770-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalResearchAreaTransportation-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.relation.journalWebOfScienceCategoryTransportation Science & Technology-
dc.subject.keywordPlusMOBILE SOCIAL NETWORKS-
dc.subject.keywordPlusAUTHENTICATION PROTOCOL-
dc.subject.keywordPlusROAD NETWORKS-
dc.subject.keywordPlusIDENTIFICATION-
dc.subject.keywordPlusSYSTEMS-
dc.subject.keywordPlusFRAMEWORK-
dc.subject.keywordAuthorController Area Network-
dc.subject.keywordAuthorElectronic Control Unit-
dc.subject.keywordAuthorAutomotive ID-
dc.subject.keywordAuthorDevice Fingerprinting-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Science and Technology > Department of Electro-Mechanical Systems Engineering > 1. Journal Articles
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Dong Hoon photo

Lee, Dong Hoon
정보보호학과
Read more

Altmetrics

Total Views & Downloads

BROWSE