Identifying ECUs Using Inimitable Characteristics of Signals in Controller Area Networks
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Choi, Wonsuk | - |
dc.contributor.author | Jo, Hyo Jin | - |
dc.contributor.author | Woo, Samuel | - |
dc.contributor.author | Chun, Ji Young | - |
dc.contributor.author | Park, Jooyoung | - |
dc.contributor.author | Lee, Dong Hoon | - |
dc.date.accessioned | 2021-09-02T10:42:13Z | - |
dc.date.available | 2021-09-02T10:42:13Z | - |
dc.date.created | 2021-06-19 | - |
dc.date.issued | 2018-06 | - |
dc.identifier.issn | 0018-9545 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/75078 | - |
dc.description.abstract | As the functions of vehicles are more computerized for the safety and convenience of drivers, attack surfaces of vehicle are accordingly increasing. Many attack results have shown that an attacker could intentionally control vehicles. Most of them exploit the vulnerability that controller area network (CAN) protocol, a de-facto standard for the in-vehicle networks, does not support message origin authentication. Although a number of methods to resolve this security vulnerability have been suggested, they have their each limitation to be applied into the current system. They have required either the modification of the CAN standard or dramatical communication load increase, which is infeasible in practice. In this paper, we propose a novel identification method, which works in the physical layer of the in-vehicle CAN network. Our method identifies electronic control units (ECUs) using inimitable characteristics of electrical CAN signals enabling detection of a malicious ECU. Unlike previous attempts to address the security problem in the in-vehicle CAN network, our method works by simply adding a monitoring unit to the existing network, making it deployable in current systems and compliant with required CAN standards. Our experimental results show that our method is able to correctly identify ECUs. In case of misclassfication rate for ECU idnetification, our method yields 0.36% in average which is approximate four times lower than the method proposed by P.-S. Murvay et al. This paper is also the first to identify potential attack models that systems should be able to detect. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC | - |
dc.subject | MOBILE SOCIAL NETWORKS | - |
dc.subject | AUTHENTICATION PROTOCOL | - |
dc.subject | ROAD NETWORKS | - |
dc.subject | IDENTIFICATION | - |
dc.subject | SYSTEMS | - |
dc.subject | FRAMEWORK | - |
dc.title | Identifying ECUs Using Inimitable Characteristics of Signals in Controller Area Networks | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Park, Jooyoung | - |
dc.contributor.affiliatedAuthor | Lee, Dong Hoon | - |
dc.identifier.doi | 10.1109/TVT.2018.2810232 | - |
dc.identifier.scopusid | 2-s2.0-85042853013 | - |
dc.identifier.wosid | 000435553400006 | - |
dc.identifier.bibliographicCitation | IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, v.67, no.6, pp.4757 - 4770 | - |
dc.relation.isPartOf | IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY | - |
dc.citation.title | IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY | - |
dc.citation.volume | 67 | - |
dc.citation.number | 6 | - |
dc.citation.startPage | 4757 | - |
dc.citation.endPage | 4770 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalResearchArea | Transportation | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Transportation Science & Technology | - |
dc.subject.keywordPlus | MOBILE SOCIAL NETWORKS | - |
dc.subject.keywordPlus | AUTHENTICATION PROTOCOL | - |
dc.subject.keywordPlus | ROAD NETWORKS | - |
dc.subject.keywordPlus | IDENTIFICATION | - |
dc.subject.keywordPlus | SYSTEMS | - |
dc.subject.keywordPlus | FRAMEWORK | - |
dc.subject.keywordAuthor | Controller Area Network | - |
dc.subject.keywordAuthor | Electronic Control Unit | - |
dc.subject.keywordAuthor | Automotive ID | - |
dc.subject.keywordAuthor | Device Fingerprinting | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.