My Account Log in

1 option

CAN Security: Cost-Effective Intrusion Detection for Real-Time Control Systems Hitachi, Limited

SAE Technical Papers (1906-current) Available online

View online
Format:
Conference/Event
Author/Creator:
Otsuka, Otsuka, author.
Contributor:
Ishigooka, Tasuku
Oishi, Yukihiko
Sasazawa, Kazuyoshi
Conference Name:
SAE 2014 World Congress & Exhibition (2014-04-08 : Detroit, Michigan, United States)
Language:
English
Physical Description:
1 online resource
Place of Publication:
Warrendale, PA SAE International 2014
Summary:
In-vehicle networks are generally used for computerized control and connecting information technology devices in cars. However, increasing connectivity also increases security risks. "Spoofing attacks", in which an adversary infiltrates the controller area network (CAN) with malicious data and makes the car behave abnormally, have been reported. Therefore, countermeasures against this type of attack are needed.Modifying legacy electronic control units (ECUs) will affect development costs and reliability because in-vehicle networks have already been developed for most vehicles. Current countermeasures, such as authentication, require modification of legacy ECUs. On the other hand, anomaly detection methods may result in misdetection due to the difficulty in setting an appropriate threshold. Evaluating a reception cycle of data can be used to simply detect spoofing attacks. However, this may result in false detection due to fluctuation in the data reception cycle in the CAN.We propose the "delayed-decision cycle detection" method for improving a conventional cycle detection method, which does not require modification of legacy ECUs, detects intrusions with a low misdetection rate, and prevents intrusions. We evaluated this method in a simulated environment of an actual car. The processing load of the method was sufficiently low. In some specific cases, the method resulted in misdetection. Therefore, we further improved the proposed detection method.Security architecture for in-vehicle networks should be constructed of multi-layer countermeasures to prevent single point of attacks. The proposed method can be easily applied as one layer of security architecture because it has several advantages, such as low processing load, and does not require the modification of legacy ECUs
Notes:
Vendor supplied data
Publisher Number:
2014-01-0340
Access Restriction:
Restricted for use by site license

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account