Abstract | ||
---|---|---|
The ever-increasing demand for safety, comfort, and automation in the automobile has increased their vulnerability to cybersecurity risk and attacks. Automobiles now embed several electronic devices to perform these functions, and the complexity in the design of these systems increases along with the functionalities they offer. These devices communicate through the vehicular network---such as controller area network (CAN) and local interconnect network---which are attractive targets for cyber attackers. In this paper, we propose a novel algorithm to detect and recover from message spoofing attacks aimed at distorting the operation of the CAN bus. Using the predictable run-time behavior of CAN message frames in our recovery process, we leverage the error handling capability (bus-off state) of the CAN bus in a reboot-based recovery process of the compromised network node. We implement this algorithm in tandem with a hardware CAN controller as a detector node, and we evaluate its effectiveness and performance in detecting and recovering a compromised node.
|
Year | DOI | Venue |
---|---|---|
2019 | 10.1145/3338499.3357360 | Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy |
Keywords | Field | DocType |
automotive security, can, data injection, intrusion detection systems, intrusion prevention system, reboot recovery | CAN bus,Computer science,Computer network,Intrusion prevention system | Conference |
ISBN | Citations | PageRank |
978-1-4503-6831-5 | 0 | 0.34 |
References | Authors | |
0 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Habeeb Olufowobi | 1 | 4 | 1.74 |
Sena Hounsinou | 2 | 0 | 0.34 |
Gedare Bloom | 3 | 68 | 13.95 |