TY - GEN
T1 - IntelliCAN
T2 - 28th IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, DFTS 2015
AU - Ansari, Mohammad Raashid
AU - Yu, Shucheng
AU - Yu, Qiaoyan
N1 - Publisher Copyright:
© 2015 IEEE.
PY - 2015/11/2
Y1 - 2015/11/2
N2 - Controller Area Network (CAN) is the main bus network that connects electronic control units in automobiles. Although CAN protocols have been revised to improve the vehicle safety, the security weaknesses of CAN have not been fully addressed. Security threats on automobiles might be from external wireless communication or from internal malicious CAN nodes mounted on the CAN bus. Despite of various threat sources, the security weakness of CAN is the root of security problems. Due to the limited computation power and storage capacity on each CAN node, there is a lack of hardware-efficient protection methods for the CAN system without losing the compatibility to CAN protocols. To save the cost and maintain the compatibility, we propose to exploit the built-in CAN fault confinement mechanism to detect the masquerade attacks originated from the malicious CAN devices on the CAN bus. Simulation results show that our method achieves the attack misdetection rate at the order of 10-5 and reduces the encryption latency by up to 68% over the complete frame encryption method.
AB - Controller Area Network (CAN) is the main bus network that connects electronic control units in automobiles. Although CAN protocols have been revised to improve the vehicle safety, the security weaknesses of CAN have not been fully addressed. Security threats on automobiles might be from external wireless communication or from internal malicious CAN nodes mounted on the CAN bus. Despite of various threat sources, the security weakness of CAN is the root of security problems. Due to the limited computation power and storage capacity on each CAN node, there is a lack of hardware-efficient protection methods for the CAN system without losing the compatibility to CAN protocols. To save the cost and maintain the compatibility, we propose to exploit the built-in CAN fault confinement mechanism to detect the masquerade attacks originated from the malicious CAN devices on the CAN bus. Simulation results show that our method achieves the attack misdetection rate at the order of 10-5 and reduces the encryption latency by up to 68% over the complete frame encryption method.
KW - Automobile
KW - controller area network(CAN)
KW - error detection
KW - hardware security
KW - masquerade attack
KW - security
UR - http://www.scopus.com/inward/record.url?scp=84962885921&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84962885921&partnerID=8YFLogxK
U2 - 10.1109/DFT.2015.7315168
DO - 10.1109/DFT.2015.7315168
M3 - Conference contribution
AN - SCOPUS:84962885921
T3 - Proceedings of the 2015 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, DFTS 2015
SP - 233
EP - 236
BT - Proceedings of the 2015 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, DFTS 2015
Y2 - 12 October 2015 through 14 October 2015
ER -