Intrusion Detection Method for In‐Vehicle CAN Bus Based on Message and Time Transfer Matrix

Z Bi, G Xu, G Xu, M Tian, R Jiang… - Security and …, 2022 - Wiley Online Library
As the number and computational power of electronic computing units installed in standard
automobiles continue to increase, contemporary motor vehicles face more cybersecurity …

TCE-IDS: Time interval conditional entropy-based intrusion detection system for automotive controller area networks

Z Yu, Y Liu, G Xie, R Li, S Liu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Intelligent connected vehicle is rapidly growing with the 5-G technology; the diversity of
functional interfaces has significantly expanded the avenues of attack, making automotive …

Analysis of id sequences similarity using DTW in intrusion detection for CAN bus

H Sun, M Sun, J Weng, Z Liu - IEEE Transactions on Vehicular …, 2022 - ieeexplore.ieee.org
Connected vehicles have recently attracted considerable attention for revolutionizing the
transportation industry. Although connectivity brings about a vast number of benefits, it can …

Towards holistic secure networking in connected vehicles through securing CAN-bus communication and firmware-over-the-air updating

G Kornaros, O Tomoutzoglou, D Mbakoyiannis… - Journal of Systems …, 2020 - Elsevier
With the increasing connectivity in modern vehicle infrastructure, solutions are required to
harden the vehicle's electronic architecture against potential attacks. One of the most …

[HTML][HTML] An overview of vehicular cybersecurity for intelligent connected vehicles

T Guan, Y Han, N Kang, N Tang, X Chen, S Wang - Sustainability, 2022 - mdpi.com
Cybersecurity is one of the most important challenges in the intelligent connected vehicle
system. Interconnected vehicles are vulnerable to different network security attacks, which …

ID sequence analysis for intrusion detection in the CAN bus using long short term memory networks

AK Desta, S Ohira, I Arai… - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
The number of computer controlled vehicles throughout the world is rising at a staggering
speed. Even though this enhances the driving experience, it opens a new security hole in …

[HTML][HTML] A deep learning based misbehavior classification scheme for intrusion detection in cooperative intelligent transportation systems

T Alladi, V Kohli, V Chamola, FR Yu - Digital Communications and …, 2023 - Elsevier
With the rise of the Internet of Vehicles (IoV) and the number of connected vehicles
increasing on the roads, Cooperative Intelligent Transportation Systems (C-ITSs) have …

[HTML][HTML] Novel design of cryptosystems for video/audio streaming via dynamic synchronized chaos-based random keys

CH Lin, GH Hu, JS Chen, JJ Yan, KH Tang - Multimedia Systems, 2022 - Springer
In this paper, a novel chaos-based cryptosystem is proposed to ensure the communication
security of video/audio streaming in the network environment. Firstly, by the proposed …

[PDF][PDF] 智能网联车网络安全研究综述.

吴武飞, 李仁发, 曾刚, 谢勇… - Journal on …, 2020 - infocomm-journal.com
针对汽车的网络攻击不仅会造成隐私泄露和经济损失, 严重情况下还会危及生命安全,
甚至上升为国家公共安全问题, 因此智能网联车网络安全问题已成为当前研究的热点. 首先 …

Ecu fingerprinting through parametric signal modeling and artificial neural networks for in-vehicle security against spoofing attacks

A Hafeez, K Topolovec, S Awad - 2019 15th International …, 2019 - ieeexplore.ieee.org
Fully connected autonomous vehicles are more vulnerable than ever to hacking and data
theft. The controller area network (CAN) protocol is used for communication between in …