Fingerprinting ecus to implement vehicular security for passenger safety using machine learning techniques

S Bellaire, M Bayer, A Hafeez, RUD Refat… - Proceedings of SAI …, 2022 - Springer
Abstract The Controller Area Network (CAN) protocol used in vehicles today was designed
to be fast, reliable, and robust. However, it is inherently insecure due to its lack of any kind of …

Anomaly detection for controller area network in braking control system with dynamic ensemble selection

Y Yang, L Wang, Z Li, P Shen, X Guan, W Xia - IEEE Access, 2019 - ieeexplore.ieee.org
The controller area networks (CAN) in the braking control system of metro trains are used to
transmit the important control instruction and condition information, whose anomaly will …

Automotive virtual in-sensor analytics for securing vehicular communication

GI Trouli, G Kornaros - IEEE Design & Test, 2020 - ieeexplore.ieee.org
Automotive Virtual In-sensor Analytics for Securing Vehicular Communication Page 1 91
2168-2356/20©2020 IEEE Copublished by the IEEE CEDA, IEEE CASS, IEEE SSCS, and TTTC …

Enhancing ECU identification security in CAN networks using distortion modeling and neural networks

A Hafeez, H Malik, A Irtaza, MZ Uddin… - Frontiers in Computer …, 2024 - frontiersin.org
A novel technique for electronic control unit (ECU) identification is proposed in this study to
address security vulnerabilities of the controller area network (CAN) protocol. The reliable …

CANGuard: Practical intrusion detection for in-vehicle network via unsupervised learning

W Zhou, H Fu, S Kapoor - 2021 IEEE/ACM Symposium on Edge …, 2021 - ieeexplore.ieee.org
Modern vehicles are becoming more advanced recently by incorporating new functionalities,
such as V2X, more connectivity and autonomous driving. However, these new things also …

State of the art survey on comparison of physical fingerprinting-based intrusion detection techniques for in-vehicle security

A Hafeez, K Rehman, H Malik - 2020 - sae.org
Controller area network (CAN) is used as a legacy protocol for in-vehicle communication.
However, it lacks basic security features such as message authentication, integrity …

Concept of Using the MBSE Approach to Integrate Security Patterns in Safety-Related Projects for the Automotive Industry

P Piątek, P Mydłowski, A Buczacki… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
The automotive industry is undergoing significant changes due to increased connectivity,
data usage, and vehicle autonomy, which pose new challenges and increase the attack …

Similarity Distribution Density: An Optimized Approach to Outlier Detection

L Quan, T Gong, K Jiang - Electronics, 2023 - mdpi.com
When dealing with uncertain data, traditional model construction methods often ignore or
filter out noise data to improve model performance. However, this simple approach can lead …

Cyberattacks on Adaptive Cruise Controls and Emergency Braking Systems: Adversary Models, Impact Assessment, and Countermeasures

A Berdich, B Groza - IEEE Transactions on Reliability, 2024 - ieeexplore.ieee.org
In the recent years, there has been a lot of focus on designing security for in-vehicle
networks and detecting intrusions. Still, no countermeasure is perfect and most of the …

GPIDS: GAN Assisted Contextual Pattern-Aware Intrusion Detection System for IVN

J Qin, Y Xun, Z Deng, J Liu - IEEE Transactions on Vehicular …, 2024 - ieeexplore.ieee.org
The intelligent connected vehicle (ICV) has garnered considerable attention in recent years
due to developments in vehicle-to-everything (V2X) technology, 5 G communication …