Side channel analysis: A novel intrusion detection system based on vehicle voltage signals

Y Xun, Z Deng, J Liu, Y Zhao - IEEE Transactions on Vehicular …, 2023 - ieeexplore.ieee.org
Intelligent connected vehicles (ICVs) integrate advanced equipment and communication
network technologies to realize information exchange and sharing between vehicles and …

Addressing the lack of comparability & testing in can intrusion detection research: A comprehensive guide to can ids data & introduction of the road dataset

ME Verma, MD Iannacone, RA Bridges… - arXiv preprint arXiv …, 2020 - arxiv.org
Although ubiquitous in modern vehicles, Controller Area Networks (CANs) lack basic
security properties and are easily exploitable. A rapidly growing field of CAN security …

ErrIDS: An enhanced cumulative timing error-based automotive intrusion detection system

S Lee, W Choi, HJ Jo, DH Lee - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Contemporary vehicles have undergone numerous transformations to become fully
computerized machines. This computerizing process is intended to provide safety and …

DivaCAN: Detecting in-vehicle intrusion attacks on a controller area network using ensemble learning

MH Khan, AR Javed, Z Iqbal, M Asim, AI Awad - Computers & Security, 2024 - Elsevier
The controller area network (CAN) protocol is a critical communication mechanism in
vehicular systems. However, the widespread adoption of this protocol has introduced …

A comprehensive guide to CAN IDS data and introduction of the ROAD dataset

ME Verma, RA Bridges, MD Iannacone, SC Hollifield… - PLoS one, 2024 - journals.plos.org
Although ubiquitous in modern vehicles, Controller Area Networks (CANs) lack basic
security properties and are easily exploitable. A rapidly growing field of CAN security …

Design and Experimental Assessment of Real-Time Anomaly Detection Techniques for Automotive Cybersecurity

P Dini, S Saponara - Sensors, 2023 - mdpi.com
In recent decades, an exponential surge in technological advancements has significantly
transformed various aspects of daily life. The proliferation of indispensable objects such as …

A literature review on V2X communications security: Foundation, solutions, status, and future

Z Ying, K Wang, J Xiong, M Ma - IET Communications, 2024 - Wiley Online Library
With the refinement and development of the Vehicle to Everything (V2X) concept, its security
issues have gradually come to the fore, revealing many security risks and increasing …

Enhancing security and efficiency in underwater wireless sensor networks: a lightweight key management framework

S Shah, A Munir, A Waheed, A Alabrah, M Mukred… - Symmetry, 2023 - mdpi.com
Underwater Wireless Sensor Networks (UWSNs) obtains more attention due to their wide
range of applications such as underwater oil field discovery, Tsunami monitoring systems …

[PDF][PDF] A Comprehensive Analysis of Datasets for Automotive Intrusion Detection Systems.

S Lee, W Choi, I Kim, G Lee… - Computers, Materials & …, 2023 - cdn.techscience.cn
Recently, automotive intrusion detection systems (IDSs) have emerged as promising
defense approaches to counter attacks on in-vehicle networks (IVNs). However, the …

A Two-Layer Dynamic ECU Group Management Scheme for In-Vehicle CAN Bus

Y Shen, J Cui, H Zhong, J Zhang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
To enable the vehicle control system to provide better service, an increasing number of
network nodes are being introduced into the vehicle; this also dramatically expands the …