Campus Units

Electrical and Computer Engineering

Document Type

Conference Proceeding

Conference

AutoSec 2019

Publication Version

Accepted Manuscript

Link to Published Version

https://doi.org/10.1145/3309171.3309179

Publication Date

3-2019

DOI

10.1145/3309171.3309179

Conference Title

AutoSec 2019

Conference Date

March 27, 2019

City

Dallas, TX

Abstract

The modern automobile relies on numerous electronic control units communicating over the de facto standard of the controller area network (CAN) bus. This communication network was not developed with cybersecurity in mind. Many methods based on constant time intervals between messages have been proposed to address this lack of security issue with the CAN bus. However, these existing methods may struggle to handle variable time intervals between messages during transitions of vehicle driving modes. This paper proposes a simple and cost-effective method to ensure the security of the CAN bus that is based on constant message frequencies across vehicle driving modes. This proposed method does not require any modifications on the existing CAN bus and it is designed with the intent for efficient execution in platforms with very limited computational resources. Test results with the proposed method against two different vehicles and a frequency domain analysis are also presented in the paper.

Comments

This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. Young, Clinton, Habeeb Olufowobi, Gedare Bloom, and Joseph Zambreno. "Automotive Intrusion Detection Based on Constant CAN Message Frequencies Across Vehicle Driving Modes." (2019). DOI: 10.1145/3309171.3309179.

Copyright Owner

Association for Computing Machinery

Language

en

File Format

application/pdf

Published Version

Share

Article Location

 
COinS