Blog
About

  • Record: found
  • Abstract: found
  • Article: found
Is Open Access

A System to Recognize Intruders in Controller Area Network (CAN)

, , , ,

3rd International Symposium for ICS & SCADA Cyber Security Research 2015 (ICS-CSR 2015) (ICS-CSR)

Industrial Control System & SCADA Cyber Security Research (ICS-CSR)

17 - 18 September 2015

controller area network (CAN), automotive security, security mechanism, network security

Read this article at

Bookmark
      There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

      Abstract

      The existing automotive Controller Area Network (CAN) is vulnerable. The absence of sender verification in its communication means that an attacker acting as a node on its network will be treated like a legitimate node that has always been present, allowing attackers to transmit and receive messages freely. This paper proposes a system that will allow nodes using CAN to identify legitimate messages and reject those that come from illegitimate nodes. In addition, the system provides resistance against replay attacks that can clog up the safety-critical real time networks.

      Related collections

      Most cited references 15

      • Record: found
      • Abstract: not found
      • Article: not found

      Experimental Security Analysis of a Modern Automobile

        Bookmark
        • Record: found
        • Abstract: not found
        • Article: not found

        Security aspects of the in-vehicle network in the connected car

          Bookmark
          • Record: found
          • Abstract: not found
          • Article: not found

          Securing vehicles against cyber attacks

            Bookmark

            Author and article information

            Affiliations
            University of South Alabama
            Contributors
            Conference
            September 2015
            September 2015
            : 111-114
            10.14236/ewic/ICS2015.15
            © Carsten et al. Published by BCS Learning & Development Ltd. Proceedings of the 3 rd International Symposium for ICS & SCADA Cyber Security Research 2015

            This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

            3rd International Symposium for ICS & SCADA Cyber Security Research 2015 (ICS-CSR 2015)
            ICS-CSR
            3
            Germany
            17 - 18 September 2015
            Electronic Workshops in Computing (eWiC)
            Industrial Control System & SCADA Cyber Security Research (ICS-CSR)
            Product
            Product Information: 1477-9358 BCS Learning & Development
            Self URI (journal page): https://ewic.bcs.org/
            Categories
            Electronic Workshops in Computing

            Comments

            Comment on this article