Blog
About

118
views
0
recommends
+1 Recommend
1 collections
    4
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      A System to Recognize Intruders in Controller Area Network (CAN)

      , , , ,

      3rd International Symposium for ICS & SCADA Cyber Security Research 2015 (ICS-CSR 2015) (ICS-CSR)

      Industrial Control System & SCADA Cyber Security Research (ICS-CSR)

      17 - 18 September 2015

      controller area network (CAN), automotive security, security mechanism, network security

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          The existing automotive Controller Area Network (CAN) is vulnerable. The absence of sender verification in its communication means that an attacker acting as a node on its network will be treated like a legitimate node that has always been present, allowing attackers to transmit and receive messages freely. This paper proposes a system that will allow nodes using CAN to identify legitimate messages and reject those that come from illegitimate nodes. In addition, the system provides resistance against replay attacks that can clog up the safety-critical real time networks.

          Related collections

          Most cited references 15

          • Record: found
          • Abstract: not found
          • Article: not found

          Experimental Security Analysis of a Modern Automobile

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Security aspects of the in-vehicle network in the connected car

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Securing vehicles against cyber attacks

                Bookmark

                Author and article information

                Contributors
                Conference
                September 2015
                September 2015
                : 111-114
                Affiliations
                University of South Alabama
                Article
                10.14236/ewic/ICS2015.15
                © Carsten et al. Published by BCS Learning & Development Ltd. Proceedings of the 3 rd International Symposium for ICS & SCADA Cyber Security Research 2015

                This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

                3rd International Symposium for ICS & SCADA Cyber Security Research 2015 (ICS-CSR 2015)
                ICS-CSR
                3
                Germany
                17 - 18 September 2015
                Electronic Workshops in Computing (eWiC)
                Industrial Control System & SCADA Cyber Security Research (ICS-CSR)
                Product
                Product Information: 1477-9358 BCS Learning & Development
                Self URI (journal page): https://ewic.bcs.org/
                Categories
                Electronic Workshops in Computing

                Comments

                Comment on this article