Back to Search Start Over

Identify a Spoofing Attack on an In-Vehicle CAN Bus Based on the Deep Features of an ECU Fingerprint Signal

Authors :
Zongtao Duan
Mark Tehranipoor
Yun Yang
Source :
Smart Cities, Volume 3, Issue 1, Pages 2-30
Publication Year :
2020
Publisher :
MDPI AG, 2020.

Abstract

An in-vehicle controller area network (CAN) bus is vulnerable because of increased sharing among modern autonomous vehicles and the weak protocol design principle. Spoofing attacks on a CAN bus can be difficult to detect and have the potential to enable devastating attacks. To effectively identify spoofing attacks, we propose the authentication of sender identities using a recurrent neural network with long short-term memory units (RNN-LSTM) based on the features of a fingerprint signal. We also present a way to generate the analog fingerprint signals of electronic control units (ECUs) to train the proposed RNN-LSTM classifier. The proposed RNN-LSTM model is accelerated on embedded Field-Programmable Gate Arrays (FPGA) to allow for real-time detection despite high computational complexity. A comparison of experimental results with the latest studies demonstrates the capability of the proposed RNN-LSTM model and its potential as a solution to in-vehicle CAN bus security.

Details

ISSN :
26246511
Volume :
3
Database :
OpenAIRE
Journal :
Smart Cities
Accession number :
edsair.doi.dedup.....8725619600bf849054e606f7487a6022