Back to Search
Start Over
Identify a Spoofing Attack on an In-Vehicle CAN Bus Based on the Deep Features of an ECU Fingerprint Signal
- Source :
- Smart Cities, Volume 3, Issue 1, Pages 2-30
- Publication Year :
- 2020
- Publisher :
- MDPI AG, 2020.
-
Abstract
- An in-vehicle controller area network (CAN) bus is vulnerable because of increased sharing among modern autonomous vehicles and the weak protocol design principle. Spoofing attacks on a CAN bus can be difficult to detect and have the potential to enable devastating attacks. To effectively identify spoofing attacks, we propose the authentication of sender identities using a recurrent neural network with long short-term memory units (RNN-LSTM) based on the features of a fingerprint signal. We also present a way to generate the analog fingerprint signals of electronic control units (ECUs) to train the proposed RNN-LSTM classifier. The proposed RNN-LSTM model is accelerated on embedded Field-Programmable Gate Arrays (FPGA) to allow for real-time detection despite high computational complexity. A comparison of experimental results with the latest studies demonstrates the capability of the proposed RNN-LSTM model and its potential as a solution to in-vehicle CAN bus security.
- Subjects :
- 050210 logistics & transportation
021110 strategic, defence & security studies
Spoofing attack
spoofing attack
Computational complexity theory
business.industry
Computer science
05 social sciences
0211 other engineering and technologies
02 engineering and technology
CAN bus
Recurrent neural network
0502 economics and business
electronic control units (ECU)
In vehicle
controller area network (CAN)
Communication source
Field-programmable gate array
business
deep recurrent neural network
Classifier (UML)
Computer hardware
Subjects
Details
- ISSN :
- 26246511
- Volume :
- 3
- Database :
- OpenAIRE
- Journal :
- Smart Cities
- Accession number :
- edsair.doi.dedup.....8725619600bf849054e606f7487a6022