CAN Radar: Sensing Physical Devices in CAN Networks based on Time Domain Reflectometry

10/07/2019
by   Marcel Rumez, et al.
0

The presence of security vulnerabilities in automotive networks has already been shown by various publications in recent years. Due to the specification of the Controller Area Network (CAN) as a broadcast medium without security mechanisms, attackers are able to read transmitted messages without being noticed and to inject malicious messages. In order to detect potential attackers within a network or software system as early as possible, Intrusion Detection Systems (IDSs) are prevalent. Many approaches for vehicles are based on techniques which are able to detect deviations from specified CAN network behaviour regarding protocol or payload properties. However, it is challenging to detect attackers who secretly connect to CAN networks and do not actively participate in bus traffic. In this paper, we present an approach that is capable of successfully detecting unknown CAN devices and determining the distance (cable length) between the attacker device and our sensing unit based on Time Domain Reflectometry (TDR) technique. We evaluated our approach on a real vehicle network.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/15/2021

CAN-LOC: Spoofing Detection and Physical Intrusion Localization on an In-Vehicle CAN Bus Based on Deep Features of Voltage Signals

The Controller Area Network (CAN) is used for communication between in-v...
research
07/25/2019

Mitigating Vulnerabilities of Voltage-based Intrusion Detection Systems in Controller Area Networks

Data for controlling a vehicle is exchanged among Electronic Control Uni...
research
06/06/2019

CANet: An Unsupervised Intrusion Detection System for High Dimensional CAN Bus Data

We propose a novel neural network architecture for detecting intrusions ...
research
06/16/2021

Detecting message modification attacks on the CAN bus with Temporal Convolutional Networks

Multiple attacks have shown that in-vehicle networks have vulnerabilitie...
research
12/31/2013

A DDoS-Aware IDS Model Based on Danger Theory and Mobile Agents

We propose an artificial immune model for intrusion detection in distrib...
research
05/05/2021

Current State of IPv6 Security in IoT

This report presents the current state of security in IPv6 for IoT devic...
research
01/17/2022

Silently Disabling ECUs and Enabling Blind Attacks on the CAN Bus

The CAN Bus is crucial to the efficiency, and safety of modern vehicle i...

Please sign up or login with your details

Forgot password? Click here to reset