A Survey on Sender Identification Methodologies for the Controller Area Network
dc.contributor.author | Kneib, Marcel | |
dc.contributor.editor | Reinhardt, Delphine | |
dc.contributor.editor | Langweg, Hanno | |
dc.contributor.editor | Witt, Bernhard C. | |
dc.contributor.editor | Fischer, Mathias | |
dc.date.accessioned | 2020-02-04T13:41:58Z | |
dc.date.available | 2020-02-04T13:41:58Z | |
dc.date.issued | 2020 | |
dc.description.abstract | The connectivity of modern vehicles is constantly increasing and consequently also the amount of attack vectors. Researchers have shown that it is possible to access internal vehicle communication via wireless connections, allowing the manipulation of safety-critical functions such as brakes and steering. If a Electronic Control Unit (ECU) can be compromised and is connected to the internal vehicle bus, attacks on the vehicle can be carried out in particular by impersonating other bus participants. Problematic is that the Controller Area Network (CAN), the most commonly used bus technology for internal vehicle communication, does not provide trustworthy information about the sender. Thus ECUs are not able to recognize whether a received message was sent by an authorized sender. Due to the limited applicability of cryptographic measures for the CAN, sender identification methods were presented that can determine the sender of a received message based on physical characteristics. Such approaches can increase the security of internal vehicle networks so that, for example, the manipulations can be limited to a single bus segment, thus preventing the propagation of the attack. This paper presents the different methodologies, which can mainly be divided into the categories time- and voltage-based, identifies problems as well as open questions and compares the existing approaches. The work thus offers an introduction into the topic, identifies possible research fields and enables a quick evaluation of the existing technologies. | en |
dc.identifier.doi | 10.18420/sicherheit2020_07 | |
dc.identifier.isbn | 978-3-88579-695-4 | |
dc.identifier.pissn | 1617-5468 | |
dc.identifier.uri | https://dl.gi.de/handle/20.500.12116/31792 | |
dc.language.iso | en | |
dc.publisher | Gesellschaft für Informatik e.V. | |
dc.relation.ispartof | SICHERHEIT 2020 | |
dc.relation.ispartofseries | Lecture Notes in Informatics (LNI) - Proceedings, Volume P-301 | |
dc.subject | Sender Identification | |
dc.subject | CAN Fingerprinting | |
dc.subject | Intrusion Detection System | |
dc.subject | Controller Area Network Security | |
dc.subject | Automotive Security | |
dc.title | A Survey on Sender Identification Methodologies for the Controller Area Network | en |
dc.type | Text/Conference Paper | |
gi.citation.endPage | 103 | |
gi.citation.publisherPlace | Bonn | |
gi.citation.startPage | 91 | |
gi.conference.date | 17.-20. März 2020 | |
gi.conference.location | Göttingen, Germany | |
gi.conference.sessiontitle | Wissenschaftliche Beiträge |
Dateien
Originalbündel
1 - 1 von 1