加密                        
                
                                
                        
                            CAN总线                        
                
                                
                        
                            入侵检测系统                        
                
                                
                        
                            计算机网络                        
                
                                
                        
                            计算机科学                        
                
                                
                        
                            标识符                        
                
                                
                        
                            控制总线                        
                
                                
                        
                            数据传输                        
                
                                
                        
                            带宽(计算)                        
                
                                
                        
                            嵌入式系统                        
                
                                
                        
                            工程类                        
                
                                
                        
                            计算机安全                        
                
                                
                        
                            系统总线                        
                
                                
                        
                            计算机硬件                        
                
                        
                    
            作者
            
                Yijie Xun,Zhouyan Deng,Jiajia Liu,Yilin Zhao            
         
                    
            出处
            
                                    期刊:IEEE Transactions on Vehicular Technology
                                                         [Institute of Electrical and Electronics Engineers]
                                                        日期:2023-01-13
                                                        卷期号:72 (6): 7240-7250
                                                        被引量:23
                                
         
        
    
            
            标识
            
                                    DOI:10.1109/tvt.2023.3236820
                                    
                                
                                 
         
        
                
            摘要
            
            Intelligent connected vehicles (ICVs) integrate advanced equipment and communication network technologies to realize information exchange and sharing between vehicles and people, roads, clouds, etc., bringing great convenience to people's lives. However, the interconnection of intelligent equipment and vehicles also brings many vulnerable interfaces, threatening the security of in-vehicle networks, e.g., controller area network (CAN) bus. For protecting the security of CAN bus, some researchers propose a data encryption and decryption protocol-based method. Note that due to the resource constraints of computing and bandwidth and the requirements for low-delay data transmission, the research on protocol-based data encryption and decryption method is progressing slowly. For this reason, more researchers study vehicle intrusion detection systems (IDSs) based on side channel analysis. It does not occupy the bandwidth of CAN bus, and detects intrusion by analyzing the physical characteristics of CAN bus. Nevertheless, most of the existing work either cannot locate the source electronic control unit (ECU) of the malicious data frames, or cannot detect malicious data frames from ECUs and external nodes simultaneously, which greatly limits their practical application value. Therefore, we propose a novel IDS based on vehicle voltage signals. Specifically, we map multiple identifiers (IDs) sent for each ECU without developer documentation. In addition, we creatively design FeatureBagging-CNN combined model to detect malicious intrusion. When the external nodes or compromised ECUs send malicious data frames, the system can accurately detect them and locate their sender.
         
            
 
                 
                
                    
                    科研通智能强力驱动
Strongly Powered by AbleSci AI