Gyro anomaly detection method based on information entropy

Author(s):  
Guan Wu ◽  
Rui Chen ◽  
Hailong Zhang ◽  
Jun Chen ◽  
Xing Hu
2021 ◽  
Author(s):  
Xuting Duan ◽  
Huiwen Yan ◽  
Jianshan Zhou

Abstract Because of the rapid development of automobile intelligence and networking, cyber attackers can invade the vehicle network via wired and wireless interfaces, such as physical interfaces, short-range wireless interfaces, and long-range wireless interfaces. Thus, interfering with regular driving will immediately jeopardises the drivers’ and passengers’ personal and property safety. To accomplish security protection for the vehicle CAN (Controller Area Network) bus, we propose an anomaly detection method by calculating the information entropy based on the number of interval messages during the sliding window. It detects periodic attacks on the vehicle CAN bus, such as replay attacks and flooding attacks. First, we calculate the number of interval messages according to the CAN bus baud rate, the number of bits of a single frame message, and the time required to calculate information entropy within the window. Second, we compute the window information entropy of regular packet interval packets and determine the normal threshold range by setting a threshold coefficient. Finally, we calculate the information entropy of the data to be measured, determine whether it is greater than or less than the threshold, and detect the anomaly. The experiment uses CANoe software to simulate the vehicle network. It uses the body frame CAN bus network of a brand automobile body bench as the regular network, simulates attack nodes to attack the regular network periodically, collects message data, and verifies the proposed detection method. The results show that the proposed detection method has lower false-negative and false-positive rates for attack scenarios such as replay attacks and flood attacks across different attack cycles.


2016 ◽  
Vol 136 (3) ◽  
pp. 363-372
Author(s):  
Takaaki Nakamura ◽  
Makoto Imamura ◽  
Masashi Tatedoko ◽  
Norio Hirai

2015 ◽  
Vol 135 (12) ◽  
pp. 749-755
Author(s):  
Taiyo Matsumura ◽  
Ippei Kamihira ◽  
Katsuma Ito ◽  
Takashi Ono

2013 ◽  
Vol 32 (7) ◽  
pp. 2003-2006
Author(s):  
Kai WEN ◽  
Fan GUO ◽  
Min YU

Author(s):  
Yizhen Sun ◽  
Yiman Xie ◽  
Weiping Wang ◽  
Shigeng Zhang ◽  
Jun Gao ◽  
...  

IEEE Access ◽  
2021 ◽  
Vol 9 ◽  
pp. 28842-28855
Author(s):  
Shaowei Chen ◽  
Meng Wu ◽  
Pengfei Wen ◽  
Fangda Xu ◽  
Shengyue Wang ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document