Research of Automotive Controller Area Network Bus Detection System

2013 ◽  
Vol 662 ◽  
pp. 736-739
Author(s):  
Hong Wei Cui

The detection method of automotive controller area network bus is studied in this paper. The composition of detection system is introduced. By analyzing and processing the data of CAN bus and sensors, work condition of automotive is achieved. Multi-pattern data fusion model and algorithm for failure diagnosis is researched. The detection system designed in this paper can be applied to automotive fault analysis, troubleshooting and maintenance.

Author(s):  
Zafar Sultan ◽  
Paul Kwan

In this paper, a hybrid identity fusion model at decision level is proposed for Simultaneous Threat Detection Systems. The hybrid model is comprised of mathematical and statistical data fusion engines; Dempster Shafer, Extended Dempster and Generalized Evidential Processing (GEP). Simultaneous Threat Detection Systems improve threat detection rate by 39%. In terms of efficiency and performance, the comparison of 3 inference engines of the Simultaneous Threat Detection Systems showed that GEP is the better data fusion model. GEP increased precision of threat detection from 56% to 95%. Furthermore, set cover packing was used as a middle tier data fusion tool to discover the reduced size groups of threat data. Set cover provided significant improvement and reduced threat population from 2272 to 295, which helped in minimizing the processing complexity of evidential processing cost and time in determining the combined probability mass of proposed Multiple Simultaneous Threat Detection System. This technique is particularly relevant to on-line and Internet dependent applications including portals.


2010 ◽  
Vol 2 (2) ◽  
pp. 51-67
Author(s):  
Zafar Sultan ◽  
Paul Kwan

In this paper, a hybrid identity fusion model at decision level is proposed for Simultaneous Threat Detection Systems. The hybrid model is comprised of mathematical and statistical data fusion engines; Dempster Shafer, Extended Dempster and Generalized Evidential Processing (GEP). Simultaneous Threat Detection Systems improve threat detection rate by 39%. In terms of efficiency and performance, the comparison of 3 inference engines of the Simultaneous Threat Detection Systems showed that GEP is the better data fusion model. GEP increased precision of threat detection from 56% to 95%. Furthermore, set cover packing was used as a middle tier data fusion tool to discover the reduced size groups of threat data. Set cover provided significant improvement and reduced threat population from 2272 to 295, which helped in minimizing the processing complexity of evidential processing cost and time in determining the combined probability mass of proposed Multiple Simultaneous Threat Detection System. This technique is particularly relevant to on-line and Internet dependent applications including portals.


2021 ◽  
Author(s):  
Xuting Duan ◽  
Huiwen Yan ◽  
Jianshan Zhou

Abstract Because of the rapid development of automobile intelligence and networking, cyber attackers can invade the vehicle network via wired and wireless interfaces, such as physical interfaces, short-range wireless interfaces, and long-range wireless interfaces. Thus, interfering with regular driving will immediately jeopardises the drivers’ and passengers’ personal and property safety. To accomplish security protection for the vehicle CAN (Controller Area Network) bus, we propose an anomaly detection method by calculating the information entropy based on the number of interval messages during the sliding window. It detects periodic attacks on the vehicle CAN bus, such as replay attacks and flooding attacks. First, we calculate the number of interval messages according to the CAN bus baud rate, the number of bits of a single frame message, and the time required to calculate information entropy within the window. Second, we compute the window information entropy of regular packet interval packets and determine the normal threshold range by setting a threshold coefficient. Finally, we calculate the information entropy of the data to be measured, determine whether it is greater than or less than the threshold, and detect the anomaly. The experiment uses CANoe software to simulate the vehicle network. It uses the body frame CAN bus network of a brand automobile body bench as the regular network, simulates attack nodes to attack the regular network periodically, collects message data, and verifies the proposed detection method. The results show that the proposed detection method has lower false-negative and false-positive rates for attack scenarios such as replay attacks and flood attacks across different attack cycles.


2012 ◽  
Vol 163 ◽  
pp. 260-263
Author(s):  
Jing Lin Tong ◽  
Bo Li ◽  
Xiao Bo Wang

This paper introduces the hardware and the communication software design of control system based on Controller Area Network bus. The control system can realize to control the motion of servomotor through high speed C8501F040 single chip microcomputer with Controller Area Network bus and special motion controller - LM628. This system possesses characteristics such as simple structure, high reliability and high performance/price ratio. Key words: CAN bus, LM628, Motion Control System, Communication software


Sensors ◽  
2020 ◽  
Vol 20 (8) ◽  
pp. 2364 ◽  
Author(s):  
Mehmet Bozdal ◽  
Mohammad Samie ◽  
Sohaib Aslam ◽  
Ian Jennions

The automobile industry no longer relies on pure mechanical systems; instead, it benefits from many smart features based on advanced embedded electronics. Although the rise in electronics and connectivity has improved comfort, functionality, and safe driving, it has also created new attack surfaces to penetrate the in-vehicle communication network, which was initially designed as a close loop system. For such applications, the Controller Area Network (CAN) is the most-widely used communication protocol, which still suffers from various security issues because of the lack of encryption and authentication. As a result, any malicious/hijacked node can cause catastrophic accidents and financial loss. This paper analyses the CAN bus comprehensively to provide an outlook on security concerns. It also presents the security vulnerabilities of the CAN and a state-of-the-art attack surface with cases of implemented attack scenarios and goes through different solutions that assist in attack prevention, mainly based on an intrusion detection system (IDS).


2013 ◽  
Vol 427-429 ◽  
pp. 2174-2178
Author(s):  
Yun Han Chen ◽  
Gui He Qin ◽  
Yang Nan

In order to guarantee the communication of logical ring designed properly during the development of Controller Area Network (CAN) Network Management (NM) system complied with OSEK/VDX direct NM specification, it is necessary to investigate its performance in various work conditions. However, this usually costs much time and work consumption to reproduce specific work conditions in a distributed CAN network. By the simulation platform of logical ring developed with Network Simulator 2 (NS2), this paper provided an efficient test tool, which much reduced the consumption of specific work condition reproduction.


Sign in / Sign up

Export Citation Format

Share Document