{"title":"In-Vehicle CAN Network MessageTampering and Forgery Detection Architecture Based on Data Information Redundancy","authors":"J. Qin, He Yu, R. Zhao, G. Qin, X. Shen","doi":"10.1109/ICICE.2017.8479011","DOIUrl":null,"url":null,"abstract":"Controller Area Network (CAN) is one of the most important in-vehicle networks. The data are mainly sensor signals or control commands. There is correlation between the data transmitted in different CAN frames and different data fields for they come from collaborative components of one vehicle. The redundancy information between the data could be calculated out with the vehicle model and control logic relations, and used to detect forgery data. A tampering and forgery detection method for CAN based on the idea is presented, and illustrated with a powertrain CAN model on a CANoe-based experimental bench.","PeriodicalId":233396,"journal":{"name":"2017 International Conference on Information, Communication and Engineering (ICICE)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Conference on Information, Communication and Engineering (ICICE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICICE.2017.8479011","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Controller Area Network (CAN) is one of the most important in-vehicle networks. The data are mainly sensor signals or control commands. There is correlation between the data transmitted in different CAN frames and different data fields for they come from collaborative components of one vehicle. The redundancy information between the data could be calculated out with the vehicle model and control logic relations, and used to detect forgery data. A tampering and forgery detection method for CAN based on the idea is presented, and illustrated with a powertrain CAN model on a CANoe-based experimental bench.