An Overview of Intrusion Detection Methods for In-Vehicle CAN Network of Intelligent Networked Vehicles

被引:0
|
作者
Guan Y. [1 ]
Ji H. [2 ]
Cui Z. [1 ]
Li H. [1 ]
Chen L. [1 ]
机构
[1] School of Mechanical Engineering, North China University of Science and Technology, Tangshan
[2] Hefei Innovation Research Institute, Beihang University, Hefei
来源
关键词
abnormal behavior; in-vehicle CAN network; intelligent and connected vehicle; intrusion detection system; network security;
D O I
10.19562/j.chinasae.qcgc.2023.ep.002
中图分类号
学科分类号
摘要
With the continuous integration of intelligent vehicle and vehicle networking technology,vehicles are developing towards intelligence and networking. As the complexity of in-vehicle network(e.g. CAN network)increases and the way in which vehicles are connected to the outside world increases,the cyber security risks faced by automobiles have risen dramatically. As an important barrier to protect vehicle network security,intrusion detection system can effectively detect external intrusion and abnormal vehicle behavior. Firstly,the security properties of the in-vehicle network are introduced,and the network security issues of the ICV,the vulnerability of the in-vehicle CAN network and the attack modes on it are analyzed. Secondly,the status quo of research on vehicle CAN network intrusion detection methods in recent years is summarized. Finally,several open questions are proposed for the future development of the in-vehicle network intrusion detection system. © 2023 SAE-China. All rights reserved.
引用
收藏
页码:922 / 935
页数:13
相关论文
共 63 条
  • [1] WU W F, LI R F,, ZENG G, Et al., A review of the network security research of intelligent networked vehicles[J], Journal of Communications, 41, 6, pp. 161-174, (2020)
  • [2] HAN S, CHEN H H,, Et al., Intrusion detection in cyber-physical systems:techniques and challenges[J], IEEE Systems Journal, 8, 4, pp. 1049-1059, (2014)
  • [3] LI Y S., Security threat analysis and remote intrusion research of intelligent connected vehicles in complex network environment, (2019)
  • [4] VALASEK C., Remote exploitation of an unaltered passenger vehicle[J], Black Hat USA, pp. 1-91, (2015)
  • [5] Serious cyber-security flaws uncovered in ford and volkswagen Cars[R]
  • [6] Vehicle security:a survey of security issues and vulnerabilities,malware attack and defenses[J], IEEE Access, 9, pp. 162401-162437, (2021)
  • [7] TRABELSI H., Cryptographic and intrusion detection system for automotive CAN bus:survey and contributions[C], 2019 16th International Multi-Conference on Systems,Signals & Devices(SSD), pp. 158-163, (2019)
  • [8] JIANG K,, Et al., Attacks and defences on intelligent connected vehicles:a survey[J], Digital Communications and Networks, 6, 4, pp. 399-421, (2021)
  • [9] ZHANG J, GONG L,, Et al., Overview of IoT security architecture[C], 2019 4th International Conference on Data Science in Cyberspace (DSC), pp. 338-345, (2019)
  • [10] VISALAKSHI P., A survey on deep learning based intrusion detection systems on internet of things[C], 2021 5th International Conference on I-SMAC(IoT in Social,Mobile,Analytics and Cloud)(I-SMAC), pp. 1488-1496, (2021)