Show simple item record

dc.contributor.authorPöyhönen, Jouni
dc.contributor.authorKotilainen, Pyry
dc.contributor.authorPoikolainen, Janne
dc.contributor.authorKalmari, Janne
dc.contributor.authorNeittaanmäki, Pekka
dc.contributor.editorCruz, Tiago
dc.contributor.editorSimoes, Paulo
dc.date.accessioned2020-01-07T07:19:04Z
dc.date.available2020-01-07T07:19:04Z
dc.date.issued2019
dc.identifier.citationPöyhönen, J., Kotilainen, P., Poikolainen, J., Kalmari, J., & Neittaanmäki, P. (2019). Cyber security of vehicle CAN bus. In T. Cruz, & P. Simoes (Eds.), <i>ECCWS 2019 : Proceedings of the 18th European Conference on Cyber Warfare and Security</i> (pp. 354-363). Academic Conferences International. Proceedings of the European conference on information warfare and security.
dc.identifier.otherCONVID_32279029
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/67095
dc.description.abstractThere are currently many research projects underway concerning the intelligent transport system (ITS), with the intent to develop a variety of communication solutions between vehicles, roadside stations and services. In the near future, the roll-out of 5G networks will improve short-range vehicle-to-vehicle traffic and vehicle-to-infrastructure communications. More extensive services can be introduced due to almost non-delayed response time. Cyber security is central for the usability of the services and, most importantly, for car safety. The Controller Area Network (CAN) is an automation bus that was originally designed for real-time data transfer of distributed control systems to cars. Later, the CAN bus was developed as a universal automation system for many automation solutions. One of its characteristics is that bus traffic is not supervised in any way due to the lack of timing of control. In other words there are no authentication mechanism. This article highlights different approaches and their usability to reveal the car’s CAN bus malfunctions. The study complements earlier studies on the safety of vehicles in the CAN bus. Based on the test results, practical methods can be evaluated to detect changes in CAN bus traffic, such as targeted cyber-attacks. The article is based on the results of a study on the cybersecurity of cars conducted at the University of Jyväskylä (AaTi study). Initially, the AaTi study attempted to identify the message content of the bus and to detect interferences via the Neural network solution. However, the problem with the neural network was the computational performance required and the lack of prediction accuracy. After that the study was focused on experiments that were based on the arrival times of control messages, that is, their timing-based intrusion detection. In this sense the research did concentrate on kernel density estimation, one-class support vector machine solution, absolute deviation method and categorization. Due to methodological challenges, a method for detecting intrusions based on statistical processing of message traffic was ultimately developed as an outcome of the study.en
dc.format.extent884
dc.format.mimetypeapplication/pdf
dc.languageeng
dc.language.isoeng
dc.publisherAcademic Conferences International
dc.relation.ispartofECCWS 2019 : Proceedings of the 18th European Conference on Cyber Warfare and Security
dc.relation.ispartofseriesProceedings of the European conference on information warfare and security
dc.rightsIn Copyright
dc.subject.othercvbersecurity
dc.subject.othercar
dc.subject.otherCAN bus
dc.subject.otherintrusion detection
dc.titleCyber security of vehicle CAN bus
dc.typeconferenceObject
dc.identifier.urnURN:NBN:fi:jyu-202001071036
dc.contributor.laitosInformaatioteknologian tiedekuntafi
dc.contributor.laitosFaculty of Information Technologyen
dc.contributor.oppiaineTietotekniikkafi
dc.contributor.oppiaineMathematical Information Technologyen
dc.type.urihttp://purl.org/eprint/type/ConferencePaper
dc.relation.isbn978-1-912764-28-0
dc.type.coarhttp://purl.org/coar/resource_type/c_5794
dc.description.reviewstatuspeerReviewed
dc.format.pagerange354-363
dc.relation.issn2048-8602
dc.type.versionpublishedVersion
dc.rights.copyright© The Author(s) 2019
dc.rights.accesslevelopenAccessfi
dc.relation.conferenceEuropean Conference on Cyber Warfare and Security
dc.subject.ysokyberturvallisuus
dc.subject.ysoälytekniikka
dc.subject.ysoverkkohyökkäykset
dc.subject.ysorobottiautot
dc.format.contentfulltext
jyx.subject.urihttp://www.yso.fi/onto/yso/p26189
jyx.subject.urihttp://www.yso.fi/onto/yso/p27260
jyx.subject.urihttp://www.yso.fi/onto/yso/p27466
jyx.subject.urihttp://www.yso.fi/onto/yso/p29485
dc.rights.urlhttp://rightsstatements.org/page/InC/1.0/?language=en
dc.type.okmA4


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

In Copyright
Except where otherwise noted, this item's license is described as In Copyright