Reconfigurable CAN Intrusion Detection and Response System

dc.contributor.authorSaini, Rachit
dc.contributor.authorIslam, Riadul
dc.date.accessioned2025-04-23T20:30:39Z
dc.date.available2025-04-23T20:30:39Z
dc.date.issued2024-07-07
dc.description.abstractThe controller area network (CAN) remains the de facto standard for intra-vehicular communication. CAN enables reliable communication between various microcontrollers and vehicle devices without a central computer, which is essential for sustainable transportation systems. However, it poses some serious security threats due to the nature of communication. According to caranddriver.com, there were at least 150 automotive cybersecurity incidents in 2019, a 94% year-over-year increase since 2016, according to a report from Upstream Security. To safeguard vehicles from such attacks, securing CAN communication, which is the most relied-on in-vehicle network (IVN), should be configured with modifications. In this paper, we developed a configurable CAN communication protocol to secure CAN with a hardware prototype for rapidly prototyping attacks, intrusion detection systems, and response systems. We used a field programmable gate array (FPGA) to prototype CAN to improve reconfigurability. This project focuses on attack detection and response in the case of bus-off attacks. This paper introduces two main modules: the multiple generic errors module with the introduction of the error state machine (MGEESM) module and the bus-off attack detection (BOAD) module for a frame size of 111 bits (BOAD111), based on the CAN protocol presenting the introduction of form error, CRC error, and bit error. Our results show that, in the scenario with the transmit error counter (TEC) value 127 for switching between the error-passive state and bus-off state, the detection times for form error, CRC error, and bit error introduced in the MGEESM module are 3.610 ms, 3.550 ms, and 3.280 ms, respectively, with the introduction of error in consecutive frames. The detection time for BOAD111 module in the same scenario is 3.247 ms.
dc.description.sponsorshipThis research was funded in part by a UMBC start up grant and the National Science Foundation (NSF) award, number: 2138253.
dc.description.urihttps://www.mdpi.com/2079-9292/13/13/2672
dc.format.extent21 pages
dc.genrejournal articles
dc.identifierdoi:10.13016/m2zob5-ixp4
dc.identifier.citationSaini, Rachit, and Riadul Islam. “Reconfigurable CAN Intrusion Detection and Response System.” Electronics 13, no. 13 (January 2024): 2672. https://doi.org/10.3390/electronics13132672.
dc.identifier.urihttps://doi.org/10.3390/electronics13132672
dc.identifier.urihttp://hdl.handle.net/11603/37975
dc.language.isoen_US
dc.publisherMDPI
dc.relation.isAvailableAtThe University of Maryland, Baltimore County (UMBC)
dc.relation.ispartofUMBC Faculty Collection
dc.relation.ispartofUMBC Computer Science and Electrical Engineering Department
dc.relation.ispartofUMBC Student Collection
dc.rightsAttribution 4.0 International CC BY 4.0 Deed
dc.rights.urihttps://creativecommons.org/licenses/by/4.0/deed.en
dc.subjectCAN attack response
dc.subjectcontroller area network (CAN)
dc.subjectbus-off attack
dc.subjectUMBC Cybersecurity Institute
dc.subjectCAN attack detection
dc.titleReconfigurable CAN Intrusion Detection and Response System
dc.typeText
dcterms.creatorhttps://orcid.org/0000-0002-4649-3467

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
electronics1302672.pdf
Size:
4.61 MB
Format:
Adobe Portable Document Format