计算机科学
入侵检测系统
计算机网络
链条(单位)
入侵防御系统
嵌入式系统
计算机安全
天文
物理
作者
Heng Sun,Weilin Huang,Jian Weng,Zhiquan Liu,Weihua Tan,Zaobo He,Mingyang Chen,Biaobang Wu,Long Li,Xinyuan Peng
出处
期刊:IEEE Internet of Things Journal
[Institute of Electrical and Electronics Engineers]
日期:2024-04-24
卷期号:11 (15): 26146-26159
被引量:6
标识
DOI:10.1109/jiot.2024.3393122
摘要
Autonomous vehicles (AVs) rely on controller area network (CAN), which ensures the communication between massive electronic control units (ECUs) and passenger safety. Although CAN is a lightweight and reliable broadcast protocol, its vulnerability has caused CAN to confront serious security threats. Adversaries and malicious organizations can impair CAN bus in a variety of ways, such as injecting malicious messages into CAN bus. These malicious messages can directly intervene the functions inside AVs. Therefore, this article proposes a novel cross-chain-based intrusion detection for CAN bus (CCID-CAN) model that uses rule-based Valid Bit index (VBIN) model for initial intrusion detection on CAN bus inside AVs, followed by the Kalman filter and Naïve Bayes model for detecting attacks missed in the VBIN, where a cross-chain mechanism implements the exchange of attack logs among connected AVs that may not trust each other so as to optimize the Naïve Bayes detector. Afterwards, a series of experiments against several types of attacks are conducted on real vehicle supported by XPeng, and the results reveal that the CCID-CAN model outperforms existing models in terms of detection performance, time overhead, and memory footprint. In addition, attack log exchange for cross-chain networks in this proposed model is of high performance in latency, memory footprint, and throughput.
科研通智能强力驱动
Strongly Powered by AbleSci AI