CANAttack: Assessing Vulnerabilities within Controller Area Network

D Oladimeji, A Rasheed, C Varol, M Baza… - Sensors, 2023 - mdpi.com
Current vehicles include electronic features that provide ease and convenience to drivers.
These electronic features or nodes rely on in-vehicle communication protocols to ensure …

Design and Experimental Assessment of Real-Time Anomaly Detection Techniques for Automotive Cybersecurity

P Dini, S Saponara - Sensors, 2023 - mdpi.com
In recent decades, an exponential surge in technological advancements has significantly
transformed various aspects of daily life. The proliferation of indispensable objects such as …

Decentralized switching-type adaptive event-triggered-based non-recursive control for interconnected cyber-physical systems against multiple cyber attacks

H Sun, Y Cui, L Hou, T Jiao - IEEE Transactions on Industrial …, 2024 - ieeexplore.ieee.org
This study addresses a decentralized switching-type adaptive event-triggered-based non-
recursive security controller design for interconnected cyber-physical systems under multiple …

Nussbaum-Based Adaptive Neural Networks Tracking Control for Nonlinear PDE-ODE Systems Subject to Deception Attacks

L Wan, H Zhang, J Sun, Z Liu… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
In this article, the novel adaptive neural networks (NNs) tracking control scheme is
presented for nonlinear partial differential equation (PDE)-ordinary differential equation …

Using authenticated encryption for securing controller area networks in autonomous mobile platforms

A Rasheed, M Baza, M Khan, N Karpoor… - 2023 26th …, 2023 - ieeexplore.ieee.org
Controller Area Networks (CAN) has become the dominant data communication and
networking system used in today's smart vehicles, autonomous mobile platforms, and …

MTDCAP: Moving Target Defense-Based CAN Authentication Protocol

H Sun, H Su, J Weng, Z Liu, M Li, Y Liu… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
The convenience behind modern intelligent vehicles is simply that a group of intelligent
electronic control units (ECUs) connected to controller area network (CAN) work in concert …

Detection of Malicious Threats Exploiting Clock-Gating Hardware Using Machine Learning

NA Kose, R **ad, A Rasheed, N Shashidhar, M Baza… - Sensors, 2024 - mdpi.com
Embedded system technologies are increasingly being incorporated into manufacturing,
smart grid, industrial control systems, and transportation systems. However, the vast majority …

Stochastic Event-Triggered Feedback Physical Watermarks Against Replay Attacks

X Zhao, W **ng, X Wang, N Zhao - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
This paper considers the security of cyber-physical systems (CPSs) subject to replay attacks
with measurements of the sensor transmitted to the remote estimator over a wireless …

IoT based Real Time Anomaly Detection in Automotive ECUs Using Machine Learning

R Biswas, PK Samanta, A Bakshi… - … on Recent Advances …, 2024 - ieeexplore.ieee.org
Electronic control units (ECU s) play a vital role in modern vehicles, but their increased use
opens vehicles to cyber-attacks that threaten safety and privacy. This research proposes a …

Location Privacy Protection in Vehicular Networks

B Ma - 2023 - opus.lib.uts.edu.au
Location privacy is of utmost importance in vehicular networks, where drivers' trajectories
and personal information can be exposed, posing threats to drivers' safety and personal …