Sensors: Design and Experimental Assessment of Real-Time Anomaly Detection Techniques For Automotive Cybersecurity
Sensors: Design and Experimental Assessment of Real-Time Anomaly Detection Techniques For Automotive Cybersecurity
Article
Design and Experimental Assessment of Real-Time Anomaly
Detection Techniques for Automotive Cybersecurity
Pierpaolo Dini 1, * and Sergio Saponara 1
Department of Information Engineering, University of Pisa, Via Girolamo Caruso n.16, 56100 Pisa, Italy
* Correspondence: [email protected]
Keywords: artificial intelligence; machine learning; statistical learning; controlled area network;
networking; cybersecurity; automotive; mechatronics
acting as the foundation for guaranteeing safety and smooth functioning. Through ongoing
research and innovation, we can create a future where technology is strong and resilient
against cyber-attacks, ensuring security and peace of mind.
In modern vehicles, there are numerous electronic control units (ECUs) used for
automation and comfort features, both of the driver and passengers [18]. Included in
this class are ECUs on which advanced algorithms and features are integrated for cruise
control, airbag control, temperature management, assisted parking, infotainment, etc. One
of the problems for security in data exchange and enabling cybersecurity issues is related
to the interconnections between the various ECUs [19]. The use of remote access points,
including Wi-Fi, USB, Bluetooth, 4G/5G, and OBD-II interfaces, has increased dramatically
in the automotive industry in recent years [20]. On the other hand, because of their
widespread use, automotive networks are now more susceptible to outside attacks. These
networks may be targeted by hostile parties who want to take over, change car systems,
or steal confidential data. As a result, creating strong security systems that can identify
and stop such breaches or assaults is imperative. In the automotive industry, one of the
most often used protocols for intra-ECU communication is the Controller Area Network
(CAN) bus. The numerous noteworthy characteristics of the CAN protocol include its
ease of wiring, strict response times, high immunity to interference, error containment,
and multi-master protocol capabilities [21]. The Carrier Sense Multiple Access/Bit-wise
Arbitration (CSMA/BA) technique is used by the CAN system to control bus traffic. When
two or more nodes initiate transmission simultaneously, an arbitration process based on ID
prioritizing is commenced. But it is important to understand that the CAN bus protocol
does not include a basic security mechanism, which leaves connected devices vulnerable to
adversaries [22]. By taking advantage of weaknesses in the CAN bus protocol, aggressors
can initiate various assaults that have the potential to impede vehicle functions. The lack
of an authentication element in CAN frames creates this vulnerability, which allows any
transmitting ECUs to mimic other ECUs. Additionally, the lack of content encryption in
CAN frames gives adversaries a simple way to examine how target ECUs operate using
CAN frame records from the past [23].
Although data encryption techniques have been proposed in the literature, their
application to the CAN bus protocol has shown them to be unsuccessful [24]. Moreover,
frames with lower IDs (the highest priorities) might preempt the bus using the priority-
based arbitration process, forcing all other CAN frames to cede. In light of these technical
aspects, a wide range of techniques have been put forth in the body of literature to detect
possible assaults on the CAN network. Our novel method, which we provide in this study,
improves and applies previous research findings to real-world CAN networks.
Our approach makes use of real-time analysis on a simple platform, and thermal
testing is used to validate the results. The first part will address data acquisition, explaining
the methods and approaches used to collect and organize data. Because of the remarkable
multi-class classifier performance of Artificial Neural Networks (ANNs) and their simplicity
in embedded system integration, we have decided to use them. The results of experimental
testing, which include the evaluation of several attack scenarios put out in the literature to
verify the Intrusion Detection System (IDS) algorithm, will then be presented. In the end,
the robustness of our proposed method with respect to temperature variation is shown,
and this is well known to affect the circuit aspects, and consequently, the physical layer
associated with the CAN protocol.
(2) Intrusion Detection System (IDS): IDS is a popular security solution that uses crypto-
graphic-based software to address CAN network security issues. The IDS ensures that
the exchanged CAN data frame between the two end nodes is authorized. Researchers
have proposed various IDS algorithms, such as a lightweight algorithm based on the
observance of CAN packets frequencies, an anomaly-based detection method based
on the time interval feature of the consecutive CAN packets, and a graph-based feature
method that uses machine learning algorithms [30–42].
(3) CAN-ADF: The Controller Area Network Attack Detection Framework (CAN-ADF)
is a framework that uses field classification, modeling, and anomaly detection to
detect cyber-attacks on unknown CAN bus networks. The framework uses a holis-
tic approach to detect cyber-attacks and provides a comprehensive solution to the
cybersecurity issues related to the CAN protocol [43,44].
(4) Deep Learning Techniques: Intrusion Detection Systems (IDSs) using deep learning
techniques are also proposed in the literature. These IDSs identify cyber-attacks when
given a sample of network traffic collected from real-world computer networks. The
IDSs using deep learning techniques are powerful and can detect cyber-attacks with high
accuracy [45–49].
In summary, various detection algorithms have been proposed in the literature to address
the cybersecurity issues related to the CAN protocol. These algorithms use different
approaches, such as temporal-spatial analysis, cryptographic-based software, anomaly-
based detection, graph-based feature methods, and deep learning techniques. The selection
of the detection algorithm depends on the specific requirements of the application and the
level of security needed.
Electronic Control Units (ECUs) are an essential component of the Controller Area
Network (CAN) protocol used in the automotive industry. ECUs communicate with each
other over the CAN bus protocol, which ensures high communication rates. However, the
CAN protocol is prone to various cybersecurity attacks, and ECUs are vulnerable to these
attacks. To address this issue, researchers have proposed ECU fingerprinting algorithms
to detect and prevent cyber-attacks on the CAN bus. Here is an overview of some of the
state-of-the-art ECU fingerprinting algorithms:
(1) Clock-based IDS (CIDS): CIDS is an anomaly-based intrusion detection system that
measures and exploits the intervals of periodic in-vehicle messages for fingerprint-
ing ECUs. The fingerprints are then used for constructing a baseline of the ECUs’
clock behaviors with the Recursive Least Squares (RLS) algorithm. Based on this
baseline, CIDS uses Cumulative Sum (CUSUM) to detect any abnormal shifts in the
identification of errors, which is a clear sign of intrusion [50–56].
(2) Physical-Fingerprinting of Electronic Control Unit (ECU) Based on Machine Learning
Algorithm: This algorithm uses machine learning algorithms to identify the phys-
ical fingerprints of ECUs based on the time and frequency domain features of the
consecutive CAN packets. The algorithm classifies the ECUs based on their physical
fingerprints and detects any abnormal behavior [57–64].
(3) ECU Fingerprinting through Parametric Signal Modeling and Artificial Neural Net-
works: This algorithm uses parametric signal modeling and Artificial Neural Networks
to identify the physical fingerprints of ECUs. The algorithm extracts the features of
the CAN packets and uses them to train the Artificial Neural Network. The trained
network is then used to classify the ECUs and to detect any abnormal behavior [65–70].
(4) Two-Point Voltage Fingerprinting: This algorithm uses voltage measurements to identify
the physical fingerprints of ECUs. The algorithm measures the voltage at two points
in the CAN bus and uses the difference between the two measurements to identify the
ECU. The algorithm can detect any masquerading attacks on the CAN bus [71–76].
In summary, ECU fingerprinting algorithms are proposed to detect and to prevent cyber-
attacks on the CAN bus. These algorithms use different approaches such as clock-based IDS,
machine learning algorithms, parametric signal modeling, and Artificial Neural Networks.
Sensors 2023, 23, 9231 4 of 27
The selection of the ECU fingerprinting algorithm depends on the specific requirements of
the application and the level of security needed.
• The absence of integrity checking exacerbates the security concerns, as the receivers
might unknowingly accept manipulated data, leading to potential system malfunc-
tions or even complete breaches by malevolent entities [86,87].
• The broadcast transmission characteristic of the CAN bus, where the frames are
disseminated to all interconnected ECUs, acts as a double-edged sword, facilitating
system-wide communication, but also enabling unauthorized eavesdropping, which
jeopardizes the confidentiality of the communication.
• The priority-based arbitration, which allows frames with higher priority to dominate
the communication channel, poses a significant security risk, as it enables an aggressive
Electronic Control Unit (ECU) to manipulate the communication channel, potentially
disrupting the entire network’s functioning [88–90].
• The limited bandwidth and payload capacity of the CAN bus results in the insuffi-
ciency of robust access control mechanisms, creating a vulnerability that could be
exploited by adversaries attempting to compromise the security of the system.
The collective presence of these vulnerabilities within the CAN bus infrastructure
calls for urgent attention to fortify the security measures and to establish robust protocols
to safeguard against potential breaches and malicious attacks that could compromise the
integrity and functionality of the system. In the following, we also report on the definition
of specific cyber-attacks that could be applied on the CAN base networking system.
(1) Unauthorized access: Since the network is centralized, nodes trust each other, and a
malicious node that is attached to the network can have access to all the data flowing
and can disrupt the data flow [91–97].
(2) Replay attacks: An attacker intercepts and records a message, and then replays it later
to achieve a malicious goal [98–102].
(3) Denial of Service (DoS) attacks: An attacker can flood the network with messages,
causing the network to become unresponsive [103–107].
(4) Spoofing attacks: An attacker can send messages with a fake source address, making
it difficult to identify the source of the attack [108–112].
(5) Physical layer attacks: An attacker can manipulate the physical layer of the CAN bus
to cause malfunctions in CAN nodes [113–118].
To address these vulnerabilities, various solutions have been proposed, such as intrusion
detection systems, encryption, and authentication mechanisms. However, there is no
optimal solution, and the problem is mitigated with network segmentation and intrusion
detection systems. It is essential to establish a strong security system for automotive
networks to maintain the advances in safe technologies and to advance the state of the art
in automotive cybersecurity [119–122].
To monitor message flow from different ECUs, a modern CAN-based network can be
accessed by peripherals like Bluetooth, Wi-Fi, and OBD. This makes it possible for IDs to be
replicated, which can prevent some ECUs from communicating. Different vulnerabilities
exist based on the hardware, software, and attack surfaces of the ECUs in the CAN network;
the idea of Strong and Weak Attackers is explained. Fully and weakly compromised ECUs
are the two categories of compromised ECUs that we distinguish. A weakly exploited ECU
lacks the capacity to insert fake messages, and can stop some message transmissions or
function in listen-only mode. On the other hand, an attacker with complete access to an ECU
can take full control, access data stored in memory, and insert any attack message. Because
the CAN bus protocol does not provide encryption, authentication, or integrity checking, it
is vulnerable to a number of security issues. The system is unable to determine whether
the data have been replayed by a malicious node, even in the event that cryptographic
techniques are used.
We consider three main attack paths based on these weaknesses. Because integrity
checking is not present, the impersonation attack can change CAN frames, and the replay
attack can succeed if sufficient defenses are not taken.
Sensors 2023, 23, 9231 6 of 27
• Replay Attack for CAN: Without authentication and integrity for the CAN frames,
a Strong Attack is able to launch the replay attack. As shown in Figure 1, a fully
compromised ECU A transmits the CAN frames received from the ECU C, modifying
its data field. As a result, the receiver ECU B will function abnormally under the
replayed control information.
• Impersonation Attack for CAN: Having known the IDs of the CAN frames from ECU
B, the Strong Attack is able to launch the impersonation attack, as shown in Figure 2.
The Weak Attacker first suspends the transmission of ECU B, and the strong attacker
then controls ECU A to transmit the CAN frames using the ID of ECU B to manipulate
the target, ECU C.
• Injection Attack for CAN: As shown in Figure 3, a Strong Attacker ECU A is able
to inject CAN frames with arbitrary IDs and content. On the one hand, the injected
frames with the highest priority ID will always occupy the CAN bus. On the other
hand, it can compromise the functionality of the bus occupying the transmission.
Sensors 2023, 23, 9231 7 of 27
This approach significantly boosts the sampling rate, achieving a five-fold increase
compared to the Software Trigger method, which is typically adopted in embedded systems.
With the ADC Hardware Trigger method, the PDB timer module is employed to initiate
Sensors 2023, 23, 9231 8 of 27
ADC conversions, enabling the conversion of analog voltage inputs from two distinct
channels, namely CANH and CANL, into digital values. Given the specified parameters:
- Bit resolution = 12 bits
- CAN rate = 125 Kbit/s
- Bit number for message = 110 bits
- PDB Period = 2.15 µs
We can calculate the following:
(1) One message time:
– One message time = (Bit number per message)/(Can bus velocity)
– One message time = 110 bits/(125 Kbit/s) = 880 µs
(2) Number of samples per each message:
– Number of samples per each message = (One message time)/(PDB period)
– Number of samples per each message = 880 µs/2.15 µs ∼
= 410 samples
This calculation is performed for each channel, resulting in a total of 820 samples.
The dominant voltage samples that we acquired are used for extracting features.
However, we chose to utilize only six out of the twelve features that were initially proposed.
These features are divided equally between CANH and CANL, resulting in a total of twelve
features. While we did explore the use of frequency-based features, they were found to be
impractical given the limited number of dominant samples that can be obtained from each
message. In Table 1, the features used as input for the proposed Artificial Neural Network
classifier are reported.
Sensors 2023, 23, 9231 9 of 27
Features Equation
Max value M = max(vi )
Min value m = min(vi )
Mean vm = n1 ∑in=1 vi
q
n
( v − v )2
Standard Deviation σ = ∑i=1 ni m
n 3
Skewness ∑ i =1 ( v i − v m )
S= nσ3
n 4
Kurtosis ∑ i =1 ( v i − v m )
K= nσ4
After collecting the data, we proceed to analyze the data trends for the three units. We
compare the Probability Density Functions (PDFs) estimated from the features obtained
from both CANH and CANL to a Normal distribution. The Normal distribution is char-
acterized by a mean that is equal to the mean of the analyzed feature, and a standard
deviation that is equal to the standard deviation of the analyzed feature. An example of the
data trend for Unit A CANH is illustrated in Figure 7.
The data trends for the other three units exhibit similar patterns to those presented. It
is important to note that these data trends do not follow a Normal distribution. In machine
learning, it is a common practice to scale input data for neural networks to eliminate redun-
dancy, enhance stability, and facilitate convergence. Given the non-Gaussian distribution
of the data, we opted for Normalization using the Min-Max scaling method rather than
Standardization for feature scaling.
X − Xmin
X0 = (1)
Xmax − Xmin
Sensors 2023, 23, 9231 10 of 27
Figure 7. Estimation of Probability Density function of Unit A CANH features compared with the
Normal Distribution.
w t +1 = w t − α ∇ Q ( w t ) (2)
Sensors 2023, 23, 9231 11 of 27
where wt represents the weights of the network at time t, α is the learning rate, and
∇ Q(wt ) indicates the gradient of the cost function Q with respect to the weights wt .
• Activation Function: The Rectified Linear Unit (ReLU) activation function was cho-
sen, defined as f ( x ) = max(0, x ). ReLU is one of the most widely used activation
functions for hidden layers of neural networks. Its simplicity of implementation and
compatibility with TensorFlow Lite makes it a practical choice.
• Model Type: The type of neural network model adopted here is a Feed-Forward
network. In this type of model, connections exist only between successive levels,
avoiding interconnections between neurons of the same level.
• Optimization Algorithm: The Adam optimization algorithm, derived from adaptive
moment estimation, was selected. Adam is an extension of Stochastic Gradient Descent
(SGD), which combines first-order and second-order information to update weights
efficiently, and with an adaptive learning rate. The weight update rule in Adam is
defined with the set of recursive equations in Equation (3):
mt+1 = β 1 mt + (1 − β 1 )∇ Q(wt )
vt+1 = β 2 vt + (1 − β 2 )∇ Q(wt )2 (3)
m
wt+1 = wt − α √v t+1+e
t +1
where mt and vt represent the moment and second moments of the gradient at time t,
respectively; and β 1 , β 2 , and e are hyper-parameters of the model.
• Output Function: For the output layer of the neural network, the Softmax function
was chosen and it is defined as reported in Equation (4).
ez j
σ(z j ) = (4)
∑kK=1 ezk
where z j represents the function input and K is the total number of classes. Softmax is
a mathematical function that transforms a vector of numerical values into a vector of
probabilities. Each probability in the output vector corresponds to the relative scale of
the corresponding input value.
This combination of elements within the neural network model aims to facilitate
effective classification and prediction tasks, making use of widely accepted practices in
the field of deep learning. Figure 8 shows the internal architecture of the proposed neural
network classifier.
Figure 8. Neural Network with two hidden neural layers of 25 neurons each.
We want to emphasize that the Feed-Forward neural network was chosen to reduce
the problems of the interpretability of results, which in fact remains a key issue in industrial
applications, and is in fact the weak point of AI models that rely on much more sophisticated
learning paradigms.
In fact, data from the physical layer are statistically processed using filtering and
feature extraction/selection techniques. Since the features have been analyzed and selected
a priori, the network is not left with the task of extracting features from the data, as
has been achieved with the Deep Learning approach, for example, but only to recognize
the interconnections between the class and the features. This reduces the problems of the
interpretability of the results compared to using an AI model without the data manipulation
Sensors 2023, 23, 9231 12 of 27
steps, as it is not left to the network to decide which features represent the physical data
associated with each control unit. In addition, this greatly reduces the size of the neural
network model, which can then also be integrated into embedded systems with small
computational and memory resources.
4. Experimental Validation
In this section, we delve into the implementation of an anomaly detection algorithm
tailored for the CAN bus, leveraging Artificial Neural Networks (ANNs). To establish a
realistic testing environment, we have engineered a circuit that emulates the structure of an
actual CAN network or sub-network. This circuit comprises five Electronic Control Units
(ECUs) alongside the Traffic Analyzer, strategically designed to simulate various aspects
of CAN communication. Among these ECUs, we have employed five distinct types, each
equipped with one of four different types of CAN communication modules. Within this
ensemble, Unit A, Unit B, and Unit C serve as our known units. These units play a pivotal
Sensors 2023, 23, 9231 13 of 27
role in the training process of the neural network, enabling it to learn and to establish
baseline patterns.
On the other hand, we have designated Intruder 1 and Intruder 2 as our unknown
units. These units emulate potential intruders within the CAN network, mimicking the
behaviors of unauthorized or anomalous entities.
The primary objective here is to develop an anomaly detection system that can effec-
tively identify and flag these intruder units based on deviations from established normal
behavior patterns. This comprehensive setup (see Figure 10) allows us to assess the algo-
rithm’s ability to discern between known and unknown units, ultimately enhancing the
security and integrity of the CAN network. Given that Unit C and Intruder 2 are identical
units in terms of their internal configurations, it naturally follows that their waveforms
exhibit a striking degree of similarity. This similarity arises from the shared character-
istics and behaviors inherent to these two units. Consequently, their waveforms, when
Sensors 2023, 23, 9231 14 of 27
observed, closely mirror each other due to their analogous CAN bus output patterns and
operational tendencies.
In stark contrast, the waveform generated by Intruder 1 presents a notably distinct
profile in comparison to its counterparts. The distinctive nature of Intruder 1’s waveform is
primarily attributed to the unique characteristics of its CAN bus output. Notably, Intruder
1’s CAN bus output exhibits voltage levels that fluctuate within the range of 1 V to 3 V.
Importantly, this voltage range aligns perfectly with the established CAN bus protocol
standards of 1.5 V to 3.5 V. Therefore, Intruder 1’s waveform conforms to the specified
voltage parameters defined by the protocol, albeit with a distinct operational pattern that
sets it apart from the other units (see Figure 11).
After successfully loading the trained neural network onto the S32K144 board (specifi-
cally, the Traffic Analyzer), a comprehensive test was conducted. This test encompassed the
analysis of a total of 1000 messages, with each unit being subjected to a set of 200 messages.
The primary objective of this test was to assess the effectiveness of the classification system.
In establishing a criterion for classifying units, a conservative approach was adopted. It was
determined that a threshold of 90% would serve as the minimum precautionary threshold
for class membership. Units that exhibited classification scores equal to or exceeding this
threshold would be confidently regarded as belonging to a specific class. However, in cases
where units yielded classification scores falling below the 90% threshold, they would be
considered as not definitively belonging to any particular class. This approach allowed
for a robust classification mechanism that prioritized high confidence in unit assignment,
ensuring that any classification made met a stringent threshold of reliability.
The classification of the known units has yielded correct results, effectively categoriz-
ing the messages as expected. However, it is worth noting that the neural network, when
faced with messages from the unknown units, consistently classifies them as originating
from Unit C. This outcome suggests that the neural network, which was trained on data
from the known units, is likely recognizing similarities between the unknown units and
Unit C’s waveform patterns. A proposed solution to address the challenge of classifying
the unknown units involves the creation of a distinct fourth class that encompasses all
instances associated with the unknown units.
Sensors 2023, 23, 9231 15 of 27
Figure 12 represents the training and validation phases of the selected neural network
classifier in the configuration for the first test, while Table 2 reports on the results obtained
regarding accuracy in classification.
Figure 12. Learning curve of accuracy (left) + Learning curve of loss (right) in the First Test.
Figure 13 represents the dummy physical layer created specifically to retrain the
neural network to associate the physical layer of external devices (such as intruder 1 and
intruder 2) with an Unk class and to prevent it from being confused with one of the ECUs
on which the training was performed.
Figure 13. Example of Dominant Real Value (left) + Example of Dominant Fictitious Values (right).
Sensors 2023, 23, 9231 16 of 27
Figure 14. Learning curve of accuracy (left) + Learning curve of loss (right) for the Second Test.
In Table 3, the results obtained during the second test are shown, where the neural
network is able to associate anomaly detection with the "Unknown" class. It must be
highlighted that for Intruder 2, it that seems that a low rate of accuracy in classification
occurs, along with a high rate of non-classified observations (188 over a total of 200). This
is due to the threshold of 90% selected in the output to classifier. This means that the neural
network provides as an output a vector with similar estimated probability (by the softmax
layer) for the possible class. With a lower threshold, it is possible to increase the accuracy,
but also with a higher rate of false-positive estimations.
premise: if the highest score among the first three classes is 90% or greater, it categorizes
the message as originating from an Internal Unit; otherwise, it designates it as stemming
from an External Unit. Furthermore, the algorithm leverages its knowledge of the ID map
that each Unit is capable of transmitting. With this information, the algorithm gains the
capability to determine whether a unit is employing messages with its designated ID or is
employing other IDs. This additional layer of analysis enhances the algorithm’s capacity to
differentiate between legitimate internal communications and potential external intrusions.
See Table 4 for the ID configuration within the proposed validation tests.
The algorithm exhibits the ability to discern four distinct categories of anomalies,
thereby enhancing the overall security of the system:
• External Signal with an Internal ID: In this situation, the algorithm classifies the
incoming message as originating from an unknown unit. Remarkably, the message ID
aligns with one of those previously loaded onto the ID map. This occurrence suggests
a potential external intrusion into the system, as the message source is not recognized
as any of the legitimate internal units.
• External Signal with an External ID: When the algorithm categorizes the message as
belonging to an unknown unit, it further scrutinizes the message ID. In the event
that the message ID does not correspond to any of the IDs pre-loaded on the ID map,
this anomaly is recognized. Such a situation implies the presence of an unauthorized,
external source that is trying to communicate with the system.
• Internal Signal with a Stolen ID: If the algorithm identifies a message as belonging to
Unit A, Unit B, or Unit C, and the message ID aligns with one of the IDs available on
the ID map, an additional layer of scrutiny is applied. In the case where the source of
the message does not match the expected unit, the algorithm flags this as an anomaly.
It suggests that an internal but unauthorized unit may be attempting to impersonate a
legitimate one.
• Internal Signal with an External ID: Whenever the algorithm classifies a message as
being associated with Unit A, Unit B, or Unit C, it extends its examination to the
message ID. If the message ID fails to correspond to any of the IDs pre-loaded on the
ID map, the algorithm recognizes this as an anomaly. In such a scenario, it indicates
that a message from an internal unit is being sent with an ID that is not recognized by
the system, implying an irregularity in the communication protocol.
Impersonation Attack: In this specific context, Intruder 1 once again adopts the
persona of a Strong Attacker. After a phase of routine network activities, Unit A becomes
the target of an attack orchestrated by a Weak Attacker. The scheme involves the Weak
Attacker temporarily disrupting the transmission of messages from Unit A by placing it in
a silent or listen-only mode. Capitalizing on this vulnerability, the Strong Attacker seizes
the opportunity to impersonate the compromised unit, transmitting harmful content under
its guise. The consequential test outcomes are meticulously represented in Figure 16.
These simulated attacks serve as valuable test cases for evaluating the robustness and
effectiveness of the Anomaly Detection algorithm under various security threats, enabling
the system to proactively respond to potential vulnerabilities. The results obtained with
the simulated attacks are perfectly in line with the accuracy obtained during the validation
phase of the classifier model shown in the previous section.
as how close they are to the engine, how long they run for, and how exposed they are to
outside elements like direct sunlight. Because MOSFETs and resistances are intrinsically
sensitive to temperature changes, even small changes in temperature can have a significant
impact on the complex integrated circuits present in these devices.
There is a significant degree of danger associated with subjecting these control units
to high temperatures, since the heat generated by these conditions can significantly dis-
tort the voltage signals, jeopardizing the accuracy of previously recorded data. As such,
careful thermal testing is necessary in order to fully evaluate the possible effects of these
temperature-induced changes, particularly with regard to the effectiveness of cybersecurity
systems that depend on voltage fingerprinting methods. A deeper comprehension of the
true implications of the suggested classification approach may be obtained by attentively
analyzing the Softmax outputs in connection to temperature changes. This will allow
for the development of more intelligent and reliable security mechanisms. To reduce the
measured noise effect, values were collected every 200 temperature values and their mean
was calculated. The algorithm is shown in Figure 18.
Using the identical configuration as the Second test, the remaining units connected
to the bus were set to silent/listen mode. Only Unit C was active in sending messages
Sensors 2023, 23, 9231 20 of 27
during the testing process, while the control unit diligently recorded the corresponding
data (see Figure 19 for the experimental setup configuration illustration). Commencing at
approximately 24 ◦ C (ambient temperature) and progressing up to around 83 ◦ C (within
the Arduino operating temperature range of −40 ◦ C to 85 ◦ C), a series of 4 messages were
systematically transmitted over the CAN network in 5-degree increments, resulting in
a total of 48 transmissions monitored by the control unit. The recorded output values
from the neural network’s Softmax were collated and are presented in detail in Table 5,
accompanied by a visual representation in Figure 20.
The data presented in Table 5 confirm that despite the variations in temperature, there
have been no significant alterations that could potentially compromise the validity of the
previous results. Delving into the insights offered by Figure 20, it becomes apparent that
the predictive trend remains relatively stable within the temperature range spanning from
24 ◦ C to 70 ◦ C, with the exception of an outlier value peaking at 97.82%. There appears to
be a slight downward trend in the scores beyond 70 ◦ C; however, it is worth noting that
the values consistently remain above the critical 98.4% threshold. Notably, no considerable
dips in accuracy were observed throughout the application of the prescribed methodology.
Unit C
Classified as
Classified as A Classified as B Classified as C
Unk
Mean score 0.395120% 0.013482% 99.328014% 0.263384%
Std Dev score 0.103029% 0.014331% 0.258574% 0.233061%
Number of times
0 0 48 0
score ≥ 75%
Number of times
0 0 48 0
score ≥ 90%
Sensors 2023, 23, 9231 21 of 27
networks. Application to Other Protocols: While this research has been focused on CAN
environments, the method’s efficacy encourages its application to diverse network types
within the automotive and industrial sectors. This broadening of scope could address
security concerns in various communication protocols. Comparison with Deterministic
Algorithms: In the realm of classification, an avenue for future exploration lies in the
comparison of neural networks with deterministic algorithms, such as Decision Trees, to
gauge their relative performances. This could provide valuable insights into the strengths
and weaknesses of different approaches. Further Resilience Testing: Extending investi-
gations into the resilience of the system to a broader range of temperature variations can
provide valuable information about its practicality under various environmental condi-
tions. Additionally, exploring other potential environmental factors such as humidity
and electromagnetic interference can further enhance the system’s robustness. Real-Time
Anomaly Detection: Efforts can be directed towards achieving real-time anomaly detection
capabilities, potentially reducing response times and increasing the system’s effectiveness
in mitigating threats.
In conclusion, this research not only validates the effectiveness of the proposed method-
ology, but also outlines a promising path for future research, development, and practical
implementation in the domains of automotive and industrial cybersecurity. The potential
for enhancing network security, particularly in the context of the growing significance of
connected vehicles and industrial IoT, makes this work a valuable contribution to the field.
Author Contributions: Conceptualization, P.D. and S.S.; Methodology, P.D. and S.S.; Software, P.D.;
Validation, P.D.; Investigation, P.D. and S.S.; Funding acquisition, S.S. All authors have read and
agreed to the published version of the manuscript.
Funding: This research is partially funded by the Horizon Europe program under grant agreement
101092850 (AERO project); by the European High-Performance Computing Joint Undertaking (JU)
program under grant agreement 101033975 (EUPEX); and by PNRR project CN1 Big Data, HPC and
Quantum Computing in Spoke 6 multiscale modeling and engineering applications.
Data Availability Statement: Data are contained within the article.
Conflicts of Interest: The authors declare no conflict of interest.
References
1. Rosadini, C.; Chiarelli, S.; Cornelio, A.; Nesci, W.; Saponara, S.; Dini, P.; Gagliardi, A. Method for Protection from Cyber Attacks
to a Vehicle Based upon Time Analysis, and Corresponding Device. US Patent Application 18/163,488, April 2023.
2. Rosadini, C.; Chiarelli, S.; Nesci, W.; Saponara, S.; Gagliardi, A.; Dini, P. Method for Protection From Cyber Attacks to a Vehicle
Based Upon Time Analysis, and Corresponding Device. US Patent Application 17/929,370, November 2023.
3. Dini, P.; Elhanashi, A.; Begni, A.; Saponara, S.; Zheng, Q.; Gasmi, K. Overview on Intrusion Detection Systems Design Exploiting
Machine Learning for Networking Cybersecurity. Appl. Sci. 2023, 13, 7507. [CrossRef]
4. Elhanashi, A.; Gasmi, K.; Begni, A.; Dini, P.; Zheng, Q.; Saponara, S. Machine Learning Techniques for Anomaly-Based Detection
System on CSE-CIC-IDS2018 Dataset. In Proceedings of the International Conference on Applications in Electronics Pervading
Industry, Environment and Society, Genova, Italy, 26–27 September 2022; pp. 131–140.
5. Dini, P.; Begni, A.; Ciavarella, S.; De Paoli, E.; Fiorelli, G.; Silvestro, C.; Saponara, S. Design and Testing Novel One-Class Classifier
Based on Polynomial Interpolation with Application to Networking Security. IEEE Access 2022, 10, 67910–67924. [CrossRef]
6. Dini, P.; Saponara, S.; Colicelli, A. Overview on Battery Charging Systems for Electric Vehicles. Electronics 2023, 12, 4295.
[CrossRef]
7. Pacini, F.; Di Matteo, S.; Dini, P.; Fanucci, L.; Bucchi, F. Innovative Plug-and-Play System for Electrification of Wheel-Chairs. IEEE
Access 2023, 11, 89038–89051. [CrossRef]
8. Begni, A.; Dini, P.; Saponara, S. Design and Test of an LSTM-Based Algorithm for Li-Ion Batteries Remaining Useful Life
Estimation. In Proceedings of the International Conference on Applications in Electronics Pervading Industry, Environment and
Society, Genova, Italy, 26–27 September 2022; pp. 373–379.
9. Dini, P.; Saponara, S.; Chakraborty, S.; Hosseinabadi, F.; Hegazy, O. Experimental Characterization & Electro-Thermal Modeling
of Double Side Cooled SiC MOSFETs for Accurate and Rapid Power Converter Simulations. IEEE Access 2023, 11, 79120–79143.
10. Bernardeschi, C.; Dini, P.; Domenici, A.; Palmieri, M.; Saponara, S. Do-it-Yourself FMU Generation. In Proceedings of the
International Conference on Software Engineering and Formal Methods, Berlin, Germany, 26–30 September 2022; pp. 210–227.
Sensors 2023, 23, 9231 23 of 27
11. Pierpaolo, D.; Saponara, S. Control system design for cogging torque reduction based on sensor-less architecture. In Proceedings
of the Applications in Electronics Pervading Industry, Environment and Society: APPLEPIES 2019 7, Pisa, Italy, 19–20 November
2020; pp. 309–321.
12. Dini, P.; Saponara, S. Review on model based design of advanced control algorithms for cogging torque reduction in power drive
systems. Energies 2022, 15, 8990. [CrossRef]
13. Dini, P.; Ariaudo, G.; Botto, G.; Greca, F.L.; Saponara, S. Real-time electro-thermal modelling & predictive control design of
resonant power converter in full electric vehicle applications. IET Power Electron. 2023, 16, 2045–2064.
14. Bernardeschi, C.; Dini, P.; Domenici, A.; Saponara, S. Co-simulation and Verification of a Non-linear Control System for Cogging
Torque Reduction in Brushless Motors. In Proceedings of the Software Engineering and Formal Methods: SEFM 2019 Collocated
Workshops: CoSim-CPS, ASYDE, CIFMA, and FOCLASA, Oslo, Norway, 16–20 September 2019; pp. 3–19.
15. Bernardeschi, C.; Dini, P.; Domenici, A.; Mouhagir, A.; Palmieri, M.; Saponara, S.; Sassolas, T.; Zaourar, L. Co-simulation of
a model predictive control system for automotive applications. In Proceedings of the International Conference on Software
Engineering and Formal Methods, Online, 6–10 November 2023; pp. 204–220.
16. Benedetti, D.; Agnelli, J.; Gagliardi, A.; Dini, P.; Saponara, S. Design of a Digital Dashboard on Low-Cost Embedded Platform in a
Fully Electric Vehicle. In Proceedings of the 2020 IEEE International Conference on Environment and Electrical Engineering and
2020 IEEE Industrial and Commercial Power Systems Europe (EEEIC / ICPS Europe), Madrid, Spain, 9–12 June 2020; pp. 1–5.
[CrossRef]
17. Cosimi, F.; Dini, P.; Giannetti, S.; Petrelli, M.; Saponara, S. Analysis and design of a non-linear MPC algorithm for vehicle
trajectory tracking and obstacle avoidance. In Applications in Electronics Pervading Industry, Environment and Society: APPLEPIES
2020; Springer: Berlin/Heidelberg, Germany, 2021; pp. 229–234.
18. Miller, C.; Valasek, C. A survey of remote automotive attack surfaces. Black Hat USA 2014, 2014, 94.
19. Wolf, M.; Weimerskirch, A.; Wollinger, T. State of the art: Embedding security in vehicles. EURASIP J. Embed. Syst. 2007,
2007, 74706. [CrossRef]
20. Miller, C.; Valasek, C. Remote exploitation of an unaltered passenger vehicle. Black Hat USA 2015, 2015, 1–91.
21. Voss, W. Error Detection and Fault Confinement. A Comprehensible Guide to Controller Area Network, 2nd ed.; Copperhill Media
Corporation: Greenfield, MA, USA, 2008; pp. 117–122.
22. Zhang, H.; Meng, X.; Zhang, X.; Liu, Z. CANsec: A practical in-vehicle controller area network security evaluation tool. Sensors
2020, 20, 4900. [CrossRef] [PubMed]
23. Kleberger, P.; Olovsson, T.; Jonsson, E. Security aspects of the in-vehicle network in the connected car. In Proceedings of the 2011
IEEE Intelligent Vehicles Symposium (IV), Baden-Baden, Germany, 5–9 June 2011; pp. 528–533.
24. Wang, Q.; Sawhney, S. VeCure: A practical security framework to protect the CAN bus of vehicles. In Proceedings of the 2014
International Conference on the Internet of Things (IOT), Cambridge, MA, USA, 6–8 October 2014; pp. 13–18.
25. Cui, X.; Liu, S.; Lin, Z.; Ma, J.; Wen, F.; Ding, Y.; Yang, L.; Guo, W.; Feng, X. Two-Step Electricity Theft Detection Strategy
Considering Economic Return Based on Convolutional Autoencoder and Improved Regression Algorithm. IEEE Trans. Power
Syst. 2022, 37, 2346–2359. [CrossRef]
26. Li, X.; Ma, J.; Zhao, X.; Wang, L. Intelligent Two-Step Estimation Approach for Vehicle Mass and Road Grade. IEEE Access 2020,
8, 218853–218862. [CrossRef]
27. Feng, Y.; Cao, Y.; Yang, S.; Yang, L.; Wei, T. A two-step sub-optimal algorithm for bus evacuation planning. Oper. Res. 2023, 23, 36.
[CrossRef]
28. Liang, J.; Wu, J.; Gao, Z.; Sun, H.; Yang, X.; Lo, H.K. Bus transit network design with uncertainties on the basis of a metro network:
A two-step model framework. Transp. Res. Part B Methodol. 2019, 126, 115–138. [CrossRef]
29. Lombardi, M.; Pascale, F.; Santaniello, D. Two-step algorithm to detect cyber-attack over the can-bus: A preliminary case study in
connected vehicles. ASCE-ASME J. Risk Uncertain. Eng. Syst. Part B Mech. Eng. 2022, 8, 031105. [CrossRef]
30. Dong, C.; Wu, H.; Li, Q. Multiple Observation HMM-Based CAN Bus Intrusion Detection System for In-Vehicle Network. IEEE
Access 2023, 11, 35639–35648. [CrossRef]
31. Bari, B.S.; Yelamarthi, K.; Ghafoor, S. Intrusion Detection in Vehicle Controller Area Network (CAN) Bus Using Machine Learning:
A Comparative Performance Study. Sensors 2023, 23, 3610. [CrossRef]
32. Khan, J.; Lim, D.W.; Kim, Y.S. Intrusion Detection System CAN-Bus In-Vehicle Networks Based on the Statistical Characteristics
of Attacks. Sensors 2023, 23, 3554. [CrossRef]
33. Rajapaksha, S.; Kalutarage, H.; Al-Kadri, M.O.; Madzudzo, G.; Petrovski, A.V. Keep the Moving Vehicle Secure: Context-Aware
Intrusion Detection System for In-Vehicle CAN Bus Security. In Proceedings of the 2022 14th International Conference on Cyber
Conflict: Keep Moving! (CyCon), Tallinn, Estonia, 31 May–3 June 2022; Volume 700, pp. 309–330. [CrossRef]
34. Jichici, C.; Groza, B.; Ragobete, R.; Murvay, P.S.; Andreica, T. Effective Intrusion Detection and Prevention for the Commercial
Vehicle SAE J1939 CAN Bus. IEEE Trans. Intell. Transp. Syst. 2022, 23, 17425–17439. [CrossRef]
35. Alfardus, A.; Rawat, D.B. Intrusion Detection System for CAN Bus In-Vehicle Network based on Machine Learning Algorithms.
In Proceedings of the 2021 IEEE 12th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference
(UEMCON), New York, NY, USA, 1–4 December 2021; pp. 0944–0949. [CrossRef]
Sensors 2023, 23, 9231 24 of 27
36. Jin, S.; Chung, J.G.; Xu, Y. Signature-Based Intrusion Detection System (IDS) for In-Vehicle CAN Bus Network. In Proceedings of
the 2021 IEEE International Symposium on Circuits and Systems (ISCAS), Daegu, Republic of Korea, 22–28 May 2021; pp. 1–5.
[CrossRef]
37. Delwar Hossain, M.; Inoue, H.; Ochiai, H.; Fall, D.; Kadobayashi, Y. An Effective In-Vehicle CAN Bus Intrusion Detection System
Using CNN Deep Learning Approach. In Proceedings of the GLOBECOM 2020–2020 IEEE Global Communications Conference,
Taipei, Taiwan, 7–11 December 2020; pp. 1–6. [CrossRef]
38. Hossain, M.D.; Inoue, H.; Ochiai, H.; Fall, D.; Kadobayashi, Y. LSTM-Based Intrusion Detection System for In-Vehicle Can Bus
Communications. IEEE Access 2020, 8, 185489–185502. [CrossRef]
39. Hanselmann, M.; Strauss, T.; Dormann, K.; Ulmer, H. CANet: An Unsupervised Intrusion Detection System for High Dimensional
CAN Bus Data. IEEE Access 2020, 8, 58194–58205. [CrossRef]
40. Casillo, M.; Coppola, S.; De Santo, M.; Pascale, F.; Santonicola, E. Embedded Intrusion Detection System for Detecting Attacks
over CAN-BUS. In Proceedings of the 2019 4th International Conference on System Reliability and Safety (ICSRS), Rome, Italy,
20–22 November 2019; pp. 136–141. [CrossRef]
41. Abbott-McCune, S.; Shay, L.A. Intrusion prevention system of automotive network CAN bus. In Proceedings of the 2016 IEEE
International Carnahan Conference on Security Technology (ICCST), Orlando, FL, USA, 24–27 October 2016; pp. 1–8. [CrossRef]
42. Gmiden, M.; Gmiden, M.H.; Trabelsi, H. An intrusion detection method for securing in-vehicle CAN bus. In Proceedings of the
2016 17th International Conference on Sciences and Techniques of Automatic Control and Computer Engineering (STA), Sousse,
Tunisia, 19–21 December 2016; pp. 176–180. [CrossRef]
43. Wang, K.; Zhang, A.; Sun, H.; Wang, B. Analysis of Recent Deep-Learning-Based Intrusion Detection Methods for In-Vehicle
Network. IEEE Trans. Intell. Transp. Syst. 2023, 24, 1843–1854. [CrossRef]
44. Tariq, S.; Lee, S.; Kim, H.K.; Woo, S.S. CAN-ADF: The controller area network attack detection framework. Comput. Secur. 2020,
94, 101857. [CrossRef]
45. Gundu, R.; Maleki, M. Securing CAN Bus in Connected and Autonomous Vehicles Using Supervised Machine Learning
Approaches. In Proceedings of the 2022 IEEE International Conference on Electro Information Technology (eIT), Mankato, MN,
USA, 19–21 May 2022; pp. 042–046. [CrossRef]
46. Salunkhe, S.S.; Pal, S.; Agrawal, A.; Rai, R.; Mole, S.S.; Jos, B.M. Energy optimization for CAN bus and media controls in electric
vehicles using deep learning algorithms. J. Supercomput. 2022, 78, 8493–8508. [CrossRef]
47. Abdennour, N.; Ouni, T.; Amor, N.B. Driver identification using only the CAN-Bus vehicle data through an RCN deep learning
approach. Robot. Auton. Syst. 2021, 136, 103707. [CrossRef]
48. Zhang, J.; Wu, Z.; Li, F.; Xie, C.; Ren, T.; Chen, J.; Liu, L. A deep learning framework for driving behavior identification on
in-vehicle CAN-BUS sensor data. Sensors 2019, 19, 1356. [CrossRef] [PubMed]
49. Lin, Y.; Chen, C.; Xiao, F.; Avatefipour, O.; Alsubhi, K.; Yunianta, A. An Evolutionary Deep Learning Anomaly Detection
Framework for In-Vehicle Networks-CAN Bus. IEEE Trans. Ind. Appl. 2020. [CrossRef]
50. Refat, R.U.D.; Elkhail, A.A.; Hafeez, A.; Malik, H. Detecting can bus intrusion by applying machine learning method to graph
based features. In Intelligent Systems and Applications: Proceedings of the 2021 Intelligent Systems Conference (IntelliSys); Springer:
Berlin/Heidelberg, Germany, 2022; Volume 3, pp. 730–748.
51. Lee, S.; Choi, W.; Jo, H.J.; Lee, D.H. ErrIDS: An Enhanced Cumulative Timing Error-Based Automotive Intrusion Detection
System. IEEE Trans. Intell. Transp. Syst. 2023, 24, 12406–12421. [CrossRef]
52. Lee, S.; Jo, H.J.; Cho, A.; Lee, D.H.; Choi, W. TTIDS: Transmission-Resuming Time-Based Intrusion Detection System for Controller
Area Network (CAN). IEEE Access 2022, 10, 52139–52153. [CrossRef]
53. Zhao, Y.; Xun, Y.; Liu, J. ClockIDS: A Real-Time Vehicle Intrusion Detection System Based on Clock Skew. IEEE Internet Things J.
2022, 9, 15593–15606. [CrossRef]
54. Halder, S.; Conti, M.; Das, S.K. COIDS: A clock offset based intrusion detection system for controller area networks. In
Proceedings of the 21st International Conference on Distributed Computing and Networking, Kolkata, India, 4–7 January 2020;
pp. 1–10.
55. Zhou, X.; Jiang, R.; Tian, M.; Qu, H.; Zhang, H. Temperature-sensitive fingerprinting on ECU clock offset for CAN intrusion
detection and source identification. In Proceedings of the ACM Turing Celebration Conference, Hefei, China, 22–24 May 2020;
pp. 89–94.
56. Zhou, J.; Xie, G.; Yu, S.; Li, R. Clock-Based Sender Identification and Attack Detection for Automotive CAN Network. IEEE
Access 2021, 9, 2665–2679. [CrossRef]
57. Hu, X.; Hu, A.; Yu, J.; Ding, Y.; Hu, H.; Guo, P. Anti-counterfeiting Method of CAN Terminal Based on Device Physical
Fingerprint. In Proceedings of the 2023 3rd International Conference on Consumer Electronics and Computer Engineering
(ICCECE), Guangzhou, China, 6–8 January 2023; pp. 394–399. [CrossRef]
58. Murvay, P.S.; Berdich, A.; Groza, B. Physical Layer Intrusion Detection and Localization on CAN Bus. In Machine Learning and
Optimization Techniques for Automotive Cyber-Physical Systems; Springer: Berlin/Heidelberg, Germany, 2023; pp. 399–423.
59. Mohan, J. An Integrated Approach to Securing In-Vehicle CAN Bus Network Using ECU Fingerprinting and Image Classification
Techniques. Ph.D. Thesis, University of Michigan, Ann Arbor, MI, USA, 2023.
60. Popa, L.; Groza, B.; Jichici, C.; Murvay, P.S. ECUPrint—Physical Fingerprinting Electronic Control Units on CAN Buses Inside
Cars and SAE J1939 Compliant Vehicles. IEEE Trans. Inf. Forensics Secur. 2022, 17, 1185–1200. [CrossRef]
Sensors 2023, 23, 9231 25 of 27
61. Hafeez, A.; Rehman, K.; Malik, H. State of the Art Survey on Comparison of Physical Fingerprinting-Based Intrusion Detection Techniques
for In-Vehicle Security; Technical Report, SAE Technical Paper; SAE: Warrendale, PA, USA, 2020.
62. Tayyab, M. Authenticating the Sender on CAN Bus Using Inimitable Physical Characteristics of the Transmitter and Channel.
Ph.D. Thesis, University of Michigan, Ann Arbor, MI, USA, 2018.
63. Avatefipour, O. Physical-Fingerprinting of Electronic Control Unit (ECU) Based on Machine Learning Algorithm for In-Vehicle
Network Communication Protocol CAN-BUS. Ph.D. Thesis, University of Michigan, Ann Arbor, MI, USA, 2017.
64. Avatefipour, O.; Hafeez, A.; Tayyab, M.; Malik, H. Linking received packet to the transmitter through physical-fingerprinting
of controller area network. In Proceedings of the 2017 IEEE Workshop on Information Forensics and Security (WIFS), Rennes,
France, 4–7 December 2017; pp. 1–6. [CrossRef]
65. Fang, W.; Yu, J.; Ding, Y.; Hu, X.; Li, S.; Hu, A. Research on Terminal Fingerprint Extraction and Temperature Adaptability Based
on CAN Bus. In Proceedings of the 2022 IEEE 22nd International Conference on Communication Technology (ICCT), Nanjing,
China, 11–14 November 2022; pp. 1506–1511. [CrossRef]
66. Verma, K.; Girdhar, M.; Hafeez, A.; Awad, S.S. ECU Identification using Neural Network Classification and Hyperparameter
Tuning. In Proceedings of the 2022 IEEE International Workshop on Information Forensics and Security (WIFS), Virtual, 12–16
December 2022; pp. 1–6. [CrossRef]
67. Hafeez, A.; Mohan, J.; Girdhar, M.; Awad, S.S. Machine Learning based ECU Detection for Automotive Security. In Proceedings
of the 2021 17th International Computer Engineering Conference (ICENCO), Giza, Egypt, 29–30 December 2021; pp. 73–81.
[CrossRef]
68. Fugiglando, U.; Massaro, E.; Santi, P.; Milardo, S.; Abida, K.; Stahlmann, R.; Netter, F.; Ratti, C. Driving Behavior Analysis through
CAN Bus Data in an Uncontrolled Environment. IEEE Trans. Intell. Transp. Syst. 2019, 20, 737–748. [CrossRef]
69. Prodanov, W.; Valle, M.; Buzas, R. A Controller Area Network Bus Transceiver Behavioral Model for Network Design and
Simulation. IEEE Trans. Ind. Electron. 2009, 56, 3762–3771. [CrossRef]
70. Hafeez, A.; Topolovec, K.; Awad, S. ECU Fingerprinting through Parametric Signal Modeling and Artificial Neural Networks for
In-vehicle Security against Spoofing Attacks. In Proceedings of the 2019 15th International Computer Engineering Conference
(ICENCO), Cairo, Egypt, 29–30 December 2019; pp. 29–38. [CrossRef]
71. Cappelli, I.; Carli, F.; Fort, A.; Intravaia, M.; Micheletti, F.; Peruzzi, G.; Vignoli, V. Enhanced Visible Light Localization Based on
Machine Learning and Optimized Fingerprinting in Wireless Sensor Networks. IEEE Trans. Instrum. Meas. 2023, 72, 9503410.
[CrossRef]
72. Thakur, S.; Moreno, C.; Fischmeister, S. CANOA: CAN Origin Authentication through Power Side-Channel Monitoring. ACM
Trans. Cyber Phys. Syst. 2022 . [CrossRef]
73. Ahmed, S.; Juliato, M.; Gutierrez, C.; Sastry, M. Two-point voltage fingerprinting: Increasing detectability of ecu masquerading
attacks. arXiv 2021, arXiv:2102.10128.
74. Lesi, V.; Juliato, M.; Ahmed, S.; Gutierrez, C.; Wang, Q.; Sastry, M. Intrusion Detection and Localization for Networked Embedded
Control Systems. arXiv 2021, arXiv:2106.09826.
75. Wang, Q.; Qian, Y.; Lu, Z.; Shoukry, Y.; Qu, G. A Delay based Plug-in-Monitor for Intrusion Detection in Controller Area Network.
In Proceedings of the 2018 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), Hong Kong, China, 17–18
December 2018; pp. 86–91. [CrossRef]
76. Li, J.; Zhang, M.; Lai, Y. A Light-Weighted Machine Learning Based ECU Identification for Automative CAN Security; Technical Report;
EasyChair: Manchester, UK, 2023.
77. Khalaf, R.H.; Mohammed, A.H. Confidentiality and integrity of sensing data transmission in iot application. Int. J. Eng. Technol.
2018, 7, 240–245.
78. Tchernykh, A.; Schwiegelsohn, U.; Talbi, E.g.; Babenko, M. Towards understanding uncertainty in cloud computing with risks of
confidentiality, integrity, and availability. J. Comput. Sci. 2019, 36, 100581. [CrossRef]
79. Aminzade, M. Confidentiality, integrity and availability-finding a balanced IT framework. Netw. Secur. 2018, 2018, 9–11.
[CrossRef]
80. Samonas, S.; Coss, D. The CIA strikes back: Redefining confidentiality, integrity and availability in security. J. Inf. Syst. Secur.
2014, 10. Available online: https://api.semanticscholar.org/CorpusID:215838643 (accessed on 13 November 2023).
81. Jukl, M.; Čupera, J. Using of tiny encryption algorithm in CAN-Bus communication. Res. Agric. Eng. 2016, 62, 50–55. [CrossRef]
82. Farag, W.A. CANTrack: Enhancing automotive CAN bus security using intuitive encryption algorithms. In Proceedings of
the 2017 7th International Conference on Modeling, Simulation, and Applied Optimization (ICMSAO), Sharjah, United Arab
Emirates, 4–6 April 2017; pp. 1–5. [CrossRef]
83. Luo, J.N.; Wu, C.M.; Yang, M.H. A can-bus lightweight authentication scheme. Sensors 2021, 21, 7069. [CrossRef] [PubMed]
84. Nürnberger, S.; Rossow, C. –vatican–vetted, authenticated can bus. In Proceedings of the Cryptographic Hardware and
Embedded Systems–CHES 2016: 18th International Conference, Santa Barbara, CA, USA, 17–19 August 2016; pp. 106–124.
85. Van Herrewege, A.; Singelee, D.; Verbauwhede, I. CANAuth-a simple, backward compatible broadcast authentication protocol
for CAN bus. In Proceedings of the ECRYPT workshop on Lightweight Cryptography. ECRYPT, Nara, Japan, 28 September–1
October 2011; Volume 2011, p. 20.
Sensors 2023, 23, 9231 26 of 27
86. Páez, F.; Kaschel, H. A Proposal for Data Authentication, Data Integrity and Replay Attack Rejection for the LIN Bus. In
Proceedings of the 2021 IEEE CHILEAN Conference on Electrical, Electronics Engineering, Information and Communication
Technologies (CHILECON), Online 6–9 December 2021; pp. 1–7. [CrossRef]
87. Dee, T.; Tyagi, A. Message Integrity and Authenticity in Secure CAN. IEEE Consum. Electron. Mag. 2021, 10, 33–40. [CrossRef]
88. Thodi, B.T.; Chilukuri, B.R.; Vanajakshi, L. An analytical approach to real-time bus signal priority system for isolated intersections.
J. Intell. Transp. Syst. 2022, 26, 145–167. [CrossRef]
89. Long, K.; Wei, J.; Gu, J.; Yang, X. Headway-Based Multi-Route Transit Signal Priority at Isolated Intersection. IEEE Access 2020,
8, 187824–187831. [CrossRef]
90. Wang, S.; Farjam, T.; Charalambous, T. A Priority-Based Distributed Channel Access Mechanism for Control over CAN-like
Networks. In Proceedings of the 2021 European Control Conference (ECC), Delft, The Netherlands, 29 June–2 July 2021;
pp. 176–182. [CrossRef]
91. Maithili, K.; Vinothkumar, V.; Latha, P. Analyzing the security mechanisms to prevent unauthorized access in cloud and network
security. J. Comput. Theor. Nanosci. 2018, 15, 2059–2063. [CrossRef]
92. Muslukhov, I.; Boshmaf, Y.; Kuo, C.; Lester, J.; Beznosov, K. Know your enemy: The risk of unauthorized access in smartphones
by insiders. In Proceedings of the 15th International Conference on Human-Computer Interaction with Mobile Devices and
Services, Munich, Germany, 27–30 August 2013; pp. 271–280.
93. AbdAllah, E.G.; Zulkernine, M.; Hassanein, H.S. Preventing unauthorized access in information centric networking. Secur. Priv.
2018, 1, e33. [CrossRef]
94. Kitova, E.T.; Gorlov, N.I.; Bogachkov, I.V. Unauthorized Access Monitoring in Optical Access Networks. In Proceedings of the
2020 Systems of Signal Synchronization, Generating and Processing in Telecommunications (SYNCHROINFO), Svetlogorsk,
Russia, 1–3 July 2020; pp. 1–4. [CrossRef]
95. Shi, J.; Li, R.; Hou, W. A Mechanism to Resolve the Unauthorized Access Vulnerability Caused by Permission Delegation in
Blockchain-Based Access Control. IEEE Access 2020, 8, 156027–156042. [CrossRef]
96. Razaque, A.; Shaldanbayeva, N.; Alotaibi, B.; Alotaibi, M.; Murat, A.; Alotaibi, A. Big data handling approach for unauthorized
cloud computing access. Electronics 2022, 11, 137. [CrossRef]
97. Aljabri, M.; Alahmadi, A.A.; Mohammad, R.M.A.; Alhaidari, F.; Aboulnour, M.; Alomari, D.M.; Mirza, S. Machine Learning-Based
Detection for Unauthorized Access to IoT Devices. J. Sens. Actuator Netw. 2023, 12, 27. [CrossRef]
98. Chandrasekaran, S.; Ramachandran, K.; Adarsh, S.; Puranik, A.K. Avoidance of Replay attack in CAN protocol using Authenti-
cated Encryption. In Proceedings of the 2020 11th International Conference on Computing, Communication and Networking
Technologies (ICCCNT), Kharagpur, India, 1–3 July 2020; pp. 1–6. [CrossRef]
99. Xue, H.; Yang, Y.; Liu, J.; Xu, Z.; Dankanti, K.A. Reverse fast replay attack tunnel lighting system based on CAN bus. In
Proceedings of the Second International Conference on Electronic Information Engineering, Big Data, and Computer Technology
(EIBDCT 2023), Xishuangbanna, China, 6–8 January 2023; Volume 12642, pp. 82–87.
100. Ansari, M.R.; Miller, W.T.; She, C.; Yu, Q. A low-cost masquerade and replay attack detection method for CAN in automotive
vehicles. In Proceedings of the 2017 IEEE International Symposium on Circuits and Systems (ISCAS), Baltimore, MD, USA, 28–31
May 2017; pp. 1–4. [CrossRef]
101. Rasheed, A.; Baza, M.; Badr, M.; Alshahrani, H.; Choo, K.K.R. Efficient Crypto Engine for Authenticated Encryption, Data
Traceability, and Replay Attack Detection over CAN Bus Network. IEEE Trans. Netw. Sci. Eng. 2023, 1–17. [CrossRef]
102. Thirumavalavasethurayar, P.; Ravi, T. Implementation of Replay Attack in Controller Area Network Bus using Universal
Verification Methodology. In Proceedings of the 2021 International Conference on Artificial Intelligence and Smart Systems
(ICAIS), Coimbatore, India, 25–27 March 2021; pp. 1142–1146. [CrossRef]
103. Humayed, A.; Li, F.; Lin, J.; Luo, B. Cansentry: Securing can-based cyber-physical systems against denial and spoofing attacks. In
Proceedings of the Computer Security-ESORICS 2020: 25th European Symposium on Research in Computer Security, ESORICS
2020, Guildford, UK, 14–18 September 2020; pp. 153–173.
104. Amato, F.; Coppolino, L.; Mercaldo, F.; Moscato, F.; Nardone, R.; Santone, A. CAN-Bus Attack Detection with Deep Learning.
IEEE Trans. Intell. Transp. Syst. 2021, 22, 5081–5090. [CrossRef]
105. Cros, O.; Chênevert, G. Hashing-based authentication for CAN bus and application to Denial-of-Service protection. In
Proceedings of the 2019 3rd Cyber Security in Networking Conference (CSNet), Quito, Ecuador, 23–25 October 2019; pp. 91–98.
[CrossRef]
106. Palanca, A.; Evenchick, E.; Maggi, F.; Zanero, S. A stealth, selective, link-layer denial-of-service attack against automotive
networks. In Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment: 14th International
Conference, DIMVA 2017, Bonn, Germany, 6–7 July 2017; pp. 185–206.
107. Bozdal, M.; Randa, M.; Samie, M.; Jennions, I. Hardware trojan enabled denial of service attack on can bus. Procedia Manuf. 2018,
16, 47–52. [CrossRef]
108. Levy, E.; Shabtai, A.; Groza, B.; Murvay, P.S.; Elovici, Y. CAN-LOC: Spoofing Detection and Physical Intrusion Localization on an
In-Vehicle CAN Bus Based on Deep Features of Voltage Signals. IEEE Trans. Inf. Forensics Secur. 2023, 18, 4800–4814. [CrossRef]
109. Lalouani, W.; Dang, Y.; Younis, M. Mitigating voltage fingerprint spoofing attacks on the controller area network bus. Clust.
Comput. 2023, 26, 1447–1460. [CrossRef]
110. Dagan, T.; Wool, A. Parrot, a software-only anti-spoofing defense system for the CAN bus. ESCAR Eur. 2016, 34
Sensors 2023, 23, 9231 27 of 27
111. Yang, Y.; Duan, Z.; Tehranipoor, M. Identify a spoofing attack on an in-vehicle CAN bus based on the deep features of an ECU
fingerprint signal. Smart Cities 2020, 3, 17–30. [CrossRef]
112. Iehira, K.; Inoue, H.; Ishida, K. Spoofing attack using bus-off attacks against a specific ECU of the CAN bus. In Proceedings of the
2018 15th IEEE Annual Consumer Communications and Networking Conference (CCNC), Las Vegas, NV, USA, 12–15 January
2018; pp. 1–4. [CrossRef]
113. Ruotsalainen, H.; Shen, G.; Zhang, J.; Fujdiak, R. LoRaWAN Physical Layer-Based Attacks and Countermeasures, a Review.
Sensors 2022, 22, 3127. [CrossRef] [PubMed]
114. Givehchian, H.; Bhaskar, N.; Herrera, E.R.; Soto, H.R.L.; Dameff, C.; Bharadia, D.; Schulman, A. Evaluating Physical-Layer BLE
Location Tracking Attacks on Mobile Devices. In Proceedings of the 2022 IEEE Symposium on Security and Privacy (SP), San
Francisco, CA, USA, 23–25 May 2022; pp. 1690–1704. [CrossRef]
115. Nooraiepour, A.; Bajwa, W.U.; Mandayam, N.B. Learning-Aided Physical Layer Attacks against Multicarrier Communications in
IoT. IEEE Trans. Cogn. Commun. Netw. 2021, 7, 239–254. [CrossRef]
116. Huang, S.; Lin, C.; Zhou, K.; Yao, Y.; Lu, H.; Zhu, F. Identifying physical-layer attacks for IoT security: An automatic modulation
classification approach using multi-module fusion neural network. Phys. Commun. 2020, 43, 101180. [CrossRef]
117. Salahdine, F.; Kaabouch, N. Security threats, detection, and countermeasures for physical layer in cognitive radio networks: A
survey. Phys. Commun. 2020, 39, 101001. [CrossRef]
118. Mohammed, A.Z.; Man, Y.; Gerdes, R.; Li, M.; Celik, Z.B. Physical layer data manipulation attacks on the can bus. In Proceedings
of the International Workshop on Automotive and Autonomous Vehicle Security (AutoSec), San Diego, CA, USA, 24 April 2022.
119. Oladimeji, D.; Rasheed, A.; Varol, C.; Baza, M.; Alshahrani, H.; Baz, A. CANAttack: Assessing Vulnerabilities within Controller
Area Network. Sensors 2023, 23, 8223. [CrossRef]
120. Bozdal, M.; Samie, M.; Aslam, S.; Jennions, I. Evaluation of can bus security challenges. Sensors 2020, 20, 2364. [CrossRef]
[PubMed]
121. Bozdal, M.; Samie, M.; Jennions, I. A survey on can bus protocol: Attacks, challenges, and potential solutions. In Proceedings of
the 2018 International Conference on Computing, Electronics & Communications Engineering (iCCECE), Southend, UK, 16–17
August 2018; pp. 201–205.
122. Lokman, S.F.; Othman, A.T.; Abu-Bakar, M.H. Intrusion detection system for automotive Controller Area Network (CAN) bus
system: A review. EURASIP J. Wirel. Commun. Netw. 2019, 2019, 184. [CrossRef]
123. TensorFlow’s Official Web Site. Available online: https://www.tensorflow.org/?hl=en (accessed on 13 November 2023).
124. Keras’ Official Web Site. Available online: https://keras.io/ (accessed on 13 November 2023).
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual
author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to
people or property resulting from any ideas, methods, instructions or products referred to in the content.