{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,26]],"date-time":"2025-12-26T07:13:25Z","timestamp":1766733205197,"version":"3.37.3"},"reference-count":40,"publisher":"Wiley","license":[{"start":{"date-parts":[[2020,10,30]],"date-time":"2020-10-30T00:00:00Z","timestamp":1604016000000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2019M652475","201813021"],"award-info":[{"award-number":["2019M652475","201813021"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["2019M652475","201813021"],"award-info":[{"award-number":["2019M652475","201813021"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2020,10,30]]},"abstract":"<jats:p>External wireless interfaces and the lack of security design of controller area network (CAN) standards make it vulnerable to CAN-targeting attacks. Unfortunately, various defense solutions have been proposed merely to detect CAN intrusion attacks, while only a few works are devoted to intrusion source identification. Demonstrated by our experimental studies, the most advanced IDS with intrusion source identification, which is based on the physical feature fingerprints of the in-vehicle Electronic Control Units (ECUs), will fail when the temperature changes. In this paper, we innovatively propose temperature-varied fingerprinting, called TVF, for CAN intrusion detection and intrusion source identification. Motivated by the remarkable observation that the physical feature of an ECU, i.e., its clock offset, changes linearly with the temperature of ECUs, the concept of temperature-varied fingerprints is proposed. Then, for a severe intrusion case, we provide an advanced TVF for further supplemented and expanded. The proposed advanced temperature-varied fingerprinting is implemented, and extensive performance evaluation experiments are conducted in both CAN bus prototype and real vehicles. The experimental results illustrate the effectiveness and performance of advanced TVF.<\/jats:p>","DOI":"10.1155\/2020\/8834845","type":"journal-article","created":{"date-parts":[[2020,10,30]],"date-time":"2020-10-30T18:50:23Z","timestamp":1604083823000},"page":"1-17","source":"Crossref","is-referenced-by-count":8,"title":["Advanced Temperature-Varied ECU Fingerprints for Source Identification and Intrusion Detection in Controller Area Networks"],"prefix":"10.1155","volume":"2020","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0041-4022","authenticated-orcid":true,"given":"Miaoqing","family":"Tian","sequence":"first","affiliation":[{"name":"Department of Computer Science and Technology, Ocean University of China, Qingdao, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1209-078X","authenticated-orcid":true,"given":"Ruobing","family":"Jiang","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, Ocean University of China, Qingdao, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1564-8980","authenticated-orcid":true,"given":"Haipeng","family":"Qu","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, Ocean University of China, Qingdao, China"}]},{"given":"Qian","family":"Lu","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Qingdao University, Qingdao, China"}]},{"given":"Xiaoyun","family":"Zhou","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, Ocean University of China, Qingdao, China"}]}],"member":"311","reference":[{"first-page":"260","article-title":"Adventures in automotive networks and control units","author":"C. Miller","key":"1"},{"first-page":"1","article-title":"Free-fall: hacking tesla from wireless to can CAN bus","author":"S. Nie","key":"2"},{"key":"3","first-page":"21","article-title":"Hackers remotely kill a jeep on the highway-with me in it","volume":"7","author":"A. Greenberg","year":"2015","journal-title":"Wired"},{"first-page":"2283","article-title":"Librecan: automated can message translator","author":"M. D. Pese","key":"4"},{"first-page":"1110","article-title":"Entropy-based anomaly detection for in-vehicle networks","author":"M. Muter","key":"5"},{"first-page":"92","article-title":"A structured approach to\u00a8 anomaly detection for in-vehicle networks","author":"M. Muter","key":"6"},{"author":"E. Seo","key":"7","article-title":"Gids: Gan based intrusion detection system for in-vehicle network"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0155781"},{"issue":"4","key":"9","doi-asserted-by":"crossref","first-page":"1037","DOI":"10.1109\/TIFS.2018.2869351","article-title":"Efficient intrusion detection with bloom filtering in controller area networks","volume":"14","author":"B. Groza","year":"2018","journal-title":"IEEE Transactions on Information Forensics and Security"},{"first-page":"911","article-title":"Fingerprinting electronic control units for vehicle intrusion detection","author":"K.-T. Cho","key":"10"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/lsp.2014.2304139"},{"first-page":"1109","article-title":"Viden: attacker identification on in-vehicle networks","author":"K.-T. Cho","key":"12"},{"first-page":"32","article-title":"Cloaking the clock: emulating clock skew in controller area networks","author":"S. U. Sagong","key":"13"},{"key":"14","article-title":"On the fingerprinting of electronic control units using physical characteristics in controller area networks","volume":"2017","author":"M. Kneib","year":"2017","journal-title":"Informatik"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2018.2812149"},{"first-page":"787","article-title":"Scission: signal characteristic-based sender identification and intrusion detection in automotive networks","author":"M. Kneib","key":"16"},{"first-page":"1","article-title":"Exploiting temperature-varied ecu fingerprints for source identification in in-vehicle network intrusion detection","author":"M. Tian","key":"17"},{"article-title":"Securing vehicles against cyber attacks","author":"U. E. Larson","key":"18","doi-asserted-by":"crossref","DOI":"10.1145\/1413140.1413174"},{"first-page":"63","article-title":"Intrusion detection system based on the analysis of time intervals of can messages for in-vehicle network","author":"H. M. Song","key":"19"},{"article-title":"Darpa hacked a chevy impala through its onstar system","year":"2015","author":"G. Brindusescu","key":"20"},{"author":"S. Checkoway","key":"21","article-title":"Comprehensive experimental analyses of automotive attack surfaces"},{"article-title":"Hacking the can Bus: Basic Manipulation of a Modern Automobile through CAN Bus Reverse Engineering","year":"2017","author":"R. Currie","key":"22"},{"article-title":"Tesla car doors can be hacked","year":"2014","author":"J. Pagliery","key":"23"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2018.2870826"},{"first-page":"176","article-title":"An intrusion detection method for securing in-vehicle can bus","author":"M. Gmiden","key":"25"},{"first-page":"235","article-title":"Security threats to automotive can networks\u2013practical examples and selected short-term countermeasures","author":"T. Hoppe","key":"26"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/tvt.2018.2810232"},{"first-page":"1044","article-title":"Error handling of in-vehicle networks makes them vulnerable","author":"K.-T. Cho","key":"28"},{"article-title":"Can specification version 2.0","year":"1991","author":"R. B. GmbH","key":"29"},{"issue":"6","key":"30","article-title":"Exploring controller area networks","volume":"40","author":"I. Foster","year":"2015","journal-title":"USENIX Association"},{"first-page":"11","article-title":"Security and privacy vulnerabilities of in-car wireless networks: a tire pressure monitoring system case study","author":"R. M. IshtiaqRoufa","key":"31"},{"key":"32","first-page":"91","article-title":"Remote exploitation of an unaltered passenger vehicle","volume":"2015","author":"C. Miller","year":"2015","journal-title":"Black Hat USA"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1145\/277858.277865"},{"key":"34","doi-asserted-by":"crossref","DOI":"10.4271\/2012-01-0606","article-title":"Analysis of critical speed yaw scuffs using spiral curves","volume":"1","author":"J. Daily","year":"2012","journal-title":"SAE Technical Papers"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.4271\/2012-01-0999"},{"first-page":"211","article-title":"An improved clock-skew measurement technique for revealing hidden services","author":"S. Zander","key":"36"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1145\/1391469.1391544"},{"key":"38"},{"key":"39"},{"key":"40"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8834845.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8834845.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8834845.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,30]],"date-time":"2020-10-30T18:50:27Z","timestamp":1604083827000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2020\/8834845\/"}},"subtitle":[],"editor":[{"given":"Bela","family":"Genge","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2020,10,30]]},"references-count":40,"alternative-id":["8834845","8834845"],"URL":"https:\/\/doi.org\/10.1155\/2020\/8834845","relation":{},"ISSN":["1939-0122","1939-0114"],"issn-type":[{"type":"electronic","value":"1939-0122"},{"type":"print","value":"1939-0114"}],"subject":[],"published":{"date-parts":[[2020,10,30]]}}}