Bogdan Groza

ORCID: 0000-0003-3078-3635
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Vehicular Ad Hoc Networks (VANETs)
  • Advanced Authentication Protocols Security
  • User Authentication and Security Systems
  • Cryptographic Implementations and Security
  • Security in Wireless Sensor Networks
  • Advanced Malware Detection Techniques
  • Cryptography and Data Security
  • Bluetooth and Wireless Communication Technologies
  • Autonomous Vehicle Technology and Safety
  • Real-Time Systems Scheduling
  • Security and Verification in Computing
  • Chaos-based Image/Signal Encryption
  • Advanced Steganography and Watermarking Techniques
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Smart Grid Security and Resilience
  • Digital Media Forensic Detection
  • Electrostatic Discharge in Electronics
  • Opportunistic and Delay-Tolerant Networks
  • Network Security and Intrusion Detection
  • Internet Traffic Analysis and Secure E-voting
  • Network Time Synchronization Technologies
  • Mobile Ad Hoc Networks
  • Cryptography and Residue Arithmetic
  • Music and Audio Processing
  • Wireless Body Area Networks

Polytechnic University of Timişoara
2016-2025

Institute e-Austria Timisoara
2011

The CAN (Controller Area Network) bus, i.e., the de facto standard for connecting ECUs inside cars, is increasingly becoming exposed to some of most sophisticated security threats. Due its broadcast nature and ID oriented communication, each node sightless in regards source received messages assuring identification an uneasy challenge. While recent research has focused on devising networks by use cryptography at protocol layer, such solutions are not always alternative due increased...

10.1109/lsp.2014.2304139 article EN IEEE Signal Processing Letters 2014-01-31

Controller Area Network is a bus commonly used by controllers inside vehicles and in various industrial control applications. In the past were assumed to operate secure perimeters, but today these environments are well connected outside world recent incidents showed them extremely vulnerable cyber-attacks. To withstand such threats, one can implement security application layer of CAN. Here we design, refine broadcast authentication protocol based on known paradigm using key-chains time...

10.1109/tii.2013.2239301 article EN IEEE Transactions on Industrial Informatics 2013-10-16

Due to its cost efficiency, the controller area network (CAN) is still most wide-spread in-vehicle bus, and numerous reported attacks demonstrate urgency in designing new security solutions for CAN. In this paper, we propose an intrusion detection mechanism that takes advantage of Bloom filtering test frame periodicity based on message identifiers parts data-field which facilitates potential replay or modification attacks. This proves be effective approach since traffic from buses cyclic...

10.1109/tifs.2018.2869351 article EN IEEE Transactions on Information Forensics and Security 2018-09-21

Vehicles cannot be secured while the in-vehicle network remains insecure. The growing number of attacks reported each year shows that buses are not isolated from outside world. By exploiting their lack security, adversaries can gain control over virtually any functionality inside car. We discuss most promising approaches for assuring security on controller area (CAN) bus after a decade and proposals. Most proposals based cryptographic mechanisms, but some exploit physical layer or even...

10.1109/mvt.2017.2736344 article EN IEEE Vehicular Technology Magazine 2018-01-26

We fingerprint 54 ECUs from 10 cars, one of them being a heavy-duty vehicle that is compliant to the SAE J1939 standard. These later specifications implemented in commercial vehicles offer concrete sender addresses every CAN frame, making physical characteristics easier link specific ECUs. This not case for traffic collected inside passenger cars where allocation bus identifiers non-uniform, without explicit and receiver addresses, ECU identification more challenging. While previous research...

10.1109/tifs.2022.3158055 article EN IEEE Transactions on Information Forensics and Security 2022-01-01

10.1109/tii.2025.3541719 article EN cc-by IEEE Transactions on Industrial Informatics 2025-01-01

Despite realistic concerns, security is still absent from vehicular buses such as the widely used Controller Area Network (CAN). We design an efficient protocol based on symmetric primitives, taking advantage of two innovative procedures: splitting keys between nodes and mixing authentication tags. This results in a higher level when compromised are minority, assumption for automotive networks. Experiments performed state-of-the-art Infineon TriCore controllers, contrasted with low-end...

10.1145/3056506 article EN ACM Transactions on Embedded Computing Systems 2017-04-06

In the recent years, countless security concerns related to automotive systems were revealed either by academic research or real life attacks. While current attention was largely focused on passenger cars, due their ubiquity, reported bus-related vulnerabilities are applicable all industry sectors where same bus technology is deployed, i.e., CAN bus. The SAE J1939 specification extends and standardizes use of commercial vehicles plays an even higher role. contrast empirical results that...

10.1109/tvt.2018.2795384 article EN IEEE Transactions on Vehicular Technology 2018-01-18

Fingerprinting mobile devices over a WiFi channel has both positive and negative security implications: on one hand it allows the establishment of physically secure identifications by exploiting unclonable characteristics, other jeopardizes privacy mediating remote identification without user awareness. We are able to distinguish between smartphones within minutes, whenever their clock drifts apart with around part-per-million, using innocuous ICMP timestamps. To achieve this, we compute...

10.1109/lcomm.2013.040913.130419 article EN IEEE Communications Letters 2013-06-01

Detecting and preventing intrusions on in-vehicle buses is a topic of great importance which may have an even greater significance in the context commercial vehicles that are liable for security demanding tasks they carry, passengers or goods not least. In this respect, SAE J1939 protocol, CAN based higher-layer protocol vehicles, requires special attention due to existence both specific procedures standard, e.g., address claims multi-frame transmissions, as well sharp specifications...

10.1109/tits.2022.3151712 article EN IEEE Transactions on Intelligent Transportation Systems 2022-02-28

The Controller Area Network (CAN), which is used for communication between in-vehicle devices, has been shown to be vulnerable spoofing attacks. Voltage-based detection (VBS-D) mechanisms are considered state-of-the-art solutions, complementing cryptography-based authentication whose security limited due the CAN protocol's message size. Unfortunately, VBS-D poisoning performed by a malicious device connected bus, specifically designed poison deployed mechanism as it adapts environmental...

10.1109/tifs.2023.3297444 article EN IEEE Transactions on Information Forensics and Security 2023-01-01

Accelerometers provide a good source of entropy for bootstrapping secure communication channel in autonomous and spontaneous interactions between mobile devices that share common context but were not previously associated. We propose two simple efficient key exchange protocols based on accelerometer data use only hash functions combined with heuristic search trees. Using heuristics such as the Euclidean distance proves to be beneficial it allows more effective recovery shared key. While...

10.1145/2428955.2428989 article EN 2012-01-01

The Controller Area Network (CAN) is still the most widely employed bus in automotive sector. Its lack of security mechanisms led to a high number attacks and consequently several countermeasures were proposed, i.e., authentication protocols or intrusion detection mechanisms. We discuss vulnerabilities CAN data link layer that can be triggered from application level with use an off shelf transceiver. Namely, due wired-AND design bus, dominant bits will always overwrite recessive ones,...

10.1145/3098954.3103174 article EN Proceedings of the 17th International Conference on Availability, Reliability and Security 2017-08-10

Air quality in urban environments has become a central issue of our present society as it affects the health and lives population all over world. The first step mitigating negative effects is proper measurement pollution level. This work presents portable air system, built from off-the-shelf devices, that designed to assure user privacy data authenticity. Data collected sensor modules can be hand carried or installed on vehicles, possibly leading vehicular network may cover larger area. main...

10.3390/s20020403 article EN cc-by Sensors 2020-01-10

Since the first reports on its lack of security, Controller Area Network (CAN) was in focus for numerous research works. A specific area has employed physical layer characteristics that can be used to uniquely identify network nodes. But there are common downsides existing approaches such as vulnerabilities front attacks involving node replacement or insertion inability locate intruder within network. In this work, we propose a new intrusion detection system CAN which is based monitoring...

10.1109/access.2020.2985326 article EN cc-by IEEE Access 2020-01-01

Camera sensor identification can have numerous forensics and authentication applications. In this work, we follow an methodology for smartphone camera sensors using properties of the Dark Signal Nonuniformity (DSNU) in collected images. This requires taking dark pictures, which users easily do by keeping phone against their palm, has already been proposed various works. From such extract low mid frequency AC coefficients from DCT (Discrete Cosine Transform) classify data with help machine...

10.3390/e24081158 article EN cc-by Entropy 2022-08-19

Most of the existing works on securing CAN bus are using limited data-field frames to embed a cryptographic payload. Only very few have suggested use identifier field since identifiers critical for arbitration procedure and changing them at random would interfere with message priorities. To preserve priority bus, in this work we an ordered CMAC buffer. In way, can authenticate check that sender is legitimate node while remains unaltered. Moreover, determine real-world scenarios achieved...

10.1109/tvt.2020.2990954 article EN IEEE Transactions on Vehicular Technology 2020-04-27

Security has become critical for in-vehicle networks as they carry safety-critical data from various components, e.g., sensors or actuators, and current research proposals were quick to react with cryptographic protocols designed buses, CAN (Controller Area Network). Obviously, the majority of existing are built on primitives that rely a secret shared key. However, how share such key is less obvious due numerous practical constraints. In this work, we explore in comparative manner several...

10.3390/s19224919 article EN cc-by Sensors 2019-11-12

The FlexRay protocol provides deterministic and fault-tolerant communication for automotive applications with stringent requirements regarding reliability real-time performance. But the lack of intrinsic security mechanisms makes vulnerable to spoofing DoS attacks while existing features are not sufficient assure reliable in presence adversaries. Since adding cryptography mandates secret shared keys, providing secure key establishment techniques is critical assuring intended objectives. In...

10.1109/tvt.2020.3002616 article EN IEEE Transactions on Vehicular Technology 2020-06-15

The security of vehicle communication buses and electronic control units has received much attention in the recent years. However, while essential for practical deployments, problem securely exchanging cryptographic keys between on CAN bus little so far. In this work, we evaluate group extensions a regular key exchange protocol, i.e., elliptic curve version Diffie-Hellman by using both standardized NIST as well faster, more recently proposed Four <inline-formula...

10.1109/tvt.2021.3098546 article EN IEEE Transactions on Vehicular Technology 2021-07-21

Many common protocols: TCP, IPSec, etc., are vulnerable to denial of service attacks, where adversaries maliciously consume significant resources honest principals, leading resource exhaustion. We propose a set cost-based rules that formalize DoS attacks by exhaustion and can automate their detection. Our classification separates excessive but legal protocol use (e.g., flooding) from illegal manipulation causes participants waste computation time without reaching the goals. also distinguish...

10.1145/1966913.1966955 article EN 2011-03-22

10.1007/s10623-013-9816-5 article EN Designs Codes and Cryptography 2013-04-04

We address the secure pairing of mobile devices based on accelerometer data under various transportation environments, e.g., train, tram, car, bike, walking, etc. As users commonly commute by several modes, extracting session keys from scenarios to private network user's or even public formed belonging distinct that share same location is crucial. The main goal our work establish amount entropy can be collected these environments in order determine concrete security bounds for each...

10.1109/access.2020.2964151 article EN cc-by IEEE Access 2020-01-01
Coming Soon ...