- Vehicular Ad Hoc Networks (VANETs)
- Advanced Authentication Protocols Security
- User Authentication and Security Systems
- Cryptographic Implementations and Security
- Security in Wireless Sensor Networks
- Advanced Malware Detection Techniques
- Cryptography and Data Security
- Bluetooth and Wireless Communication Technologies
- Autonomous Vehicle Technology and Safety
- Real-Time Systems Scheduling
- Security and Verification in Computing
- Chaos-based Image/Signal Encryption
- Advanced Steganography and Watermarking Techniques
- Physical Unclonable Functions (PUFs) and Hardware Security
- Smart Grid Security and Resilience
- Digital Media Forensic Detection
- Electrostatic Discharge in Electronics
- Opportunistic and Delay-Tolerant Networks
- Network Security and Intrusion Detection
- Internet Traffic Analysis and Secure E-voting
- Network Time Synchronization Technologies
- Mobile Ad Hoc Networks
- Cryptography and Residue Arithmetic
- Music and Audio Processing
- Wireless Body Area Networks
Polytechnic University of Timişoara
2016-2025
Institute e-Austria Timisoara
2011
The CAN (Controller Area Network) bus, i.e., the de facto standard for connecting ECUs inside cars, is increasingly becoming exposed to some of most sophisticated security threats. Due its broadcast nature and ID oriented communication, each node sightless in regards source received messages assuring identification an uneasy challenge. While recent research has focused on devising networks by use cryptography at protocol layer, such solutions are not always alternative due increased...
Controller Area Network is a bus commonly used by controllers inside vehicles and in various industrial control applications. In the past were assumed to operate secure perimeters, but today these environments are well connected outside world recent incidents showed them extremely vulnerable cyber-attacks. To withstand such threats, one can implement security application layer of CAN. Here we design, refine broadcast authentication protocol based on known paradigm using key-chains time...
Due to its cost efficiency, the controller area network (CAN) is still most wide-spread in-vehicle bus, and numerous reported attacks demonstrate urgency in designing new security solutions for CAN. In this paper, we propose an intrusion detection mechanism that takes advantage of Bloom filtering test frame periodicity based on message identifiers parts data-field which facilitates potential replay or modification attacks. This proves be effective approach since traffic from buses cyclic...
Vehicles cannot be secured while the in-vehicle network remains insecure. The growing number of attacks reported each year shows that buses are not isolated from outside world. By exploiting their lack security, adversaries can gain control over virtually any functionality inside car. We discuss most promising approaches for assuring security on controller area (CAN) bus after a decade and proposals. Most proposals based cryptographic mechanisms, but some exploit physical layer or even...
We fingerprint 54 ECUs from 10 cars, one of them being a heavy-duty vehicle that is compliant to the SAE J1939 standard. These later specifications implemented in commercial vehicles offer concrete sender addresses every CAN frame, making physical characteristics easier link specific ECUs. This not case for traffic collected inside passenger cars where allocation bus identifiers non-uniform, without explicit and receiver addresses, ECU identification more challenging. While previous research...
Despite realistic concerns, security is still absent from vehicular buses such as the widely used Controller Area Network (CAN). We design an efficient protocol based on symmetric primitives, taking advantage of two innovative procedures: splitting keys between nodes and mixing authentication tags. This results in a higher level when compromised are minority, assumption for automotive networks. Experiments performed state-of-the-art Infineon TriCore controllers, contrasted with low-end...
In the recent years, countless security concerns related to automotive systems were revealed either by academic research or real life attacks. While current attention was largely focused on passenger cars, due their ubiquity, reported bus-related vulnerabilities are applicable all industry sectors where same bus technology is deployed, i.e., CAN bus. The SAE J1939 specification extends and standardizes use of commercial vehicles plays an even higher role. contrast empirical results that...
Fingerprinting mobile devices over a WiFi channel has both positive and negative security implications: on one hand it allows the establishment of physically secure identifications by exploiting unclonable characteristics, other jeopardizes privacy mediating remote identification without user awareness. We are able to distinguish between smartphones within minutes, whenever their clock drifts apart with around part-per-million, using innocuous ICMP timestamps. To achieve this, we compute...
Detecting and preventing intrusions on in-vehicle buses is a topic of great importance which may have an even greater significance in the context commercial vehicles that are liable for security demanding tasks they carry, passengers or goods not least. In this respect, SAE J1939 protocol, CAN based higher-layer protocol vehicles, requires special attention due to existence both specific procedures standard, e.g., address claims multi-frame transmissions, as well sharp specifications...
The Controller Area Network (CAN), which is used for communication between in-vehicle devices, has been shown to be vulnerable spoofing attacks. Voltage-based detection (VBS-D) mechanisms are considered state-of-the-art solutions, complementing cryptography-based authentication whose security limited due the CAN protocol's message size. Unfortunately, VBS-D poisoning performed by a malicious device connected bus, specifically designed poison deployed mechanism as it adapts environmental...
Accelerometers provide a good source of entropy for bootstrapping secure communication channel in autonomous and spontaneous interactions between mobile devices that share common context but were not previously associated. We propose two simple efficient key exchange protocols based on accelerometer data use only hash functions combined with heuristic search trees. Using heuristics such as the Euclidean distance proves to be beneficial it allows more effective recovery shared key. While...
The Controller Area Network (CAN) is still the most widely employed bus in automotive sector. Its lack of security mechanisms led to a high number attacks and consequently several countermeasures were proposed, i.e., authentication protocols or intrusion detection mechanisms. We discuss vulnerabilities CAN data link layer that can be triggered from application level with use an off shelf transceiver. Namely, due wired-AND design bus, dominant bits will always overwrite recessive ones,...
Air quality in urban environments has become a central issue of our present society as it affects the health and lives population all over world. The first step mitigating negative effects is proper measurement pollution level. This work presents portable air system, built from off-the-shelf devices, that designed to assure user privacy data authenticity. Data collected sensor modules can be hand carried or installed on vehicles, possibly leading vehicular network may cover larger area. main...
Since the first reports on its lack of security, Controller Area Network (CAN) was in focus for numerous research works. A specific area has employed physical layer characteristics that can be used to uniquely identify network nodes. But there are common downsides existing approaches such as vulnerabilities front attacks involving node replacement or insertion inability locate intruder within network. In this work, we propose a new intrusion detection system CAN which is based monitoring...
Camera sensor identification can have numerous forensics and authentication applications. In this work, we follow an methodology for smartphone camera sensors using properties of the Dark Signal Nonuniformity (DSNU) in collected images. This requires taking dark pictures, which users easily do by keeping phone against their palm, has already been proposed various works. From such extract low mid frequency AC coefficients from DCT (Discrete Cosine Transform) classify data with help machine...
Most of the existing works on securing CAN bus are using limited data-field frames to embed a cryptographic payload. Only very few have suggested use identifier field since identifiers critical for arbitration procedure and changing them at random would interfere with message priorities. To preserve priority bus, in this work we an ordered CMAC buffer. In way, can authenticate check that sender is legitimate node while remains unaltered. Moreover, determine real-world scenarios achieved...
Security has become critical for in-vehicle networks as they carry safety-critical data from various components, e.g., sensors or actuators, and current research proposals were quick to react with cryptographic protocols designed buses, CAN (Controller Area Network). Obviously, the majority of existing are built on primitives that rely a secret shared key. However, how share such key is less obvious due numerous practical constraints. In this work, we explore in comparative manner several...
The FlexRay protocol provides deterministic and fault-tolerant communication for automotive applications with stringent requirements regarding reliability real-time performance. But the lack of intrinsic security mechanisms makes vulnerable to spoofing DoS attacks while existing features are not sufficient assure reliable in presence adversaries. Since adding cryptography mandates secret shared keys, providing secure key establishment techniques is critical assuring intended objectives. In...
The security of vehicle communication buses and electronic control units has received much attention in the recent years. However, while essential for practical deployments, problem securely exchanging cryptographic keys between on CAN bus little so far. In this work, we evaluate group extensions a regular key exchange protocol, i.e., elliptic curve version Diffie-Hellman by using both standardized NIST as well faster, more recently proposed Four <inline-formula...
Many common protocols: TCP, IPSec, etc., are vulnerable to denial of service attacks, where adversaries maliciously consume significant resources honest principals, leading resource exhaustion. We propose a set cost-based rules that formalize DoS attacks by exhaustion and can automate their detection. Our classification separates excessive but legal protocol use (e.g., flooding) from illegal manipulation causes participants waste computation time without reaching the goals. also distinguish...
We address the secure pairing of mobile devices based on accelerometer data under various transportation environments, e.g., train, tram, car, bike, walking, etc. As users commonly commute by several modes, extracting session keys from scenarios to private network user's or even public formed belonging distinct that share same location is crucial. The main goal our work establish amount entropy can be collected these environments in order determine concrete security bounds for each...