Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Item TypeItem Type
-
SubjectSubject
-
YearFrom:-To:
-
More FiltersMore FiltersSourceLanguage
Done
Filters
Reset
1,511
result(s) for
"Controller area network"
Sort by:
A driver’s car-following behavior prediction model based on multi-sensors data
2020
The prerequisite for the effective operation of vehicle collision warning system is that the necessary operation is not implemented. Therefore, the behavior prediction that the driver should perform when the preceding vehicle braking is the key to improve the effectiveness of the warning system. This study was conducted to acquire characteristics in the car-following behavior when confronted by the braking of the preceding vehicle, including the reaction time and operation behavior, and establish a behavior prediction model. A driving experiment on the expressway was conducted using devices, such as millimeter-wave radars and controller area network (CAN) bus data, to acquire 845 segments of car following when the brake lamps of the car ahead are on. Data analysis demonstrates that the mean of time distance of car following, mean of car-following distance, and time-to-collision (TTC) mean are closely related with whether or not the driver slowed the car down. The operation states of the driver were divided into keeping the unchanged state of the degree of accelerator pedal opening, loosening of accelerator pedal without braking, braking, and other special situations with the input variables of car-following distance, speed of driver’s car, relative speed, time distance, and TTC using the support vector machine (SVM) method to build a prediction model for the operation behavior of the driver. The verification result showed that the model predicts driving behavior with an accuracy rate of 80%. It reflects the actual decision-making process of the driver, especially the normal operation of the driver, to loosen the accelerator pedal without braking. This model can help to optimize the algorithm of the rear-end accident warning system and improve intelligent system acceptance.
Journal Article
Intrusion detection system for automotive Controller Area Network (CAN) bus system: a review
by
Abu-Bakar, Muhammad-Husaini
,
Siti-Farhana Lokman
,
Abu Talib Othman
in
Automobiles
,
Controller area network
,
Controllers
2019
The modern vehicles nowadays are managed by networked controllers. Most of the networks were designed with little concern about security which has recently motivated researchers to demonstrate various kinds of attacks against the system. In this paper, we discussed the vulnerabilities of the Controller Area Network (CAN) within in-vehicle communication protocol along with some potential attacks that could be exploited against it. Besides, we present some of the security solutions proposed in the current state of research in order to overcome the attacks. However, the main goal of this paper is to highlight a holistic approach known as intrusion detection system (IDS) which has been a significant tool in securing networks and information systems over the past decades. To the best of our knowledge, there is no recorded literature on a comprehensive overview of IDS implementation specifically in the CAN bus network system. Thus, we proposed an in-depth investigation of IDS found in the literature based on the following aspects: detection approaches, deployment strategies, attacking techniques, and finally technical challenges. In addition, we also categorized the anomaly-based IDS according to these methods, e.g., frequency-based, machine learning-based, statistical-based, and hybrid-based as part of our contributions. Correspondingly, this study will help to accelerate other researchers to pursue IDS research in the CAN bus system.
Journal Article
Model predictive control under timing constraints induced by controller area networks
2017
When multiple model predictive controllers are implemented on a shared controller area network (CAN), their performance may degrade due to the variable timing and delays among messages. The priority based real-time scheduling of messages on the CAN introduces complex timing of events, especially when the types and number of messages change at runtime. This paper introduces a novel hybrid timing model to make runtime predictions on the timing of the messages for a finite time window. Controllers can be designed using the optimization algorithms for model predictive control by considering the timing as optimization constraints. This timing model allows multiple controllers to share a CAN without significant degradation in the controller performance. The timing model also provides a convenient way to check the schedulability of messages on the CAN at runtime. Simulation results demonstrate that the timing model is accurate and computationally efficient to meet the needs of real-time implementation. Simulation results also demonstrate that model predictive controllers designed when considering the timing constraints have superior performance than the controllers designed without considering the timing constraints.
Journal Article
Controller Area Network (CAN) schedulability analysis: Refuted, revisited and revised
by
Lukkien, Johan J.
,
Burns, Alan
,
Davis, Robert I.
in
Automobile industry
,
Automotive engineering
,
Controller area network
2007
Controller Area Network (CAN) is used extensively in automotive applications, with in excess of 400 million CAN enabled microcontrollers manufactured each year. In 1994 schedulability analysis was developed for CAN, showing how worst-case response times of CAN messages could be calculated and hence guarantees provided that message response times would not exceed their deadlines. This seminal research has been cited in over 200 subsequent papers and transferred to industry in the form of commercial CAN schedulability analysis tools. These tools have been used by a large number of major automotive manufacturers in the design of in-vehicle networks for a wide range of cars, millions of which have been manufactured during the last decade.This paper shows that the original schedulability analysis given for CAN messages is flawed. It may provide guarantees for messages that will in fact miss their deadlines in the worst-case. This paper provides revised analysis resolving the problems with the original approach. Further, it highlights that the priority assignment policy, previously claimed to be optimal for CAN, is not in fact optimal and cites a method of obtaining an optimal priority ordering that is applicable to CAN. The paper discusses the possible impact on commercial CAN systems designed and developed using flawed schedulability analysis and makes recommendations for the revision of CAN schedulability analysis tools.
Journal Article
Security Issues with In-Vehicle Networks, and Enhanced Countermeasures Based on Blockchain
by
Shrestha, Rakesh
,
Nam, Seung Yeob
,
Khatri, Narayan
in
Accident prevention
,
Algorithms
,
Arbitration
2021
Modern vehicles are no longer simply mechanical devices. Connectivity between the vehicular network and the outside world has widened the security holes that hackers can use to exploit a vehicular network. Controller Area Network (CAN), FlexRay, and automotive Ethernet are popular protocols for in-vehicle networks (IVNs) and will stay in the industry for many more years. However, these protocols were not designed with security in mind. They have several vulnerabilities, such as lack of message authentication, lack of message encryption, and an ID-based arbitration mechanism for contention resolution. Adversaries can use these vulnerabilities to launch sophisticated attacks that may lead to loss of life and damage to property. Thus, the security of the vehicles should be handled carefully. In this paper, we investigate the security vulnerabilities with in-vehicle network protocols such as CAN, automotive Ethernet, and FlexRay. A comprehensive survey on security attacks launched against in-vehicle networks is presented along with countermeasures adopted by various researchers. Various algorithms have been proposed in the past for intrusion detection in IVNs. However, those approaches have several limitations that need special attention from the research community. Blockchain is a good approach to solving the existing security issues in IVNs, and we suggest a way to improve IVN security based on a hybrid blockchain.
Journal Article
Design of Unmanned Ship System with Two Engines and Two Propellers
by
Dai, Cheng
,
Fu, Tianshuang
,
Zhang, Yongliang
in
Algorithms
,
Autonomous navigation
,
bottom system
2022
Unmanned ship is a kind of surface robot with integrated technology, which is composed of multiple disciplines, including intelligent remote control, wireless communication, autonomous navigation and obstacle avoidance algorithm.When the unmanned ship is sailing in the water, it is difficult to control its dynamic performance due to the influence of sea conditions. Therefore, the research on the unmanned ship technology has extremely important practical value. In order to improve its maneuverability and control accuracy, an unmanned ship based on two engines and two propellers is proposed. This paper designs an unmanned ship bottom system with two engines and two propellers. The system is mainly composed of two main engines, including two generators and two rudders and propellers. Two of them adopt Controller Area Network communication protocol and are controlled by two Controller Area Network communication interfaces respectively; The two generators adopt RS485 serial port communication protocol and are controlled by two RS485 serial ports respectively; The two-rudder propeller equipment adopt RS485 serial port communication protocol and are controlled by the other two RS485 serial ports respectively.Through the experiment, it is found that the unmanned ship equipped with two engines and two propellers can better control the navigation accuracy of the ship and have high maneuverability.
Journal Article
Proposal for the Sixth Error Type for Cyberattack Detection and Defense in CAN Protocol
2026
Having long served as the backbone of automotive communication, the Controller Area Network utilizes error handling mechanisms under the ISO 11898 standard for communication reliability. However, these legacy error types do not explicitly distinguish between simple electrical noise and malicious intent. To address this structural limitation, we propose a sixth error type as a specialized protocol extension considering cybersecurity along with an error frame designed to notify other controllers and the driver of cybersecurity attacks. By defining a specific detection logic capable of identifying impersonation and replay attacks and introducing a specialized frame structure, this study enables the data link layer to take immediate defensive action without complex cryptographic overhead. Through FPGA based prototyping and Vector CANoe testing, we demonstrated that this mechanism successfully invalidates malicious attempts while preserving compatibility with the existing CAN error-handling mechanism. This research argues that cybersecurity can no longer be treated as an add-on but should be embedded within the protocol itself. Our findings provide a technical foundation for the next evolution of the ISO 11898 standard and toward security integrated CAN communication.
Journal Article
Meta-IDS: Meta-Learning Automotive Intrusion Detection Systems with Adaptive and Learnable
by
Huang, Dong-Hua
,
Li, Jin
,
Tao, Yao-Dong
in
Adaptive systems
,
Algorithms
,
Communications Engineering
2025
Intrusion Detection Systems (IDS) are considered essential security components for the Controller Area Network (CAN) in vehicular communications. However, existing methods struggle to adapt to varied attack scenarios and accurately detect low-volume attacks. In this paper, we introduce Meta-IDS, a novel IDS that employs meta-learning via the Meta-SGD algorithm to enhance adaptability across a diverse spectrum of cyber threats. Our method includes a bi-level optimization technique: the inner level optimizes detection accuracy for specific attack scenarios, while the outer level adjusts meta-parameters to ensure generalizability across different scenarios. To model low-volume attacks, we devise the Attack Prominence Score (APS), which identifies subtle attack patterns. Extensive experimental results show that the proposed method exhibits promising detection performance, with efficient tuning and rapid adaptation to different attack scenarios, especially low-volume attacks. Furthermore, Meta-IDS demonstrates competitive scalability in intelligent transportation systems, supporting larger network infrastructures and high throughput. Real-time vehicle-level evaluations also show that it is lightweight for vehicular networks.
Journal Article
Security strategy for autonomous vehicle cyber-physical systems using transfer learning
by
Alturki, Badraddin
,
Alsulami, Abdulaziz A
,
Al-Haija, Qasem Abu
in
Actuators
,
Autonomous vehicles
,
Cities
2023
Cyber-physical systems (CPSs) are emergent systems that enable effective real-time communication and collaboration (C&C) of physical components such as control systems, sensors, actuators, and the surrounding environment through a cyber communication infrastructure. As such, autonomous vehicles (AVs) are one of the fields that have significantly adopted the CPS approach to improving people's lives in smart cities by reducing energy consumption and air pollution. Therefore, autonomous vehicle-cyber physical systems (AV-CPSs) have attracted enormous investments from major corporations and are projected to be widely used. However, AV-CPS is vulnerable to cyber and physical threat vectors due to the deep integration of information technology (IT), including cloud computing, with the communication process. Cloud computing is critical in providing the scalable infrastructure required for real-time data processing, storage, and analysis in AV-CPS, allowing these systems to work seamlessly in smart cities. CPS components such as sensors and control systems through network infrastructure are particularly vulnerable to cyber-attacks targeted by attackers using the communication system. This paper proposes an intelligent intrusion detection system (IIDS) for AV-CPS using transfer learning to identify cyberattacks launched against connected physical components of AVs through a network infrastructure. First, AV-CPS was developed by implementing the controller area network (CAN) and integrating it into the AV simulation model. Second, the dataset was generated from the AV-CPS. The collected dataset was then preprocessed to be trained and tested via pre-trained CNNs. Third, eight pre-trained networks were implemented, namely, InceptionV3, ResNet-50, ShuffleNet, MobileNetV2, GoogLeNet, ResNet-18, SqueezeNet, and AlexNet. The performance of the implemented models was evaluated. According to the experimental evaluation results, GoogLeNet outperformed all other pre-rained networks, scoring an F1- score of 99.47%.
Journal Article
Reconfigurable CAN Intrusion Detection and Response System
2024
The controller area network (CAN) remains the de facto standard for intra-vehicular communication. CAN enables reliable communication between various microcontrollers and vehicle devices without a central computer, which is essential for sustainable transportation systems. However, it poses some serious security threats due to the nature of communication. According to caranddriver.com, there were at least 150 automotive cybersecurity incidents in 2019, a 94% year-over-year increase since 2016, according to a report from Upstream Security. To safeguard vehicles from such attacks, securing CAN communication, which is the most relied-on in-vehicle network (IVN), should be configured with modifications. In this paper, we developed a configurable CAN communication protocol to secure CAN with a hardware prototype for rapidly prototyping attacks, intrusion detection systems, and response systems. We used a field programmable gate array (FPGA) to prototype CAN to improve reconfigurability. This project focuses on attack detection and response in the case of bus-off attacks. This paper introduces two main modules: the multiple generic errors module with the introduction of the error state machine (MGEESM) module and the bus-off attack detection (BOAD) module for a frame size of 111 bits (BOAD111), based on the CAN protocol presenting the introduction of form error, CRC error, and bit error. Our results show that, in the scenario with the transmit error counter (TEC) value 127 for switching between the error-passive state and bus-off state, the detection times for form error, CRC error, and bit error introduced in the MGEESM module are 3.610 ms, 3.550 ms, and 3.280 ms, respectively, with the introduction of error in consecutive frames. The detection time for BOAD111 module in the same scenario is 3.247 ms.
Journal Article