Research Article
Advanced Temperature-Varied ECU Fingerprints for Source Identification and Intrusion Detection in Controller Area Networks
Figure 1
ECU X is wirelessly connected to the outside world and is compromised by an adversary, and the adversary masquerades ECU Y to send forged messages Msgy to the CAN bus. Consequently, ECU Z conducts the brake when it receives the forged message Msgy.