Practical Security Exploits of the FlexRay In-Vehicle Communication Protocol

被引:14
作者
Murvay, Pal-Stefan [1 ]
Groza, Bogdan [1 ]
机构
[1] Politehn Univ Timisoara, Dept Automat & Appl Informat, Timisoara, Romania
来源
RISKS AND SECURITY OF INTERNET AND SYSTEMS | 2019年 / 11391卷
关键词
Security; FlexRay; Attacks; DoS; Automotive;
D O I
10.1007/978-3-030-12143-3_15
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The ever increasing number of electronic control units inside a car demanded more complex buses with higher bandwidth capacities. But even the more recently designed in-vehicle network protocols, e.g., FlexRay, were engineered in thse absence of security concerns and thus they are highly vulnerable to adversarial interventions. In this work, we study the FlexRay protocol specification to identify features that can be used to mount various attacks. The attacks exploit both the physical layer and the data-link layer of the protocol to discard messages from the bus, i.e., DoS attacks, or to spoof messages by inserting adversarial frames and later discarding the genuine frames. We illustrate the feasibility of these attacks on an experimental setup composed of several FlexRay nodes implemented on automotive-grade controllers. While these attacks may not be a surprise, recognizing them may be relevant in preventing potential future exploits.
引用
收藏
页码:172 / 187
页数:16
相关论文
共 50 条
[41]   DDS middleware on top of FlexRay networks: Simulink blockset implementation of electrical vehicle using FlexRay protocol and its adaptation to DDS concept [J].
Abdellaoui, Zouhaira ;
Hasnaoui, Salem .
SOFT COMPUTING, 2019, 23 (22) :11539-11556
[42]   DDS middleware on top of FlexRay networks: Simulink blockset implementation of electrical vehicle using FlexRay protocol and its adaptation to DDS concept [J].
Zouhaira Abdellaoui ;
Salem Hasnaoui .
Soft Computing, 2019, 23 :11539-11556
[43]   Practical Sender Authentication Scheme for In-Vehicle CAN With Efficient Key Management [J].
Youn, Taek-Young ;
Lee, Yousik ;
Woo, Samuel .
IEEE ACCESS, 2020, 8 :86836-86849
[44]   Implementation and evaluation of lightweight in-vehicle security switch with hierarchical hash table [J].
Yano, Yuji ;
Iwamoto, Hisashi ;
Sasao, Tsutomu ;
Ata, Shingo .
IEICE COMMUNICATIONS EXPRESS, 2024, 13 (08) :347-350
[45]   Mitigation of Odometer Fraud for In-Vehicle Security Using the Discrete Hartley Transform [J].
Baldini, Gianmarco ;
Giuliani, Raimondo ;
Gemo, Monica .
2020 11TH IEEE ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2020, :479-485
[46]   Security and Privacy of Location-based Services for In-Vehicle Device Systems [J].
Missiroli, Marcello ;
Pierazzi, Fabio ;
Colajanni, Michele .
2014 INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING & SIMULATION (HPCS), 2014, :841-848
[47]   An Analysis Platform for the Information Security of In-Vehicle Networks Connected with External Networks [J].
Ezaki, Takaya ;
Date, Tomohiro ;
Inoue, Hiroyuki .
ADVANCES IN INFORMATION AND COMPUTER SECURITY (IWSEC 2015), 2015, 9241 :301-315
[48]   Real-Time Security Warning and ECU Identification for In-Vehicle Networks [J].
Wei, Hongqian ;
Ai, Qiang ;
Zhao, Wenqiang ;
Zhang, Youtong .
IEEE SENSORS JOURNAL, 2023, 23 (17) :20258-20266
[49]   Design of a CANFD to SOME/IP Gateway Considering Security for In-Vehicle Networks [J].
Zuo, Zheng ;
Yang, Shichun ;
Ma, Bin ;
Zou, Bosong ;
Cao, Yaoguang ;
Li, Qiangwei ;
Zhou, Sida ;
Li, Jichong .
SENSORS, 2021, 21 (23)
[50]   High Security Communication Protocol for SMS [J].
Wu, Songyang ;
Tan, Chengxiang .
MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS, 2009, :53-56