Evaluation of CAN Bus Security Challenges

被引:117
作者
Bozdal, Mehmet [1 ]
Samie, Mohammad [1 ]
Aslam, Sohaib [1 ]
Jennions, Ian [1 ]
机构
[1] Cranfield Univ, IVHM Ctr, Cranfield MK43 0AL, Beds, England
关键词
CAN network; CAN security; ECU; in-vehicle communication; INTRUSION DETECTION; COUNTERMEASURES;
D O I
10.3390/s20082364
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
The automobile industry no longer relies on pure mechanical systems; instead, it benefits from many smart features based on advanced embedded electronics. Although the rise in electronics and connectivity has improved comfort, functionality, and safe driving, it has also created new attack surfaces to penetrate the in-vehicle communication network, which was initially designed as a close loop system. For such applications, the Controller Area Network (CAN) is the most-widely used communication protocol, which still suffers from various security issues because of the lack of encryption and authentication. As a result, any malicious/hijacked node can cause catastrophic accidents and financial loss. This paper analyses the CAN bus comprehensively to provide an outlook on security concerns. It also presents the security vulnerabilities of the CAN and a state-of-the-art attack surface with cases of implemented attack scenarios and goes through different solutions that assist in attack prevention, mainly based on an intrusion detection system (IDS).
引用
收藏
页数:16
相关论文
共 78 条
[1]  
[Anonymous], 2017, ECU IS 3 LETT ANSW A
[2]  
[Anonymous], 2018, Experimental Security Assessment of BMW Cars: A Summary Report
[3]  
[Anonymous], 2015, HACKERS REMOTELY KIL
[4]  
[Anonymous], 2018, P 52 ANN C INFORM SC
[5]  
[Anonymous], 2012, GUIDE INTRUSION DETE
[6]  
[Anonymous], 2015, P 9 USENIX WORKSH OF
[7]  
[Anonymous], 2014, BIMMERBOOST
[8]  
[Anonymous], 2019, 21434 ISOSAE CD
[9]  
Beek C., 2017, DEFCON CONNECTED SAR
[10]  
Bosch R., 1991, CAN SPECIFICAITON VE