Evaluation of CAN bus security challenges

Loading...
Thumbnail Image

Date published

Free to read from

Authors

Bozdal, Mehmet
Samie, Mohammad
Aslam, Sohaib
Jennions, Ian

Supervisor/s

Journal Title

Journal ISSN

Volume Title

Publisher

Department

Course name

ISSN

1424-8220

Format

Citation

Bozdal M, Samie M, Aslam S and Jennions I. (2020) Evaluation of CAN bus security challenges. Sensors, Volume 20, Issue 8, April 2020, Article number 2364

Abstract

The automobile industry no longer relies on pure mechanical systems; instead, it benefits from many smart features based on advanced embedded electronics. Although the rise in electronics and connectivity has improved comfort, functionality, and safe driving, it has also created new attack surfaces to penetrate the in-vehicle communication network, which was initially designed as a close loop system. For such applications, the Controller Area Network (CAN) is the most-widely used communication protocol, which still suffers from various security issues because of the lack of encryption and authentication. As a result, any malicious/hijacked node can cause catastrophic accidents and financial loss. This paper analyses the CAN bus comprehensively to provide an outlook on security concerns. It also presents the security vulnerabilities of the CAN and a state-of-the-art attack surface with cases of implemented attack scenarios and goes through different solutions that assist in attack prevention, mainly based on an intrusion detection system (IDS)

Description

Software Description

Software Language

Github

Keywords

In-vehicle communication, ECU, CAN security, CAN network

DOI

Rights

Attribution 4.0 International

Funder/s

Relationships

Relationships

Resources