Security Solutions for the Controller Area Network: Bringing Authentication to In-Vehicle Networks

2018 ◽  
Vol 13 (1) ◽  
pp. 40-47 ◽  
Author(s):  
Bogdan Groza ◽  
Pal-Stefan Murvay
Author(s):  
Tain-Lieng Kao ◽  
San-Yuan Wang ◽  
Ming-Hua Wu

Due to the development of modern techniques, in the recent years, electronic vehicles and autopilot systems have beensignificant emerged in automobile and IT industrial. This leads the electronics automotive systems and auto-control systems consistedof a lot of high performance Electronic Control Units(ECUs) connected by controller area network (CAN). For realizing morecomplicated design in ECUs, this work integrates real-time OS and network management function. The results improve the CANbusnodes' designing level to as a gateway to interconnect CANbus nodes. As the number of CANbus nodes increase, the verification processis more and more complicated and takes much time. For speeding up the verification process, this work uses CANoe package toprogram the testing script for automotive verification environment. Then the engineer can connect the testing device by CAN to theenvironment for automatic verification. The engineer can define the network messages of the CANbus nodes and tune the design asthe validating progress. The testing results present as XML format and can be transferred to HTML pages for readability. Hence, thiswork realizes an automatic verification environment for CANbus in-vehicle networks.


Electronics ◽  
2021 ◽  
Vol 10 (19) ◽  
pp. 2442
Author(s):  
Cheongmin Ji ◽  
Taehyoung Ko ◽  
Manpyo Hong

In vehicles, dozens of electronic control units are connected to one or more controller area network (CAN) buses to exchange information and send commands related to the physical system of the vehicles. Furthermore, modern vehicles are connected to the Internet via telematics control units (TCUs). This leads to an attack vector in which attackers can control vehicles remotely once they gain access to in-vehicle networks (IVNs) and can discover the formats of important messages. Although the format information is kept secret by car manufacturers, CAN is vulnerable, since payloads are transmitted in plain text. In contrast, the secrecy of message formats inhibits IVN security research by third-party researchers. It also hinders effective security tests for in-vehicle networks as performed by evaluation authorities. To mitigate this problem, a method of reverse-engineering CAN payload formats is proposed. The method utilizes classification algorithms to predict signal boundaries from CAN payloads. Several features were uniquely chosen and devised to quantify the type-specific characteristics of signals. The method is evaluated on real-world and synthetic CAN traces, and the results show that our method can predict at least 10% more signal boundaries than the existing methods.


Sign in / Sign up

Export Citation Format

Share Document