scholarly journals Cyberattacks and Countermeasures for In-Vehicle Networks

2021 ◽  
Vol 54 (1) ◽  
pp. 1-37 ◽  
Author(s):  
Emad Aliwa ◽  
Omer Rana ◽  
Charith Perera ◽  
Peter Burnap

As connectivity between and within vehicles increases, so does concern about safety and security. Various automotive serial protocols are used inside vehicles such as Controller Area Network (CAN), Local Interconnect Network (LIN), and FlexRay. CAN Bus is the most used in-vehicle network protocol to support exchange of vehicle parameters between Electronic Control Units (ECUs). This protocol lacks security mechanisms by design and is therefore vulnerable to various attacks. Furthermore, connectivity of vehicles has made the CAN Bus vulnerable not only from within the vehicle but also from outside. With the rise of connected cars, more entry points and interfaces have been introduced on board vehicles, thereby also leading to a wider potential attack surface. Existing security mechanisms focus on the use of encryption, authentication, and vehicle Intrusion Detection Systems (IDS), which operate under various constraints such as low bandwidth, small frame size (e.g., in the CAN protocol), limited availability of computational resources, and real-time sensitivity. We survey and classify current cryptographic and IDS approaches and compare these approaches based on criteria such as real-time constraints, types of hardware used, changes in CAN Bus behaviour, types of attack mitigation, and software/ hardware used to validate these approaches. We conclude with mitigation strategies limitations and research challenges for the future.

2013 ◽  
Vol 579-580 ◽  
pp. 792-797
Author(s):  
Yan Wang ◽  
Zhong Da Yu ◽  
Chen Xing Bao ◽  
Dong Xiang Shao

In this paper, we realize a real-time communication based on wireless local area network (WIFI) and controller area network (CAN) bus and develop a distributed control system for an automated guided vehicle (AGV). The system consists of two levels: (1) communication between AGVs and main computer based on WIFI, (2) communicationg between control units of AGV based on CAN bus. A real-time operating system μC/OS-II was used to control time, which significantly reduces the time for program and improves development efficiency. Finally, a small-size distributed AGV controller is developed as the main control unit of AGV and a distributed I/O system is developed based on it.


Sensors ◽  
2021 ◽  
Vol 21 (21) ◽  
pp. 7069
Author(s):  
Jia-Ning Luo ◽  
Chang-Ming Wu ◽  
Ming-Hour Yang

The design of the Controller Area Network (CAN bus) did not account for security issues and, consequently, attacks often use external mobile communication interfaces to conduct eavesdropping, replay, spoofing, and denial-of-service attacks on a CAN bus, posing a risk to driving safety. Numerous studies have proposed CAN bus safety improvement techniques that emphasize modifying the original CAN bus method of transmitting frames. These changes place additional computational burdens on electronic control units cause the CAN bus to lose the delay guarantee feature. Consequently, we proposed a method that solves these compatibility and security issues. Simple and efficient frame authentication algorithms were used to prevent spoofing and replay attacks. This method is compatible with both CAN bus and CAN-FD protocols and has a lower operand when compared with other methods.


Author(s):  
Yingji Liu ◽  
Kan Zhao ◽  
Chen Ding ◽  
Yu Yao

Real-time remote monitoring and fault diagnosis for commercial buses has important significance in reducing the occurrence of potential accidents. This paper presents a real-time remote monitoring system for the running state of commercial passenger buses. The vehicle Controller Area Network (CAN) bus is able to collect the information of key indicators being monitored, such as brake pressure, oil pressure and fault code. Then, the collected data are uploaded to the central remote monitoring platform through a General Packet Radio Service (GPRS) module for further analysis and decision-making. In this work, a classification based data acquisition method and a hybrid configuration data transmission method are proposed to improve the efficiency of data acquisition and transmission. The authors also proposed a Run-length based relative coding algorithm to compress the massive monitoring data. Experimental results shows the average data compression ratio is 32.17%, which effectively reduces the data transmission cost.


Author(s):  
J-X Wang ◽  
J Feng ◽  
X-J Mao ◽  
L Yang ◽  
B Zhou

An interactive user-friendly calibration and monitoring system is critical for the development of electronic control units (ECU). In this study, a controller area network (CAN) driver, CAN calibration protocol (CCP) driver, monitoring program, and calibration program in the ECU were designed with the assembly language. The inquiry mode was used in monitoring the program and the interrupt mode was used in the calibration program, which ensured the real-time, simultaneous communication and interruption for the main control program. Mirror memory and the random access memory (RAM) calibration technique were used to reduce the write and read accesses to ECU, and, with the mapping of calibration RAM, calibration parameters could be changed online and used instantly. An efficient database management was used to achieve an accurate dynamic link between PC and ECU. The present system provides reliable, accurate, and quick CAN communication between ECU and PC, with a baud rate up to 500K bit/s. It also provides a friendly, compatible, and flexible calibration interface, and the functions of online calibration and real-time monitoring. This system has been used successfully in high-pressure, common rail, electronically controlled diesel engines and pure electrical vehicles (after a small modification).


2012 ◽  
Vol 2012 ◽  
pp. 1-12 ◽  
Author(s):  
Lisheng Jin ◽  
Qingning Niu ◽  
Haijing Hou ◽  
Huacai Xian ◽  
Yali Wang ◽  
...  

Driver cognitive distraction is a hazard state, which can easily lead to traffic accidents. This study focuses on detecting the driver cognitive distraction state based on driving performance measures. Characteristic parameters could be directly extracted from Controller Area Network-(CAN-)Bus data, without depending on other sensors, which improves real-time and robustness performance. Three cognitive distraction states (no cognitive distraction, low cognitive distraction, and high cognitive distraction) were defined using different secondary tasks. NLModel, NHModel, LHModel, and NLHModel were developed using SVMs according to different states. The developed system shows promising results, which can correctly classify the driver’s states in approximately 74%. Although the sensitivity for these models is low, it is acceptable because in this situation the driver could control the car sufficiently. Thus, driving performance measures could be used alone to detect driver cognitive state.


Sensors ◽  
2020 ◽  
Vol 20 (8) ◽  
pp. 2364 ◽  
Author(s):  
Mehmet Bozdal ◽  
Mohammad Samie ◽  
Sohaib Aslam ◽  
Ian Jennions

The automobile industry no longer relies on pure mechanical systems; instead, it benefits from many smart features based on advanced embedded electronics. Although the rise in electronics and connectivity has improved comfort, functionality, and safe driving, it has also created new attack surfaces to penetrate the in-vehicle communication network, which was initially designed as a close loop system. For such applications, the Controller Area Network (CAN) is the most-widely used communication protocol, which still suffers from various security issues because of the lack of encryption and authentication. As a result, any malicious/hijacked node can cause catastrophic accidents and financial loss. This paper analyses the CAN bus comprehensively to provide an outlook on security concerns. It also presents the security vulnerabilities of the CAN and a state-of-the-art attack surface with cases of implemented attack scenarios and goes through different solutions that assist in attack prevention, mainly based on an intrusion detection system (IDS).


2021 ◽  
Author(s):  
Hannah M. Boland ◽  
Morgan I. Burgett ◽  
Aaron J. Etienne ◽  
Robert M. Stwalley III

A Controller Area Network (CAN) is a serial network information technology that facilitates the passing of information between Electronic Control Units (ECUs, also known as nodes). Developed by BOSCH in 1986 to circumvent challenges in harness-connected systems and provide improved message handling in automobiles, the CAN interface allows broadcast communication between all connected ECUs within a vehicle’s integrated electronic system through distributed control and decentralized measuring equipment. Since the early uses of CAN in car engine management, improvements in bitrate, bandwidth, and standardization protocols (such as ISO 11898 and SAE J1939) have led to CAN utilization in various industry applications, such as factory automation, aviation, off-highway vehicles, and telematics. Alternative wired and wireless technologies have been used to connect and network with CAN-BUS (such as Ethernet, Bluetooth, Wi-Fi, ZigBee, etc.), further expanding the diversity of applications in which the serial network is employed. In this chapter, the past, present, and prospective future developments of CAN technology, with focused attention on applications in the agricultural and off-road sectors are broadly examined. CAN technology fundamentals, standards creation, modern day uses, and potential functionalities and challenges specific to CAN in the wake of precision agriculture and smart farming are discussed in detail.


2020 ◽  
Vol 4 (2) ◽  
pp. 44
Author(s):  
Mohammad J. M. Zedan

The revolution in the automotive industry over time led to more and more electronics to be included in the vehicle and this increased the number and space allocated for cables. Therefore, the in-vehicle cabling network has been replaced with a two-wire bus serial communications protocol called Controller Area Network (CAN). The proposed paper describes the implementation of the CAN controller as a listener to monitor the state of the CAN bus in a real-time approach. The CAN listener obtains the data from the CAN bus by using an external signals converter. The work is realized using development platform called ZedBoard. The controller performs a sequence of processes on the received CAN frames including decoding, buffering and filtering. The processed data is stored in an implemented FIFO to keep the data from loss. After that, the data is sent serially to the processor system over the implemented SPI that connects the controller with the processor of the Zynq-7000 device. A single-threaded, simple operating system is run over the processor to provide a set of libraries and drivers that are utilized to access specific processor functions. It enables the execution of the C code that was written to configure the operation of the onboard display unit. The design procedure and simulation process for the implemented CAN listener is achieved using the Xilinx ISE WebPACK environment, while the final complete design is properly tested and verified by connecting the module to a CAN network consisting of six CAN nodes.


Smart Cities ◽  
2020 ◽  
Vol 3 (1) ◽  
pp. 17-30
Author(s):  
Yun Yang ◽  
Zongtao Duan ◽  
Mark Tehranipoor

An in-vehicle controller area network (CAN) bus is vulnerable because of increased sharing among modern autonomous vehicles and the weak protocol design principle. Spoofing attacks on a CAN bus can be difficult to detect and have the potential to enable devastating attacks. To effectively identify spoofing attacks, we propose the authentication of sender identities using a recurrent neural network with long short-term memory units (RNN-LSTM) based on the features of a fingerprint signal. We also present a way to generate the analog fingerprint signals of electronic control units (ECUs) to train the proposed RNN-LSTM classifier. The proposed RNN-LSTM model is accelerated on embedded Field-Programmable Gate Arrays (FPGA) to allow for real-time detection despite high computational complexity. A comparison of experimental results with the latest studies demonstrates the capability of the proposed RNN-LSTM model and its potential as a solution to in-vehicle CAN bus security.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Faten Fakhfakh ◽  
Mohamed Tounsi ◽  
Mohamed Mosbah

PurposeNowadays, connected vehicles are becoming quite complex systems which are made up of different devices. In such a vehicle, there are several electronic control units (ECUs) that represent basic units of computation. These ECUs communicate with each other over the Controller Area Network (CAN) bus protocol which ensures a high communication rate. Even though it is an efficient standard which provides communication for in-vehicle networks, it is prone to various cybersecurity attacks. This paper aims to present a systematic literature review (SLR) which focuses on potential attacks on CAN bus networks. Then, it surveys the solutions proposed to overcome these attacks. In addition, it investigates the validation strategies aiming to check their accuracy and correctness.Design/methodology/approachThe authors have adopted the SLR methodology to summarize existing research papers that focus on the potential attacks on CAN bus networks. In addition, they compare the selected papers by classifying them according to the adopted validation strategies. They identify also gaps in the existing literature and provide a set of open challenges that can significantly improve the existing works.FindingsThe study showed that most of the examined papers adopted the simulation as a validation strategy to imitate the system behavior and evaluate a set of performance criteria. Nevertheless, a little consideration has been given to the formal verification of the proposed systems.Originality/valueUnlike the existing surveys, this paper presents the first SLR that identifies local and remote security attacks that can compromise in-vehicle and inter-vehicle communications. Moreover, it compares the reviewed papers while focusing on the used validation strategies.


Sign in / Sign up

Export Citation Format

Share Document