scholarly journals Development of Automatic Verification Environment for In-Vehicle Controller Area Network

Author(s):  
Tain-Lieng Kao ◽  
San-Yuan Wang ◽  
Ming-Hua Wu

Due to the development of modern techniques, in the recent years, electronic vehicles and autopilot systems have beensignificant emerged in automobile and IT industrial. This leads the electronics automotive systems and auto-control systems consistedof a lot of high performance Electronic Control Units(ECUs) connected by controller area network (CAN). For realizing morecomplicated design in ECUs, this work integrates real-time OS and network management function. The results improve the CANbusnodes' designing level to as a gateway to interconnect CANbus nodes. As the number of CANbus nodes increase, the verification processis more and more complicated and takes much time. For speeding up the verification process, this work uses CANoe package toprogram the testing script for automotive verification environment. Then the engineer can connect the testing device by CAN to theenvironment for automatic verification. The engineer can define the network messages of the CANbus nodes and tune the design asthe validating progress. The testing results present as XML format and can be transferred to HTML pages for readability. Hence, thiswork realizes an automatic verification environment for CANbus in-vehicle networks.

Electronics ◽  
2021 ◽  
Vol 10 (19) ◽  
pp. 2442
Author(s):  
Cheongmin Ji ◽  
Taehyoung Ko ◽  
Manpyo Hong

In vehicles, dozens of electronic control units are connected to one or more controller area network (CAN) buses to exchange information and send commands related to the physical system of the vehicles. Furthermore, modern vehicles are connected to the Internet via telematics control units (TCUs). This leads to an attack vector in which attackers can control vehicles remotely once they gain access to in-vehicle networks (IVNs) and can discover the formats of important messages. Although the format information is kept secret by car manufacturers, CAN is vulnerable, since payloads are transmitted in plain text. In contrast, the secrecy of message formats inhibits IVN security research by third-party researchers. It also hinders effective security tests for in-vehicle networks as performed by evaluation authorities. To mitigate this problem, a method of reverse-engineering CAN payload formats is proposed. The method utilizes classification algorithms to predict signal boundaries from CAN payloads. Several features were uniquely chosen and devised to quantify the type-specific characteristics of signals. The method is evaluated on real-world and synthetic CAN traces, and the results show that our method can predict at least 10% more signal boundaries than the existing methods.


2013 ◽  
pp. 323-342
Author(s):  
Rodrigo Lange ◽  
Rômulo Silva de Oliveira

In recent years, the automotive industry has witnessed an exponential growth in the number of vehicular embedded applications, leading to the adoption of distributed implementations for systems in the powertrain and chassis domains. The Controller Area Network (CAN) protocol has been a de facto standard for intra-vehicular communications, while the FlexRay Communication System is being promoted as the future de facto standard for network interconnections of applications related to X-by-wire systems. Due to the characteristics of CAN and FlexRay, the coexistence of both protocols in the same vehicle is expected, leading to the use of gateways to manage the information exchange between electronic control units connected to different network segments. This chapter describes the main characteristics of CAN and FlexRay protocols, surveying the literature addressing schedulability and time analysis in both FlexRay and CAN protocols. The chapter also outlines the state-of-the-art in research about gateways for intra-vehicular communication networks.


Author(s):  
J-X Wang ◽  
J Feng ◽  
X-J Mao ◽  
L Yang ◽  
B Zhou

An interactive user-friendly calibration and monitoring system is critical for the development of electronic control units (ECU). In this study, a controller area network (CAN) driver, CAN calibration protocol (CCP) driver, monitoring program, and calibration program in the ECU were designed with the assembly language. The inquiry mode was used in monitoring the program and the interrupt mode was used in the calibration program, which ensured the real-time, simultaneous communication and interruption for the main control program. Mirror memory and the random access memory (RAM) calibration technique were used to reduce the write and read accesses to ECU, and, with the mapping of calibration RAM, calibration parameters could be changed online and used instantly. An efficient database management was used to achieve an accurate dynamic link between PC and ECU. The present system provides reliable, accurate, and quick CAN communication between ECU and PC, with a baud rate up to 500K bit/s. It also provides a friendly, compatible, and flexible calibration interface, and the functions of online calibration and real-time monitoring. This system has been used successfully in high-pressure, common rail, electronically controlled diesel engines and pure electrical vehicles (after a small modification).


2017 ◽  
Vol 2017 ◽  
pp. 1-13 ◽  
Author(s):  
Jeong-Woo Lee ◽  
Ki-Yong Choi ◽  
Jung-Won Lee

A hardware-in-the-loop (HiL) test is performed to verify the software functions mounted on automotive electronic control units (ECUs). However, the characteristics of HiL test limit the usage of common debugging techniques. Meanwhile, the logs of how the program uses memory can be utilized as debugging information collected by the controller area network (CAN). However, when the 32 KB memory is observed with 10 ms period, about 96% of the data on each cycle is lost, since the CAN only can transfer 1.25 KB of data at each cycle. Therefore, to overcome the above limitations, in this study, the memory is divided into multiple regions to transmit generated data via CAN. Next, the simulation is repeated for the each divided regions to obtain the different areas in each simulation. The collected data can be visualized as update information in each cycle and the cumulative number of updates. Through the proposed method, the ECU memory information during the HiL test was successfully collected using the CAN; the transmission is completed without any loss of data. In addition, the data was visualized in images containing the update information of the memory. These images contribute to shortening the debugging time for developers and testers.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Faten Fakhfakh ◽  
Mohamed Tounsi ◽  
Mohamed Mosbah

PurposeNowadays, connected vehicles are becoming quite complex systems which are made up of different devices. In such a vehicle, there are several electronic control units (ECUs) that represent basic units of computation. These ECUs communicate with each other over the Controller Area Network (CAN) bus protocol which ensures a high communication rate. Even though it is an efficient standard which provides communication for in-vehicle networks, it is prone to various cybersecurity attacks. This paper aims to present a systematic literature review (SLR) which focuses on potential attacks on CAN bus networks. Then, it surveys the solutions proposed to overcome these attacks. In addition, it investigates the validation strategies aiming to check their accuracy and correctness.Design/methodology/approachThe authors have adopted the SLR methodology to summarize existing research papers that focus on the potential attacks on CAN bus networks. In addition, they compare the selected papers by classifying them according to the adopted validation strategies. They identify also gaps in the existing literature and provide a set of open challenges that can significantly improve the existing works.FindingsThe study showed that most of the examined papers adopted the simulation as a validation strategy to imitate the system behavior and evaluate a set of performance criteria. Nevertheless, a little consideration has been given to the formal verification of the proposed systems.Originality/valueUnlike the existing surveys, this paper presents the first SLR that identifies local and remote security attacks that can compromise in-vehicle and inter-vehicle communications. Moreover, it compares the reviewed papers while focusing on the used validation strategies.


2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Zi-An Zhao ◽  
Yu Sun ◽  
Dawei Li ◽  
Jian Cui ◽  
Zhenyu Guan ◽  
...  

Intravehicular communication relies on controller area network (CAN) protocol to deliver messages and instructions among different electronic control units (ECU). Unfortunately, inherent defects in CAN include the absence of confidentiality and integrity mechanism, enabling adversaries to launch attacks from wired or wireless interfaces. Although various CAN cryptographic protocols have been proposed for entity authentication and secure communication, the redundancy in the key establishment phase weakens their availability in large-scale CAN. In this paper, we propose a scalable security protocol suite for intravehicular networks and reduce the communication costs significantly. A new type of attack, suspension attack, is identified for the existing protocols and mitigated in our protocol by leveraging a global counter scheme. We formally verify the security properties of the proposed protocol suite through the AVISPA tool. The simulation results indicate that the communication and computation efficiency are improved in our protocol.


Sign in / Sign up

Export Citation Format

Share Document