Evaluation of CAN Bus Security Challenges
The automobile industry no longer relies on pure mechanical systems; instead, it benefits from many smart features based on advanced embedded electronics. Although the rise in electronics and connectivity has improved comfort, functionality, and safe driving, it has also created new attack surfaces...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2020-04-01
|
Series: | Sensors |
Subjects: | |
Online Access: | https://www.mdpi.com/1424-8220/20/8/2364 |
id |
doaj-8715bef2227d428c9335dadc1c12cf0f |
---|---|
record_format |
Article |
spelling |
doaj-8715bef2227d428c9335dadc1c12cf0f2020-11-25T03:10:24ZengMDPI AGSensors1424-82202020-04-01202364236410.3390/s20082364Evaluation of CAN Bus Security ChallengesMehmet Bozdal0Mohammad Samie1Sohaib Aslam2Ian Jennions3IVHM Centre, Cranfield University, Cranfield MK43 0AL, UKIVHM Centre, Cranfield University, Cranfield MK43 0AL, UKIVHM Centre, Cranfield University, Cranfield MK43 0AL, UKIVHM Centre, Cranfield University, Cranfield MK43 0AL, UKThe automobile industry no longer relies on pure mechanical systems; instead, it benefits from many smart features based on advanced embedded electronics. Although the rise in electronics and connectivity has improved comfort, functionality, and safe driving, it has also created new attack surfaces to penetrate the in-vehicle communication network, which was initially designed as a close loop system. For such applications, the Controller Area Network (CAN) is the most-widely used communication protocol, which still suffers from various security issues because of the lack of encryption and authentication. As a result, any malicious/hijacked node can cause catastrophic accidents and financial loss. This paper analyses the CAN bus comprehensively to provide an outlook on security concerns. It also presents the security vulnerabilities of the CAN and a state-of-the-art attack surface with cases of implemented attack scenarios and goes through different solutions that assist in attack prevention, mainly based on an intrusion detection system (IDS).https://www.mdpi.com/1424-8220/20/8/2364CAN networkCAN securityECUin-vehicle communication |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Mehmet Bozdal Mohammad Samie Sohaib Aslam Ian Jennions |
spellingShingle |
Mehmet Bozdal Mohammad Samie Sohaib Aslam Ian Jennions Evaluation of CAN Bus Security Challenges Sensors CAN network CAN security ECU in-vehicle communication |
author_facet |
Mehmet Bozdal Mohammad Samie Sohaib Aslam Ian Jennions |
author_sort |
Mehmet Bozdal |
title |
Evaluation of CAN Bus Security Challenges |
title_short |
Evaluation of CAN Bus Security Challenges |
title_full |
Evaluation of CAN Bus Security Challenges |
title_fullStr |
Evaluation of CAN Bus Security Challenges |
title_full_unstemmed |
Evaluation of CAN Bus Security Challenges |
title_sort |
evaluation of can bus security challenges |
publisher |
MDPI AG |
series |
Sensors |
issn |
1424-8220 |
publishDate |
2020-04-01 |
description |
The automobile industry no longer relies on pure mechanical systems; instead, it benefits from many smart features based on advanced embedded electronics. Although the rise in electronics and connectivity has improved comfort, functionality, and safe driving, it has also created new attack surfaces to penetrate the in-vehicle communication network, which was initially designed as a close loop system. For such applications, the Controller Area Network (CAN) is the most-widely used communication protocol, which still suffers from various security issues because of the lack of encryption and authentication. As a result, any malicious/hijacked node can cause catastrophic accidents and financial loss. This paper analyses the CAN bus comprehensively to provide an outlook on security concerns. It also presents the security vulnerabilities of the CAN and a state-of-the-art attack surface with cases of implemented attack scenarios and goes through different solutions that assist in attack prevention, mainly based on an intrusion detection system (IDS). |
topic |
CAN network CAN security ECU in-vehicle communication |
url |
https://www.mdpi.com/1424-8220/20/8/2364 |
work_keys_str_mv |
AT mehmetbozdal evaluationofcanbussecuritychallenges AT mohammadsamie evaluationofcanbussecuritychallenges AT sohaibaslam evaluationofcanbussecuritychallenges AT ianjennions evaluationofcanbussecuritychallenges |
_version_ |
1724658843831500800 |