Evaluation of CAN Bus Security Challenges.

CAN network CAN security ECU in-vehicle communication

Journal

Sensors (Basel, Switzerland)
ISSN: 1424-8220
Titre abrégé: Sensors (Basel)
Pays: Switzerland
ID NLM: 101204366

Informations de publication

Date de publication:
21 Apr 2020
Historique:
received: 31 01 2020
revised: 14 04 2020
accepted: 19 04 2020
entrez: 25 4 2020
pubmed: 25 4 2020
medline: 25 4 2020
Statut: epublish

Résumé

The automobile industry no longer relies on pure mechanical systems; instead, it benefits from many smart features based on advanced embedded electronics. Although the rise in electronics and connectivity has improved comfort, functionality, and safe driving, it has also created new attack surfaces to penetrate the in-vehicle communication network, which was initially designed as a close loop system. For such applications, the Controller Area Network (CAN) is the most-widely used communication protocol, which still suffers from various security issues because of the lack of encryption and authentication. As a result, any malicious/hijacked node can cause catastrophic accidents and financial loss. This paper analyses the CAN bus comprehensively to provide an outlook on security concerns. It also presents the security vulnerabilities of the CAN and a state-of-the-art attack surface with cases of implemented attack scenarios and goes through different solutions that assist in attack prevention, mainly based on an intrusion detection system (IDS).

Identifiants

pubmed: 32326272
pii: s20082364
doi: 10.3390/s20082364
pmc: PMC7219335
pii:
doi:

Types de publication

Journal Article Review

Langues

eng

Sous-ensembles de citation

IM

Auteurs

Mehmet Bozdal (M)

IVHM Centre, Cranfield University, Cranfield MK43 0AL, UK.

Mohammad Samie (M)

IVHM Centre, Cranfield University, Cranfield MK43 0AL, UK.

Sohaib Aslam (S)

IVHM Centre, Cranfield University, Cranfield MK43 0AL, UK.

Ian Jennions (I)

IVHM Centre, Cranfield University, Cranfield MK43 0AL, UK.

Classifications MeSH