VULNERABILITIES OF CAN BUS & AUTOMOBILE SECURITY

Published 31 May 2019 •  vol 12  •  no 5  • 


Authors:

 

Sahid Irfan, Bits Pilani Dubai Campus, U.A.E
R Udayakumar, Bits Pilani Dubai Campus, U.A.E

Abstract:

 

In an automobile, CAN-bus is the centralized networking system on which Electronic Control Units(ECUs) or nodes broadcast messages or data. Automobile security threats have gone from hypothesis to reality. It is possible for a hacker to remotely control ECUs by means of freeware applications and devices. As a result, the modern automobile presents a broad attack surface and a multitude of potential vulnerabilities to exploit. Security of the CAN-bus can be improved by introducing a monitoring node into the network and using cryptographic techniques. This research highlights the elements of the CAN-bus network, cryptographic methods and suggestions for future development and safety of an automobile.

Keywords:

 

CAN-bus, Automobile, Automobile Security, Threat Model, Hack, Vulnerability, Connected system, secured network

References:

 

[1] Roderick Currie, Manuel Santander “Information Security Reading Room: Manuel Santander “Developments in Car Hacking”, (2015).
[2] Tarun Agarwal. “Controller Area Network”, (2015).
[3] Robert Buttigieg, Mario Farrugia, Clyde Meli. “Research Gate: Security Issues in Controller Area Network in Automobiles”, (2017).
[4] Chris Valasek and Charlie Miller. “IOActive: A Survey of Remote Automotive Attack Surfaces”, (2014).
[5] Pedro Umbelino, “Obd-Ii Dongle Attack: Stopping A MovingCar Via Bluetooth Retrieved”, (2018).
[6] SamyKamkar. “Anatomy of the RollJam Wireless Car Hack”, (2015).
[7] Peter Bright. “ARS Technica: Cars hacked through wireless tire sensors”, (2010).
[8] Charlie Osborne, “OwnStar: Unlock and track any GM OnStar connected car for $100”, (2015).
[9] Hiroshi Ueda and Ryo Kurachi, “SEI TECHNICAL: Security Authentication System for In-Vehicle Network”, (2015).
[10] Maxim. “Maxim Integrated: Requirements of Remote Keyless Entry (RKE) Systems”, (2015).
[11] Roderick Currie. “Information Security Reading Room: The Automotive Top 5: Applying the Critical Controls to the Modern Automobile”, (2016).
[12] Professor Alexander Wyglinski. “TPMS Receiver Hacking”, (2015).
[13] Hirofumi Onishi. “International Journal of Automotive Engineering: In. Approaches for Vehicle Cyber-Security in the US”, (2017) .

Citations:

 

APA:
Irfan, S., & Udayakumar, R. (2019). Vulnerabilities of Can Bus & Automobile Security. International Journal of Control and Automation (IJCA), ISSN: 2005-4297 (Print); 2207-6387 (Online), NADIA, 12(5), 13-24. doi: 10.33832/ijca.2019.12.5.02.

MLA:
Irfan, Sahid, et al. “Vulnerabilities of Can Bus & Automobile Security.” International Journal of Control and Automation, ISSN: 2005-4297 (Print); 2207-6387 (Online), NADIA, vol. 12, no. 5, 2019, pp. 13-24. IJCA, http://article.nadiapub.com/IJCA/vol12_no5/2.html.

IEEE:
[1] S. Irfan, and R. Udayakumar, "Vulnerabilities of Can Bus & Automobile Security." International Journal of Control and Automation (IJCA), ISSN: 2005-4297 (Print); 2207-6387 (Online), NADIA, vol. 12, no. 5, pp. 13-24, May 2019.