Analysis of current attacks on the CAN bus and development of a new solution to detect these types of malicious threats
The majority of modern vehicles have electronic control units (ECUs) in charge of controlling their functions. These ECUs communicate with one another using the CAN (Controller Area Network) communication protocol. This practical bus offers great transfer of data quality by enabling wide propagation...
Gespeichert in:
Veröffentlicht in: | E3S web of conferences 2023-01, Vol.469, p.82 |
---|---|
Hauptverfasser: | , , , , , , , |
Format: | Artikel |
Sprache: | eng |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | The majority of modern vehicles have electronic control units (ECUs) in charge of controlling their functions. These ECUs communicate with one another using the CAN (Controller Area Network) communication protocol. This practical bus offers great transfer of data quality by enabling wide propagation that quickly reaches all sections of a vehicle. Unfortunately, this specific protocol places little focus on security, making the CAN bus control system susceptible. This is owing to its ease of physical or remote access and lack of confidentiality. This vulnerability makes it feasible to take control of the vehicle and endanger the safety of the passengers. The main objective of this work is to present the current existing vulnerabilities of the CAN Bus, to discuss a practical demonstration of hacking as well as to propose a technique to fight against these malicious actions, and all this by practical demonstrations on a DACIA Lodgy and Sandero 2014 vehicles. |
---|---|
ISSN: | 2267-1242 2267-1242 |
DOI: | 10.1051/e3sconf/202346900082 |