Simulation of in-vehicle network CAN (in)security

In-vehicle network security is becoming one of the leading research fields in the cybersecurity area. Modern automobiles consist of Electronic Control Units (ECUs), microcontrollers that control the operations of a vehicle. These ECUs are mainly interconnected through an in-vehicle Controller Area...

Full description

Saved in:
Bibliographic Details
Main Authors: Rosdee, Nur Fadhilah Ajwa, Ali Azmi, Nur Nadiah, Mansor, Hafizah
Format: Article
Language:en
Published: IIUM Press 2022
Subjects:
Online Access:http://irep.iium.edu.my/99112/1/99112_Simulation%20of%20in-vehicle%20network%20CAN%20%28in%29security.pdf
http://irep.iium.edu.my/99112/
https://journals.iium.edu.my/kict/index.php/IJPCC/article/view/330
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:In-vehicle network security is becoming one of the leading research fields in the cybersecurity area. Modern automobiles consist of Electronic Control Units (ECUs), microcontrollers that control the operations of a vehicle. These ECUs are mainly interconnected through an in-vehicle Controller Area Network (CAN), a message-based protocol that allows communication between different ECUs. The vulnerabilities of CAN which have no encryptions, authentication and integrity checking attributes are widely known but continuous research is made on the security and exploitation of CAN. This is because, the safety and security of vehicles and passengers have become more concerning due to the increase of external and internal vehicle communications. Our paper aims to discuss related works of CAN bus vulnerabilities and security through literature review. This paper conducts simple cyberattacks against CAN bus by data collection, data analysis and attack experiment on the Instrument Cluster Simulator (ICSim) with the help of CAN network analysis tool, CANalyse. CAN packets were collected and analysed and the ID for a number of car functions in ICSim were determined. Attack experiments resulted in sniffing and replay attacks against CAN buses were valid. Finally, from these findings, the paper proposes recommended security measures of CAN bus which are network segmentation, cryptography-based method, and Intrusion Detection System (IDS).