CANAttack: Assessing Vulnerabilities within Controller Area Network
Author:
Oladimeji Damilola1, Rasheed Amar1, Varol Cihan1ORCID, Baza Mohamed2ORCID, Alshahrani Hani3ORCID, Baz Abdullah4ORCID
Affiliation:
1. Department of Computer Science, Sam Houston State University, Huntsville, TX 77340, USA 2. Department of Computer Science, College of Charleston, Charleston, SC 29424, USA 3. Department of Computer Science, College of Computer Science and Information Systems, Najran University, Najran 61441, Saudi Arabia 4. Department of Computer Engineering, College of Computer and Information Systems, Umm Al-Qura University, Makkah 21955, Saudi Arabia
Abstract
Current vehicles include electronic features that provide ease and convenience to drivers. These electronic features or nodes rely on in-vehicle communication protocols to ensure functionality. One of the most-widely adopted in-vehicle protocols on the market today is the Controller Area Network, popularly referred to as the CAN bus. The CAN bus is utilized in various modern, sophisticated vehicles. However, as the sophistication levels of vehicles continue to increase, we now see a high rise in attacks against them. These attacks range from simple to more-complex variants, which could have detrimental effects when carried out successfully. Therefore, there is a need to carry out an assessment of the security vulnerabilities that could be exploited within the CAN bus. In this research, we conducted a security vulnerability analysis on the CAN bus protocol by proposing an attack scenario on a CAN bus simulation that exploits the arbitration feature extensively. This feature determines which message is sent via the bus in the event that two or more nodes attempt to send a message at the same time. It achieves this by prioritizing messages with lower identifiers. Our analysis revealed that an attacker can spoof a message ID to gain high priority, continuously injecting messages with the spoofed ID. As a result, this prevents the transmission of legitimate messages, impacting the vehicle’s operations. We identified significant risks in the CAN protocol, including spoofing, injection, and Denial of Service. Furthermore, we examined the latency of the CAN-enabled system under attack, finding that the compromised node (the attacker’s device) consistently achieved the lowest latency due to message arbitration. This demonstrates the potential for an attacker to take control of the bus, injecting messages without contention, thereby disrupting the normal operations of the vehicle, which could potentially compromise safety.
Funder
Najran University Ministry of Education in Saudi Arabia
Subject
Electrical and Electronic Engineering,Biochemistry,Instrumentation,Atomic and Molecular Physics, and Optics,Analytical Chemistry
Reference45 articles.
1. Oladimeji, D., Amar, R., Narasimha, S., and Varol, C. (2023, January 8–11). A Testbed for a Controller Area Network Communication Protocol in Automobiles. Proceedings of the 2023 IEEE 20th Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA. 2. A novel intrusion detection model for the CAN bus packet of in-vehicle network based on attention mechanism and autoencoder;Wei;Digit. Commun. Netw.,2023 3. Rasheed, A., Baza, M., Badr, M., Alshahrani, H., and Choo, K. (2023). Efficient Crypto Engine for Authenticated Encryption, Data Traceability, and Replay Attack Detection Over CAN Bus Network. IEEE Trans. Netw. Sci. Eng., 1–17. 4. Amiri, W., Baza, M., Banawan, K., Mahmoud, M., Alasmary, W., and Akkaya, K. (2019, January 17–19). Privacy-Preserving Smart Parking System Using Blockchain and Private Information Retrieval. Proceedings of the 2019 International Conference On Smart Applications, Communications And Networking (SmartNets), Sharm El Sheikh, Egypt. 5. B-Ride: Ride Sharing With Privacy-Preservation, Trust and Fair Payment Atop Public Blockchain;Baza;IEEE Trans. Netw. Sci. Eng.,2021
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
|
|