Cargando…

CANAttack: Assessing Vulnerabilities within Controller Area Network

Current vehicles include electronic features that provide ease and convenience to drivers. These electronic features or nodes rely on in-vehicle communication protocols to ensure functionality. One of the most-widely adopted in-vehicle protocols on the market today is the Controller Area Network, po...

Descripción completa

Detalles Bibliográficos
Autores principales: Oladimeji, Damilola, Rasheed, Amar, Varol, Cihan, Baza, Mohamed, Alshahrani, Hani, Baz, Abdullah
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10575265/
https://www.ncbi.nlm.nih.gov/pubmed/37837053
http://dx.doi.org/10.3390/s23198223
_version_ 1785120884591165440
author Oladimeji, Damilola
Rasheed, Amar
Varol, Cihan
Baza, Mohamed
Alshahrani, Hani
Baz, Abdullah
author_facet Oladimeji, Damilola
Rasheed, Amar
Varol, Cihan
Baza, Mohamed
Alshahrani, Hani
Baz, Abdullah
author_sort Oladimeji, Damilola
collection PubMed
description Current vehicles include electronic features that provide ease and convenience to drivers. These electronic features or nodes rely on in-vehicle communication protocols to ensure functionality. One of the most-widely adopted in-vehicle protocols on the market today is the Controller Area Network, popularly referred to as the CAN bus. The CAN bus is utilized in various modern, sophisticated vehicles. However, as the sophistication levels of vehicles continue to increase, we now see a high rise in attacks against them. These attacks range from simple to more-complex variants, which could have detrimental effects when carried out successfully. Therefore, there is a need to carry out an assessment of the security vulnerabilities that could be exploited within the CAN bus. In this research, we conducted a security vulnerability analysis on the CAN bus protocol by proposing an attack scenario on a CAN bus simulation that exploits the arbitration feature extensively. This feature determines which message is sent via the bus in the event that two or more nodes attempt to send a message at the same time. It achieves this by prioritizing messages with lower identifiers. Our analysis revealed that an attacker can spoof a message ID to gain high priority, continuously injecting messages with the spoofed ID. As a result, this prevents the transmission of legitimate messages, impacting the vehicle’s operations. We identified significant risks in the CAN protocol, including spoofing, injection, and Denial of Service. Furthermore, we examined the latency of the CAN-enabled system under attack, finding that the compromised node (the attacker’s device) consistently achieved the lowest latency due to message arbitration. This demonstrates the potential for an attacker to take control of the bus, injecting messages without contention, thereby disrupting the normal operations of the vehicle, which could potentially compromise safety.
format Online
Article
Text
id pubmed-10575265
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-105752652023-10-14 CANAttack: Assessing Vulnerabilities within Controller Area Network Oladimeji, Damilola Rasheed, Amar Varol, Cihan Baza, Mohamed Alshahrani, Hani Baz, Abdullah Sensors (Basel) Article Current vehicles include electronic features that provide ease and convenience to drivers. These electronic features or nodes rely on in-vehicle communication protocols to ensure functionality. One of the most-widely adopted in-vehicle protocols on the market today is the Controller Area Network, popularly referred to as the CAN bus. The CAN bus is utilized in various modern, sophisticated vehicles. However, as the sophistication levels of vehicles continue to increase, we now see a high rise in attacks against them. These attacks range from simple to more-complex variants, which could have detrimental effects when carried out successfully. Therefore, there is a need to carry out an assessment of the security vulnerabilities that could be exploited within the CAN bus. In this research, we conducted a security vulnerability analysis on the CAN bus protocol by proposing an attack scenario on a CAN bus simulation that exploits the arbitration feature extensively. This feature determines which message is sent via the bus in the event that two or more nodes attempt to send a message at the same time. It achieves this by prioritizing messages with lower identifiers. Our analysis revealed that an attacker can spoof a message ID to gain high priority, continuously injecting messages with the spoofed ID. As a result, this prevents the transmission of legitimate messages, impacting the vehicle’s operations. We identified significant risks in the CAN protocol, including spoofing, injection, and Denial of Service. Furthermore, we examined the latency of the CAN-enabled system under attack, finding that the compromised node (the attacker’s device) consistently achieved the lowest latency due to message arbitration. This demonstrates the potential for an attacker to take control of the bus, injecting messages without contention, thereby disrupting the normal operations of the vehicle, which could potentially compromise safety. MDPI 2023-10-02 /pmc/articles/PMC10575265/ /pubmed/37837053 http://dx.doi.org/10.3390/s23198223 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Oladimeji, Damilola
Rasheed, Amar
Varol, Cihan
Baza, Mohamed
Alshahrani, Hani
Baz, Abdullah
CANAttack: Assessing Vulnerabilities within Controller Area Network
title CANAttack: Assessing Vulnerabilities within Controller Area Network
title_full CANAttack: Assessing Vulnerabilities within Controller Area Network
title_fullStr CANAttack: Assessing Vulnerabilities within Controller Area Network
title_full_unstemmed CANAttack: Assessing Vulnerabilities within Controller Area Network
title_short CANAttack: Assessing Vulnerabilities within Controller Area Network
title_sort canattack: assessing vulnerabilities within controller area network
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10575265/
https://www.ncbi.nlm.nih.gov/pubmed/37837053
http://dx.doi.org/10.3390/s23198223
work_keys_str_mv AT oladimejidamilola canattackassessingvulnerabilitieswithincontrollerareanetwork
AT rasheedamar canattackassessingvulnerabilitieswithincontrollerareanetwork
AT varolcihan canattackassessingvulnerabilitieswithincontrollerareanetwork
AT bazamohamed canattackassessingvulnerabilitieswithincontrollerareanetwork
AT alshahranihani canattackassessingvulnerabilitieswithincontrollerareanetwork
AT bazabdullah canattackassessingvulnerabilitieswithincontrollerareanetwork