Cargando…
CANAttack: Assessing Vulnerabilities within Controller Area Network
Current vehicles include electronic features that provide ease and convenience to drivers. These electronic features or nodes rely on in-vehicle communication protocols to ensure functionality. One of the most-widely adopted in-vehicle protocols on the market today is the Controller Area Network, po...
Autores principales: | , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10575265/ https://www.ncbi.nlm.nih.gov/pubmed/37837053 http://dx.doi.org/10.3390/s23198223 |
_version_ | 1785120884591165440 |
---|---|
author | Oladimeji, Damilola Rasheed, Amar Varol, Cihan Baza, Mohamed Alshahrani, Hani Baz, Abdullah |
author_facet | Oladimeji, Damilola Rasheed, Amar Varol, Cihan Baza, Mohamed Alshahrani, Hani Baz, Abdullah |
author_sort | Oladimeji, Damilola |
collection | PubMed |
description | Current vehicles include electronic features that provide ease and convenience to drivers. These electronic features or nodes rely on in-vehicle communication protocols to ensure functionality. One of the most-widely adopted in-vehicle protocols on the market today is the Controller Area Network, popularly referred to as the CAN bus. The CAN bus is utilized in various modern, sophisticated vehicles. However, as the sophistication levels of vehicles continue to increase, we now see a high rise in attacks against them. These attacks range from simple to more-complex variants, which could have detrimental effects when carried out successfully. Therefore, there is a need to carry out an assessment of the security vulnerabilities that could be exploited within the CAN bus. In this research, we conducted a security vulnerability analysis on the CAN bus protocol by proposing an attack scenario on a CAN bus simulation that exploits the arbitration feature extensively. This feature determines which message is sent via the bus in the event that two or more nodes attempt to send a message at the same time. It achieves this by prioritizing messages with lower identifiers. Our analysis revealed that an attacker can spoof a message ID to gain high priority, continuously injecting messages with the spoofed ID. As a result, this prevents the transmission of legitimate messages, impacting the vehicle’s operations. We identified significant risks in the CAN protocol, including spoofing, injection, and Denial of Service. Furthermore, we examined the latency of the CAN-enabled system under attack, finding that the compromised node (the attacker’s device) consistently achieved the lowest latency due to message arbitration. This demonstrates the potential for an attacker to take control of the bus, injecting messages without contention, thereby disrupting the normal operations of the vehicle, which could potentially compromise safety. |
format | Online Article Text |
id | pubmed-10575265 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2023 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-105752652023-10-14 CANAttack: Assessing Vulnerabilities within Controller Area Network Oladimeji, Damilola Rasheed, Amar Varol, Cihan Baza, Mohamed Alshahrani, Hani Baz, Abdullah Sensors (Basel) Article Current vehicles include electronic features that provide ease and convenience to drivers. These electronic features or nodes rely on in-vehicle communication protocols to ensure functionality. One of the most-widely adopted in-vehicle protocols on the market today is the Controller Area Network, popularly referred to as the CAN bus. The CAN bus is utilized in various modern, sophisticated vehicles. However, as the sophistication levels of vehicles continue to increase, we now see a high rise in attacks against them. These attacks range from simple to more-complex variants, which could have detrimental effects when carried out successfully. Therefore, there is a need to carry out an assessment of the security vulnerabilities that could be exploited within the CAN bus. In this research, we conducted a security vulnerability analysis on the CAN bus protocol by proposing an attack scenario on a CAN bus simulation that exploits the arbitration feature extensively. This feature determines which message is sent via the bus in the event that two or more nodes attempt to send a message at the same time. It achieves this by prioritizing messages with lower identifiers. Our analysis revealed that an attacker can spoof a message ID to gain high priority, continuously injecting messages with the spoofed ID. As a result, this prevents the transmission of legitimate messages, impacting the vehicle’s operations. We identified significant risks in the CAN protocol, including spoofing, injection, and Denial of Service. Furthermore, we examined the latency of the CAN-enabled system under attack, finding that the compromised node (the attacker’s device) consistently achieved the lowest latency due to message arbitration. This demonstrates the potential for an attacker to take control of the bus, injecting messages without contention, thereby disrupting the normal operations of the vehicle, which could potentially compromise safety. MDPI 2023-10-02 /pmc/articles/PMC10575265/ /pubmed/37837053 http://dx.doi.org/10.3390/s23198223 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Oladimeji, Damilola Rasheed, Amar Varol, Cihan Baza, Mohamed Alshahrani, Hani Baz, Abdullah CANAttack: Assessing Vulnerabilities within Controller Area Network |
title | CANAttack: Assessing Vulnerabilities within Controller Area Network |
title_full | CANAttack: Assessing Vulnerabilities within Controller Area Network |
title_fullStr | CANAttack: Assessing Vulnerabilities within Controller Area Network |
title_full_unstemmed | CANAttack: Assessing Vulnerabilities within Controller Area Network |
title_short | CANAttack: Assessing Vulnerabilities within Controller Area Network |
title_sort | canattack: assessing vulnerabilities within controller area network |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10575265/ https://www.ncbi.nlm.nih.gov/pubmed/37837053 http://dx.doi.org/10.3390/s23198223 |
work_keys_str_mv | AT oladimejidamilola canattackassessingvulnerabilitieswithincontrollerareanetwork AT rasheedamar canattackassessingvulnerabilitieswithincontrollerareanetwork AT varolcihan canattackassessingvulnerabilitieswithincontrollerareanetwork AT bazamohamed canattackassessingvulnerabilitieswithincontrollerareanetwork AT alshahranihani canattackassessingvulnerabilitieswithincontrollerareanetwork AT bazabdullah canattackassessingvulnerabilitieswithincontrollerareanetwork |