2015
DOI: 10.14236/ewic/ics2015.15
|View full text |Cite
|
Sign up to set email alerts
|

A System to Recognize Intruders in Controller Area Network (CAN)

Abstract: The existing automotive Controller Area Network (CAN) is vulnerable. The absence of sender verification in its communication means that an attacker acting as a node on its network will be treated like a legitimate node that has always been present, allowing attackers to transmit and receive messages freely. This paper proposes a system that will allow nodes using CAN to identify legitimate messages and reject those that come from illegitimate nodes. In addition, the system provides resistance against replay at… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0
1

Year Published

2016
2016
2022
2022

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(12 citation statements)
references
References 2 publications
0
11
0
1
Order By: Relevance
“…CAN does not provide any message or device authentication in order to identify the sender of a particular message or to determine the identity of an ECU [2] - [5], [7], [8], [13] and [14]. This means that the CAN protocol is not capable of distinguishing between a legitimate ECU and a malicious one [7] and [14].…”
Section: A Lack Of Authenticationmentioning
confidence: 99%
See 2 more Smart Citations
“…CAN does not provide any message or device authentication in order to identify the sender of a particular message or to determine the identity of an ECU [2] - [5], [7], [8], [13] and [14]. This means that the CAN protocol is not capable of distinguishing between a legitimate ECU and a malicious one [7] and [14].…”
Section: A Lack Of Authenticationmentioning
confidence: 99%
“…This means that the CAN protocol is not capable of distinguishing between a legitimate ECU and a malicious one [7] and [14]. This security weakness makes replay attacks and transmission of spoofed messages possible since an unauthorized device can be easily connected to the CAN-Bus [2], [4], [5], [7], [13] and [14].…”
Section: A Lack Of Authenticationmentioning
confidence: 99%
See 1 more Smart Citation
“…E os demais pinos, cada montadora implementa para os protocolos de comunicação. No entanto, existe um problema de vulnerabilidade no protocolo CAN que pode dar acesso ao intruso no sistema de computador de bordo do veículo [6][7][8][9].…”
Section: Figura 1 -Alguns Sinais Indicadores De Mau Funcionamentounclassified
“…1) is used for prioritizing messages on the bus and avoids collisions by design. However, security issues were ignored during designing since people took it for granted that a vehicle would be a closed system [5], [6]. Unfortunately, messages are broadcast on the CAN bus, and external devices, such as onboard diagnostics readers, are able to access the CAN bus in modern vehicles.…”
Section: Introductionmentioning
confidence: 99%