2023
DOI: 10.3390/s23198223
|View full text |Cite
|
Sign up to set email alerts
|

CANAttack: Assessing Vulnerabilities within Controller Area Network

Damilola Oladimeji,
Amar Rasheed,
Cihan Varol
et al.

Abstract: Current vehicles include electronic features that provide ease and convenience to drivers. These electronic features or nodes rely on in-vehicle communication protocols to ensure functionality. One of the most-widely adopted in-vehicle protocols on the market today is the Controller Area Network, popularly referred to as the CAN bus. The CAN bus is utilized in various modern, sophisticated vehicles. However, as the sophistication levels of vehicles continue to increase, we now see a high rise in attacks agains… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 37 publications
0
3
0
Order By: Relevance
“…Several works have been proposed to secure embedded systems [9][10][11]. Zareen et al [8] present an approach to embedded device security through the development of a Hardware Immune System (HWIS), leveraging Artificial Immune Systems for effective malware detection in IoT devices.…”
Section: Related Workmentioning
confidence: 99%
“…Several works have been proposed to secure embedded systems [9][10][11]. Zareen et al [8] present an approach to embedded device security through the development of a Hardware Immune System (HWIS), leveraging Artificial Immune Systems for effective malware detection in IoT devices.…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, this article focuses on the EIBsec protocol as its research subject. Using the CPN Tools [15] modeling tool combined with the Dolev-Yao attacker model, we analyze the message interaction process of the protocol, evaluate the security attributes of the protocol, identify potential security vulnerabilities [16], and ultimately put forth an improved plan. This plan aims to mitigate security risks and enhance the system's security attributes.…”
Section: Introductionmentioning
confidence: 99%
“…However, there is no optimal solution, and the problem is mitigated with network segmentation and intrusion detection systems. It is essential to establish a strong security system for automotive networks to maintain the advances in safe technologies and to advance the state of the art in automotive cybersecurity [119][120][121][122].…”
mentioning
confidence: 99%