Next Article in Journal
Correction Algorithm for the Navigation System of an Autonomous Unmanned Underwater Vehicle
Previous Article in Journal
Deep CNN Sparse Coding for Real Time Inhaler Sounds Classification
Previous Article in Special Issue
Towards Dynamic Controller Placement in Software Defined Vehicular Networks
Open AccessReview

Evaluation of CAN Bus Security Challenges

IVHM Centre, Cranfield University, Cranfield MK43 0AL, UK
*
Author to whom correspondence should be addressed.
This paper is an extension version of the conference paper: Bozdal, M.; Samie, M.; Jennions, I. A Survey on CAN Bus Protocol: Attacks, Challenges, and Potential Solutions. In Proceedings of the 2018 International Conference on Computing, Electronics & Communications Engineering (iCCECE), Southend, UK, 16–17 August 2018.
Sensors 2020, 20(8), 2364; https://doi.org/10.3390/s20082364
Received: 31 January 2020 / Revised: 14 April 2020 / Accepted: 19 April 2020 / Published: 21 April 2020
(This article belongs to the Special Issue Vehicular Network Communications)
The automobile industry no longer relies on pure mechanical systems; instead, it benefits from many smart features based on advanced embedded electronics. Although the rise in electronics and connectivity has improved comfort, functionality, and safe driving, it has also created new attack surfaces to penetrate the in-vehicle communication network, which was initially designed as a close loop system. For such applications, the Controller Area Network (CAN) is the most-widely used communication protocol, which still suffers from various security issues because of the lack of encryption and authentication. As a result, any malicious/hijacked node can cause catastrophic accidents and financial loss. This paper analyses the CAN bus comprehensively to provide an outlook on security concerns. It also presents the security vulnerabilities of the CAN and a state-of-the-art attack surface with cases of implemented attack scenarios and goes through different solutions that assist in attack prevention, mainly based on an intrusion detection system (IDS). View Full-Text
Keywords: CAN network; CAN security; ECU; in-vehicle communication CAN network; CAN security; ECU; in-vehicle communication
Show Figures

Figure 1

MDPI and ACS Style

Bozdal, M.; Samie, M.; Aslam, S.; Jennions, I. Evaluation of CAN Bus Security Challenges. Sensors 2020, 20, 2364. https://doi.org/10.3390/s20082364

AMA Style

Bozdal M, Samie M, Aslam S, Jennions I. Evaluation of CAN Bus Security Challenges. Sensors. 2020; 20(8):2364. https://doi.org/10.3390/s20082364

Chicago/Turabian Style

Bozdal, Mehmet; Samie, Mohammad; Aslam, Sohaib; Jennions, Ian. 2020. "Evaluation of CAN Bus Security Challenges" Sensors 20, no. 8: 2364. https://doi.org/10.3390/s20082364

Find Other Styles
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Search more from Scilit
 
Search
Back to TopTop