1. Cyberattacks and Countermeasures for In-Vehicle Networks
- Author
-
Omer Rana, Emad Aliwa, Peter Burnap, and Charith Perera
- Subjects
FOS: Computer and information sciences ,050210 logistics & transportation ,Computer Science - Cryptography and Security ,General Computer Science ,business.industry ,Computer science ,05 social sciences ,Automotive industry ,020206 networking & telecommunications ,02 engineering and technology ,Attack surface ,Intrusion detection system ,Encryption ,Theoretical Computer Science ,FlexRay ,CAN bus ,Local Interconnect Network ,0502 economics and business ,0202 electrical engineering, electronic engineering, information engineering ,business ,Communications protocol ,Cryptography and Security (cs.CR) ,Computer network - Abstract
As connectivity between and within vehicles increases, so does concern about safety and security. Various automotive serial protocols are used inside vehicles such as Controller Area Network (CAN), Local Interconnect Network (LIN) and FlexRay. CAN bus is the most used in-vehicle network protocol to support exchange of vehicle parameters between Electronic Control Units (ECUs). This protocol lacks security mechanisms by design and is therefore vulnerable to various attacks. Furthermore, connectivity of vehicles has made the CAN bus not only vulnerable from within the vehicle but also from outside. With the rise of connected cars, more entry points and interfaces have been introduced on board vehicles, thereby also leading to a wider potential attack surface. Existing security mechanisms focus on the use of encryption, authentication and vehicle Intrusion Detection Systems (IDS), which operate under various constrains such as low bandwidth, small frame size (e.g. in the CAN protocol), limited availability of computational resources and real-time sensitivity. We survey In-Vehicle Network (IVN) attacks which have been grouped under: direct interfaces-initiated attacks, telematics and infotainment-initiated attacks, and sensor-initiated attacks. We survey and classify current cryptographic and IDS approaches and compare these approaches based on criteria such as real time constrains, types of hardware used, changes in CAN bus behaviour, types of attack mitigation and software/ hardware used to validate these approaches. We conclude with potential mitigation strategies and research challenges for the future.
- Published
- 2021