Skip to main content

A Simulation System for Analyzing Attack Methods in Controller Area Network Using Fuzzing Methods

  • Conference paper
  • First Online:
Book cover Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2021)

Abstract

The automotive Electronic Control Units (ECUs) are connected by wired link to various sensor and actuator devices to compose an in-vehicle network. The problems of attacks against the in-vehicle networks are becoming more serious. In this paper, we present a simulation-based attacking system for the virtual Controller Area Network (CAN) network. We analyze three fuzzing methods to spoof the speed of speedometer by attackers. From this evaluation results, we found that our simulation system is useful for vehicle speed spoofing and in-vehicle diagnostics.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Specifications according ISO 21806-1 Road vehicles–MOST– Part 1: General information and definitions. https://www.mostcooperation.com/specifications/

  2. An, Y., Park, J., Oh, I., Kim, M., Yim, K.: Design and implementation of a novel testbed for automotive security analysis. In: Barolli, L., Poniszewska-Maranda, A., Park, H. (eds.) Innovative Mobile and Internet Services in Ubiquitous Computing. IMIS 2020, Advances in Intelligent Systems and Computing, vol. 1195, pp. 234–243. Springer, Cham (2020)

    Google Scholar 

  3. Asprilla, A.M., Martinez, W.H., Munoz, L.E., Cortes, C.A.: Design of an embedded hardware for motor control of a high performance electric vehicle. In: Proceedings of the IEEE Workshop on Power Electronics and Power Quality Applications (PEPQA-2017), pp. 1–5 (June 2017)

    Google Scholar 

  4. Castiglione, A., Palmieri, F., Colace, F., Lombardi, M., Santaniello, D., D’Aniello, G.: Securing the internet of vehicles through lightweight block ciphers. Pattern Recogn. Lett. 135, 264–270 (2020). https://www.sciencedirect.com/science/article/pii/S0167865520301689

  5. Cena, G., Cibrario Bertolotti, I., Hu, T., Valenzano, A.: On a software-defined CAN controller for embedded systems. Comput. Stand. Interfaces 63, 43–51 (2019). https://www.sciencedirect.com/science/article/pii/S0920548918302101

  6. Cho, K.T., Shin, K.G.: Error handling of in-vehicle networks makes them vulnerable. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS 2016, pp. 1044–1055. Association for Computing Machinery, New York (2016). https://doi.org/10.1145/2976749.2978302

  7. Cho, K.T., Shin, K.G.: Viden: attacker identification on in-vehicle networks. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, pp. 1109–1123. Association for Computing Machinery, New York (2017), https://doi.org/10.1145/3133956.3134001

  8. Ghallabi, F., Nashashibi, F., El-Haj-Shhade, G., Mittet, M.A.: LIDAR-based lane marking detection for vehicle positioning in an HD map. In: Proceedings of the 21st International Conference on Intelligent Transportation Systems (ITSC-2018), pp. 2209–2214 (November 2018)

    Google Scholar 

  9. Kidder, C.: SavvyCAN. https://github.com/collin80/SavvyCAN

  10. Lim, K., Tuladhar, K.M., Kim, H.: Detecting location spoofing using ADAS sensors in VANETs. In: Proceedings of the 16th IEEE Annual Consumer Communications Networking Conference (CCNC-2019), pp. 1–4 (2019)

    Google Scholar 

  11. Rabieh, K., Mahmoud, M.M.E.A., Guo, T.N., Younis, M.: Cross-layer scheme for detecting large-scale colluding sybil attack in VANETs. In: Proceedings of the IEEE International Conference on Communications (ICC-2015), pp. 7298–7303 (June 2015)

    Google Scholar 

  12. Smith, C.: ICSim. https://github.com/zombieCraig/ICSim

  13. Sojka, M., Pisa, P., Petera, M., Spinka, O., Hanzalek, Z.: A comparison of Linux CAN drivers and their applications. In: Proceedings of the International Symposium on Industrial Embedded System (SIES-2010), pp. 18–27 (July 2010)

    Google Scholar 

  14. Tan, M.T., Bailey, B., Lin, H.: Microchip AN2059: LIN basics and implementation of the MCC LIN stack library on 8-bit PIC microcontrollers. Technical report, Microchip Technology Inc. (2017). http://ww1.microchip.com/downloads/en/appnotes/00002059b.pdf

  15. Vaz, R.M., Hodel, K.N., Santos, M.M., Arruda, B.A., Netto, M.L., Justo, J.F.: An efficient formulation for optimization of FlexRay frame scheduling. Veh. Commun. 24, 100234 (2020)

    Google Scholar 

  16. Wang, T., Wei, T., Gu, G., Zou, W.: TaintScope: A checksum-aware directed fuzzing tool for automatic software vulnerability detection. In: Proceedings of the IEEE Symposium on Security and Privacy, vol. 2010, pp. 497–512 (May 2010)

    Google Scholar 

  17. Wehner, P., Schwiegelshohn, F., Gohringer, D., Hubner, M.: Development of driver assistance systems using virtual hardware-in-the-loop. In: Proceedings of the International Symposium on Integrated Circuits (ISIC-2014), pp. 380–383 (December 2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Makoto Ikeda .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Tsuneyoshi, M., Miwata, M., Nishii, D., Ikeda, M., Barolli, L. (2022). A Simulation System for Analyzing Attack Methods in Controller Area Network Using Fuzzing Methods. In: Barolli, L., Yim, K., Chen, HC. (eds) Innovative Mobile and Internet Services in Ubiquitous Computing. IMIS 2021. Lecture Notes in Networks and Systems, vol 279. Springer, Cham. https://doi.org/10.1007/978-3-030-79728-7_48

Download citation

Publish with us

Policies and ethics