skip to main content
10.1145/3653081.3653086acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiotaaiConference Proceedingsconference-collections
research-article

In-Vehicle Network Attack Based on CAN and UDS: Demonstration and Analysis

Published:03 May 2024Publication History

ABSTRACT

With the development of smart internet-connected vehicles, in-vehicle networks are facing increasing security threats. Controller Area Network (CAN), as the most commonly used communication method in vehicles, has become the main target of malicious network attacks due to its lack of security. This paper focuses on three common attack methods: CAN message injection, replay and Dos attack, and designs five attack experiments based on these three methods. Due to the upgrading of vehicle electronic and electrical architectures, the traditional three CAN attack experiments cannot affect most new vehicles. This paper proposes an experimental method based on UDS (Unified Diagnostic Services) CAN message injection and DoS attack, which causes functional interference in new vehicles, and proposes protective measures to safeguard the security of in-vehicle CAN network based on the analysis of the experiments. Network security protection measures are proposed based on the experimental analysis.

References

  1. Woo S, Jo H J, Lee D H. A practical wireless attack on the connected car and security protocol for in-vehicle CAN [J]. IEEE Transactions on intelligent transportation systems, 2014, 16(2): 993-1006.Google ScholarGoogle Scholar
  2. Rathore R S, Hewage C, Kaiwartya O, In-vehicle communication cyber security: challenges and solutions [J]. Sensors, 2022, 22(17): 6679.Google ScholarGoogle ScholarCross RefCross Ref
  3. Liu J, Zhang S, Sun W, In-vehicle network attacks and countermeasures: Challenges and future directions [J]. IEEE Network, 2017, 31(5): 50-58.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Kim J H, Seo S H, Hai N T, Gateway framework for in-vehicle networks based on CAN, FlexRay, and Ethernet [J]. IEEE transactions on vehicular technology, 2014, 64(10): 4472-4486.Google ScholarGoogle Scholar
  5. Navale V M, Williams K, Lagospiris A, (R) evolution of E/E architectures [J]. SAE International Journal of Passenger Cars-Electronic and Electrical Systems, 2015, 8(2015-01-0196): 282-288.Google ScholarGoogle ScholarCross RefCross Ref
  6. Miller C, Valasek C. Remote exploitation of an unaltered passenger vehicle [J]. Black Hat USA, 2015, 2015(S 91): 1-91.Google ScholarGoogle Scholar
  7. Nie S, Liu L, Du Y. Free-fall: Hacking tesla from wireless to can bus [J]. Briefing, Black Hat USA, 2017, 25(1): 16.Google ScholarGoogle Scholar
  8. Tencent Keen Security Lab. Experimental security research of Tesla autopilot [J]. Tencent Keen Security Lab, 2019.Google ScholarGoogle Scholar
  9. Bandur V, Pantelic V, Tomashevskiy T, A Safety Architecture for Centralized E/E Architectures [C]//2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W). IEEE, 2021: 67-70.Google ScholarGoogle Scholar
  10. Plappert C, Fenzl F, Rieke R, SECPAT: security patterns for resilient automotive E/E architectures [C]//2022 30th Euromicro international conference on parallel, distributed and network-based processing (PDP). IEEE, 2022: 255-264.Google ScholarGoogle Scholar
  11. Song H M, Woo J, Kim H K. In-vehicle network intrusion detection using deep convolutional neural network [J]. Vehicular Communications, 2020, 21: 100198.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Park J S, Heurtefeux K, Eom S, Routing Methods Considering Security and Real-Time of Vehicle Gateway System [J]. SAE Tech. Pap, 2020, 1: 1294.Google ScholarGoogle Scholar

Index Terms

  1. In-Vehicle Network Attack Based on CAN and UDS: Demonstration and Analysis

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      IoTAAI '23: Proceedings of the 2023 5th International Conference on Internet of Things, Automation and Artificial Intelligence
      November 2023
      902 pages
      ISBN:9798400716485
      DOI:10.1145/3653081

      Copyright © 2023 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 3 May 2024

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited
    • Article Metrics

      • Downloads (Last 12 months)1
      • Downloads (Last 6 weeks)1

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format