Abstract
The functionality of most modern automobiles is controlled by electronic control units (ECUs) that interact with one another via the CAN communication protocol (controller area network), as defined by the ISO 11898 standard, which is one of the fundamental features of most modern cars. This physical bus provides excellent data transfer quality by providing wide propagation reaching all areas of a vehicle in a short amount of time. However, because of the absence of secrecy and ease of access (physical or remote), this protocol does not place a high value on security, which causes the CAN bus control system to be vulnerable. Due to this weakness, it is possible to control the car from the outside and place the vehicle's passengers in jeopardy. The objective of this paper is to describe the existing vulnerability of the security system against attacks, and also a demonstration of a hacking technique used to manage the dashboard of a 2014 DACIA Dokker automobile using the automotive network.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Pillai MA, Veerasingam S, Sai DY (2010) Implementation of sensor network for indoor air quality monitoring using CAN interface. In: IEEE international conference on advances in computer engineering. https://doi.org/10.1109/ACE.2010.85
Amarasinghe M et al (2015) Cloud-based driver monitoring and vehicle diagnostic with OBD2 telematics. In: 2015 Fifteenth international conference on advances in ICT for emerging regions (ICTer). IEEE. https://doi.org/10.1109/ICTER.2015.7377695
Karrouchi M, Nasri I, Snoussi H, Messaoudi A, Kassmi K (2021) Implementation of the vehicle speed and location monitoring system to minimize the risk of accident. In: International conference on digital technologies and applications. Springer, Cham, pp 1539–1548. https://doi.org/10.1007/978-3-030-73882-2_140
Karrouchi M, Nasri I, Snoussi H, Messaoudi A, Kassmi K (2021) Black box system for car/driver monitoring to decrease the reasons of road crashes. In: The 4th international symposium on advanced electrical and communication technologies. https://doi.org/10.1109/ISAECT53699.2021.9668545
Abbott-McCune S, Shay LA (2016) Intrusion prevention system of automotive network CAN bus. In: 2016 IEEE international Carnahan conference on security technology (ICCST). IEEE, pp 1–8. https://doi.org/10.1109/CCST.2016.7815711
Ashraf J, Bakhshi AD, Moustafa N, Khurshid H, Javed A, Beheshti A (2020) Novel deep learning-enabled lstm autoencoder architecture for discovering anomalous events from intelligent transportation systems. IEEE Trans Intell Transp Syst. https://doi.org/10.1109/TITS.2020.3017882
Avatefipour O, Al-Sumaiti AS, El-Sherbeeny AM, Awwad EM, Elmeligy MA, Mohamed MA, Malik H (2019) An intelligent secured framework for cyberattack detection in electric vehicles’ CAN bus using machine learning. IEEE Access 7:127580–127592. https://doi.org/10.1109/ACCESS.2019.2937576
Miller C (2019) Lessons learned from hacking a car. IEEE Des Test 36(6):7–9. https://doi.org/10.1109/MDAT.2018.2863106
Costantino G, Matteucci I (2019) CANDY CREAM hacking infotainment android systems to command instrument cluster via can data frame. In: 2019 IEEE international conference on computational science and engineering (CSE). https://doi.org/10.1109/CSE/EUC.2019.00094
Abbott-McCune S, Shay LA (2016) Techniques in hacking and simulating a modem automotive controller area network. In: 2016 IEEE international Carnahan conference on security technology (ICCST). IEEE. https://doi.org/10.1109/CCST.2016.7815712
Koscher K et al (2020) Experimental security analysis of a modern automobile. In: The ethics of information technologies. Routledge, pp 119–134. https://doi.org/10.1109/SP.2010.34
Zedan MJ (2020) Operating system realization for real-time visualization of CAN-Bus data streams using Xilinx ZyncSoC. J Electr Electron Inf 4(2). p-ISSN: 2549-8304 e-ISSN: 2622-0393
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Karrouchi, M., Messaoudi, A., Kassmi, K., Nasri, I., Atmane, I., Blaacha, J. (2023). Design and Demonstrate an Attack Strategy to Control a Vehicle’s Computer by Targeting Its Electrical Network. In: Bekkay, H., Mellit, A., Gagliano, A., Rabhi, A., Amine Koulali, M. (eds) Proceedings of the 3rd International Conference on Electronic Engineering and Renewable Energy Systems. ICEERE 2022. Lecture Notes in Electrical Engineering, vol 954. Springer, Singapore. https://doi.org/10.1007/978-981-19-6223-3_58
Download citation
DOI: https://doi.org/10.1007/978-981-19-6223-3_58
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-6222-6
Online ISBN: 978-981-19-6223-3
eBook Packages: EnergyEnergy (R0)