Skip to main content

Design and Demonstrate an Attack Strategy to Control a Vehicle’s Computer by Targeting Its Electrical Network

  • Conference paper
  • First Online:
Proceedings of the 3rd International Conference on Electronic Engineering and Renewable Energy Systems (ICEERE 2022)

Abstract

The functionality of most modern automobiles is controlled by electronic control units (ECUs) that interact with one another via the CAN communication protocol (controller area network), as defined by the ISO 11898 standard, which is one of the fundamental features of most modern cars. This physical bus provides excellent data transfer quality by providing wide propagation reaching all areas of a vehicle in a short amount of time. However, because of the absence of secrecy and ease of access (physical or remote), this protocol does not place a high value on security, which causes the CAN bus control system to be vulnerable. Due to this weakness, it is possible to control the car from the outside and place the vehicle's passengers in jeopardy. The objective of this paper is to describe the existing vulnerability of the security system against attacks, and also a demonstration of a hacking technique used to manage the dashboard of a 2014 DACIA Dokker automobile using the automotive network.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 299.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 379.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 379.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Pillai MA, Veerasingam S, Sai DY (2010) Implementation of sensor network for indoor air quality monitoring using CAN interface. In: IEEE international conference on advances in computer engineering. https://doi.org/10.1109/ACE.2010.85

  2. Amarasinghe M et al (2015) Cloud-based driver monitoring and vehicle diagnostic with OBD2 telematics. In: 2015 Fifteenth international conference on advances in ICT for emerging regions (ICTer). IEEE. https://doi.org/10.1109/ICTER.2015.7377695

  3. Karrouchi M, Nasri I, Snoussi H, Messaoudi A, Kassmi K (2021) Implementation of the vehicle speed and location monitoring system to minimize the risk of accident. In: International conference on digital technologies and applications. Springer, Cham, pp 1539–1548. https://doi.org/10.1007/978-3-030-73882-2_140

  4. Karrouchi M, Nasri I, Snoussi H, Messaoudi A, Kassmi K (2021) Black box system for car/driver monitoring to decrease the reasons of road crashes. In: The 4th international symposium on advanced electrical and communication technologies. https://doi.org/10.1109/ISAECT53699.2021.9668545

  5. Abbott-McCune S, Shay LA (2016) Intrusion prevention system of automotive network CAN bus. In: 2016 IEEE international Carnahan conference on security technology (ICCST). IEEE, pp 1–8. https://doi.org/10.1109/CCST.2016.7815711

  6. Ashraf J, Bakhshi AD, Moustafa N, Khurshid H, Javed A, Beheshti A (2020) Novel deep learning-enabled lstm autoencoder architecture for discovering anomalous events from intelligent transportation systems. IEEE Trans Intell Transp Syst. https://doi.org/10.1109/TITS.2020.3017882

    Article  Google Scholar 

  7. Avatefipour O, Al-Sumaiti AS, El-Sherbeeny AM, Awwad EM, Elmeligy MA, Mohamed MA, Malik H (2019) An intelligent secured framework for cyberattack detection in electric vehicles’ CAN bus using machine learning. IEEE Access 7:127580–127592. https://doi.org/10.1109/ACCESS.2019.2937576

    Article  Google Scholar 

  8. Miller C (2019) Lessons learned from hacking a car. IEEE Des Test 36(6):7–9. https://doi.org/10.1109/MDAT.2018.2863106

    Article  Google Scholar 

  9. Costantino G, Matteucci I (2019) CANDY CREAM hacking infotainment android systems to command instrument cluster via can data frame. In: 2019 IEEE international conference on computational science and engineering (CSE). https://doi.org/10.1109/CSE/EUC.2019.00094

  10. Abbott-McCune S, Shay LA (2016) Techniques in hacking and simulating a modem automotive controller area network. In: 2016 IEEE international Carnahan conference on security technology (ICCST). IEEE. https://doi.org/10.1109/CCST.2016.7815712

  11. Koscher K et al (2020) Experimental security analysis of a modern automobile. In: The ethics of information technologies. Routledge, pp 119–134. https://doi.org/10.1109/SP.2010.34

  12. Zedan MJ (2020) Operating system realization for real-time visualization of CAN-Bus data streams using Xilinx ZyncSoC. J Electr Electron Inf 4(2). p-ISSN: 2549-8304 e-ISSN: 2622-0393

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohammed Karrouchi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Karrouchi, M., Messaoudi, A., Kassmi, K., Nasri, I., Atmane, I., Blaacha, J. (2023). Design and Demonstrate an Attack Strategy to Control a Vehicle’s Computer by Targeting Its Electrical Network. In: Bekkay, H., Mellit, A., Gagliano, A., Rabhi, A., Amine Koulali, M. (eds) Proceedings of the 3rd International Conference on Electronic Engineering and Renewable Energy Systems. ICEERE 2022. Lecture Notes in Electrical Engineering, vol 954. Springer, Singapore. https://doi.org/10.1007/978-981-19-6223-3_58

Download citation

  • DOI: https://doi.org/10.1007/978-981-19-6223-3_58

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-19-6222-6

  • Online ISBN: 978-981-19-6223-3

  • eBook Packages: EnergyEnergy (R0)

Publish with us

Policies and ethics