Abstract
More and more ECUs have been installed in the vehicle along with the electrification and intellectualization, so it is crucial to investigate on the information safety of CAN bus. According to the public cases regarding the CAN bus, how to find the defects of network of vehicle efficiently is vital to prevent intrusion illegal and privacy leakage. In this study, the mechanism of CAN bus can be reviewed, and types of information invading of CAN bus are analyzed particularly. Then some measures to strengthen the safety of bus have been list. Considering the tremendous difficulty to eliminate intrusion, combined means should be adopted to cope with the rigorous challenges. In the future, the bus of vehicle can be reconstructed based on the characteristics from distribution to controller, and it is expected to be explored deeply in accordance with new framework of CAN bus.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Wen, X., Zhu, C.: The configuration of bit rate on the CAN bus. J. Mach. Build. Autom. 35(2), 113–114 (2006)
Zhuang, H.: The car body network design based on CAN/LIN bus. Hebei University of Technology, Tianjin (2014)
Wu, Z.: Design and optimization of automotive electronic and electrical architecture. J. Electron. Technol. Softw. Eng. 14, 252–253 (2017)
Qin, C.: Design and Implementation of the On-board Ethernet AVB Node. Jilin University, Jilin (2015)
Wu, X., Tang, M., Lu, Y.: Framework of AUV Guidance system based on TTCAN and NCS. J. Northwest. Polytech. Univ. 23(6), 750–753 (2005)
Wang, J., Xu, B., Wang, Q.: Analysis and measurement of network delay in CAN control system. J. Control Instrum. Chem. Ind. 33(5), 29–32 (2006)
Wang, J., Xu, B.: Analysis and online evaluation of CAN message real-time performance. J. Control Design. 22(4), 448–452 (2007)
Gao, Y., Li, H., He, F., et al.: Optimization design of preemptive reconfiguration scheme in time-triggered Ethernet. J. Electron. Optics Control. 27(10), 88–93 (2010)
Wang, C.: Research on performance optimization and evaluation technology of time-triggered Ethernet for DIMA application. XIDIAN University, Xian (2019)
Liu, M.: Research on scheduling optimization mechanism and algorithm of multi-hop time-triggered Ethernet. Dalian University of Technology, Dalian (2019)
Shi, Z., Zhang, H., Wang, X.: Real-time Ethernet clock synchronization optimization algorithm based on improved Kalman filter. J. Zhejiang Sci-Tech Univ. 41(5), 650–656 (2019)
Schweppe, H., Roudier, Y.: Security and privacy for in-vehicle networks. In: IEEE International Workshop on Vehicular Communications. IEEE Press (2012)
Woo, S., Jo, H.J., Dong, H.L.: A practical wireless attack on the connected car and security protocol for in-vehicle CAN. IEEE Trans. Intell. Transp. Syst. 16(2), 1–14 (2014)
Kang, M.J., Kang, J.W.: A novel intrusion detection method using deep neural network for in-vehicle network security. In: IEEE 83rd Vehicular Technology Conference, pp. 1–5, Nanjing (2016)
Yu, H., Qin, G., Sun, M.: Cyber security and anomaly detection method for in-vehicle CAN. J. Jilin Univ. (Eng. Technol. Edn.) 46(4), 1246–1253 (2016)
Wu, Y., Li, F., Qin, Z.: Research on vehicle ECU communication encryption and identity authentication mechanism. J. Huaihua Univ. 36(5), 75–77 (2017)
Bayer, S., Enderle, T., Oka, D.K.: Security crash test-practical security evaluations of automotive onboard IT components. Automotive-Safety & security (2015)
Nishimura, R., Kurachi, R., Ito, K.: Implementation of the CAN-FD protocol in the fuzzing tool beSTORM. In: IEEE International Conference on Vehicle Electronics and Safety, pp.1–6. IEEE (2016)
Han, W.: The trusted model and application of internet vehicle bus. East China Normal University, Shanghai (2016)
Yang, H.: Research on CAN bus attack and defense detection technology based on intelligent network of car. Tianjin University of Technology, Tianjin (2017)
Craig, S.: Car Hacker’s Handbook. No starch Press, San Francisco (2016)
He, Y., Liu, X., Ma, H.: Research on mimic defense system of internet of vehicles. J. Inf. Secur. Res. 6(3), 244–251 (2020)
Song, H., Yang, L., Xu, H.: Overview of the intelligent connected vehicles cyber security. J. Inf. Secur. Commun. Priv. 7, 106–114 (2020)
Wang, J.: Research on information security issues in automobile intelligent networking system. J. Auto Time. 2, 193–194 (2021)
Lu, P., Zou, B., Li, J.: A methodology for cyber security quantitative assessment of intelligent connected vehicles based on CRITIC and entropy method. J. Cyberspace Secur. 11(10), 98–103 (2020)
Liao, M., Liu, X., Ma, H.: Research on information security protective system of intelligent and connected vehicles. J. Comput. Era. 10, 19–23 (2019)
Guo, Z., Pan, J., Han, G.: Security onboard communication for in-vehicle bus on CAN bus. J. China Auto. 7, 650+57 (2020)
Zou, B., Zhu, K., Wang, H.: Information safety tests and analysis of intelligent connected vehicles. J. Intell. Connected Veh. 6, 56–58 (2020)
Wang, Z.: Multi-strategy protection information safety for intelligent connected vehicles. J. Shanghai Inf. 12, 28–32 (2020)
Huang, T.: Research and implementation of vulnerability mining technology for in-vehicle network based on fuzzing. University of Electronic Science and Technology of China, Chengdu (2018)
Yang, J.: The technical characteristics and application trend of CAN bus. J. Farm Mach. 03, 72–73 (2011)
Li, Z., Tan, K., Guan, D.: In vehicle CAN bus-off attack and its intrusion detection algorithm. J. Comput. Appl. 40, 3224–3228 (2020)
Zhang, Y.: In the age of internet of vehicles, preventing hackers from turning cars into big killers, a hacker who shocked the automobile industry “holding.” J. Green Living. 10, 34–37 (2015)
Li, X., Zhong, C., Chen, Y.: Survey of internet of vehicle security. J. Cyber Secur. 4(3), 17–33 (2019)
Xie, H., Mo, X., Wang, C.: Research on invehicle CAN network intrusion detection based on machine learning. J. Tianjin Univ. Technol. 36(2), 32–37 (2020)
Luo, C.: Research and implementation of defense technology for in-vehicle network of connected vehicle. University of Electronic Science and Technology of China, Chengdu (2020)
Ji, Y., Jiao, Z., Liu, S.: CAN bus flood attack detection based on communication characteristics. J. Chin. J. Netw. Inf. Secur. 6(1), 27–37 (2020)
Hoppe, T., Stefan, K., Jana, D.: Security threats to automotive CAN networks—Practical examples and selected short-term countermeasures. J. Reliab. Eng. Syst. Safety 96(1), 11–25 (2011)
Taylor, A., Japkowicz, N., Leblanc, S.P.: Frequency-based anomaly detection for the automotive CAN bus. In: 2015 World Congress on Industrial Control Systems Security, pp. 4549 (2015)
Song, H.M., Kia, H.R., Kim, H.K.: Intrusion detection system based on the analysis of time intervals of CAN messages for in-vehicle network. In: 2016 International Conference on Information Networking, pp. 63–68 (2016)
Sun, Y., Wang, X., Liu, P.: Research on vehicle CAN bus authentication and encryption mechanism. J. Beijing Inf. Sci. Technol. Univ. 34(3), 73–78 (2019)
Xun, Y., Liu, J., Zhao, J.: Research on security threat of intelligent connected vehicle. J. Chin. J. Internet Things. 3(4), 72–81 (2019)
Chen, Y., Zhong, C., Li, X.: An adaptive security mechanism of CAN bus in vehicle. J. J. Inf. Secur. Res. 5(12), 1076–1088 (2019)
Acknowledgments
This paper was financially supported by the Open Fund for the State Key Laboratory of Vehicle NVH and Safety Technology (NVHSKL-202006).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Wang, H., Huang, G., Liang, X. (2022). Research on the Information Safety of CAN Bus for Vehicle. In: Li, X. (eds) Advances in Intelligent Automation and Soft Computing. IASC 2021. Lecture Notes on Data Engineering and Communications Technologies, vol 80. Springer, Cham. https://doi.org/10.1007/978-3-030-81007-8_118
Download citation
DOI: https://doi.org/10.1007/978-3-030-81007-8_118
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-81006-1
Online ISBN: 978-3-030-81007-8
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)