CAN Bus Abstract
Name
Institution
Date
Abstract
In today’s world majority of the vehicles are normally managed by the networked controllers, the design that was implemented in most of the networks were less concerned about the issues of security, and this has made those systems to be under great threat of attack from intruders. Controller area network is an asynchronous protocol that was developed to be extensively used in the automotive industry; its communication module is mostly used in the automotive application. The manufacturers should therefore take note of the standard vulnerabilities of Controller Area Network BUS that could end up impacting the automobile security.
Different researchers have noted that that for some attackers to take advantage of the flaw of the CAN, they would be required to gain physical access of the vehicle, and to those errant individuals who have managed to gain physical access of the vehicle might alter the network traffic flow and then run a DoS attack; so that they can interrupt the functions of the vehicle (Young et al., 2019). The attack severity usually depends on the ease in which an attacker can be able to access the input port, that is mostly through onboard diagnostic standards, i.e. ODB II. CAN is normally powerful in the transmission of all the non-critical and critical data systems to the Electronic Controller Units as well as other units. Most of the Unified Diagnostic Services normally don’t have a strong implementation of cryptography; therefore we are going to do an analysis of the CAN-BUS security concerns and some of the solutions that can be deployed to make sure that they don’t occur.
Reference
Young, C., Zambreno, J., Olufowobi, H., & Bloom, G. (2019). Survey of automotive controller area network intrusion detection systems. IEEE Design & Test, 36(6), 48-55.