Abstract

The majority of modern vehicles have electronic control units (ECUs) in charge of controlling their functions. These ECUs communicate with one another using the CAN (Controller Area Network) communication protocol. This practical bus offers great transfer of data quality by enabling wide propagation that quickly reaches all sections of a vehicle. Unfortunately, this specific protocol places little focus on security, making the CAN bus control system susceptible. This is owing to its ease of physical or remote access and lack of confidentiality. This vulnerability makes it feasible to take control of the vehicle and endanger the safety of the passengers. The main objective of this work is to present the current existing vulnerabilities of the CAN Bus, to discuss a practical demonstration of hacking as well as to propose a technique to fight against these malicious actions, and all this by practical demonstrations on a DACIA Lodgy and Sandero 2014 vehicles.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call