Abstract
Current vehicle designs undergo real technological revolution in recent years, similar to the one which already happened in the aerospace industry in the seventies. Reason for those changes was replacement of electromechanical control systems with microprocessor-based systems, which in turn were connected by larger control networks. Internal vehicle communication networks can become a target for hacker, who, with specialized knowledge, can influence behavior of this network and alter vehicle reactions to control inputs. One could even place “logic bomb”, advanced algorithms which would wait until dangerous driving conditions are detected and only then activate itself, leading in turn to severe accidents. So far security of car communication networks was not part of a public discussions. The reason is that until recently these systems were not so heavily involved into driver security. Currently start of these discussions seems unavoidable. In this article authors presented basic means of attacking CAN communication network within the vehicle and possible consequences. Some possible means of protection before these attacks were described. This issue was analyzed mainly in terms of possible legislation activities to enforce security procedures for civilian, governmental and military vehicles.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.