The automobile industry no longer relies on pure mechanical systems; instead, it benefits from many smart features based on advanced embedded electronics. Although the rise in electronics and connectivity has improved comfort, functionality, and safe driving, it has also created new attack surfaces to penetrate the in-vehicle communication network, which was initially designed as a close loop system. For such applications, the Controller Area Network (CAN) is the most-widely used communication protocol, which still suffers from various security issues because of the lack of encryption and authentication. As a result, any malicious/hijacked node can cause catastrophic accidents and financial loss. This paper analyses the CAN bus comprehensively to provide an outlook on security concerns. It also presents the security vulnerabilities of the CAN and a state-of-the-art attack surface with cases of implemented attack scenarios and goes through different solutions that assist in attack prevention, mainly based on an intrusion detection system (IDS).
The vehicles are equipped with electronic control units that control their functions. These units communicate with each other via in-vehicle communication protocols like CAN bus. Although CAN is the most common in-vehicle communication protocol, the lack of encryption and authentication causes series security shortcomings. There are many attacks reported and the number is estimated to increase with the rising connectivity of the cars. In this paper, we present CAN protocol and analyze its security vulnerabilities. Then we survey the implemented attacks and proposed solutions in the literature.
Vehicles are equipped with Electronic Control Units (ECUs) to increase their overall system functionality and connectivity. However, the rising connectivity exposes a defenseless internal Controller Area Network (CAN) to cyberattacks. An Intrusion Detection System (IDS) is a supervisory module, proposed for identifying CAN network malicious messages, without modifying legacy ECUs and causing high traffic overhead. The traditional IDS approaches rely on time and frequency thresholding, leading to high false alarm rates, whereas state-of-the-art solutions may suffer from vehicle dependency. This paper presents a wavelet-based approach to locating the behavior change in the CAN traffic by analyzing the CAN network's transmission pattern. The proposed Wavelet-based Intrusion Detection System (WINDS) is tested on various attack scenarios, using real vehicle traffic from two independent research centers, while being expanded toward more comprehensive attack scenarios using synthetic attacks. The technique is evaluated and compared against the state-of-the-art solutions and the baseline frequency method. Experimental results show that WINDS offers a vehicle-independent solution applicable for various vehicles through a unique approach while generating low false alarms.
Internet of Things (IoT) is nowadays the most profound buzzword in Information Technology science. IoT is the evolution of Information Technology which aims to build a mutual infrastructure that integrates, connects and telecommunicates every "Things" (Objects) with each other on the face of the earth. This interconnected infrastructure provides humans with fully control of things. Projections and potential estimates about incomings of IoT are spectacular for future directions. IoT encompasses such a wide range of spectrum that its influences are anyone"s guess. Not only the profits of IoT but also the forfeits and fears of IoT are unpredictable for yet. However, with the increase in research, academic studies and technological developments the atmosphere will be clear for IoT. This research paper proposes a novel comprehensive reference source for those who are interested in IoT, ubiquitous sensing, pervasive computing and smart objects. The paper explains IoT emergence and IoT history in detail, current IoT usage areas, the most up-to-date potential opportunities and future IoT directions, overall IoT architecture and well-liked architectures, security and privacy concerns about IoT. The latest ongoing IoT projects are discussed and the latest burning issues are presented. Critical and turning points of IoT are given in tabular. As compared to similar survey papers in the area, to the best of our knowledge contributions of this paper are unique.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.