7th IEEE International Symposium on Industrial Embedded Systems (SIES'12) 2012
DOI: 10.1109/sies.2012.6356590
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing security in CAN systems using a star coupling router

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 13 publications
0
5
0
Order By: Relevance
“…If the gateway ECU is programmed to pass relevant IDs to the subnetwork, it can be fooled by sending malicious CAN frame with an ID of a node which belongs to subnetwork [4]. Kammerer et al [15] implemented star coupling router topology. The router not only separate single-bus based CAN system to multiple CAN segments but also bring new security features like unidirectional channels, traffic shaping, traffic partitioning, message integrity, and intrusion detection.…”
Section: Proposed Solutionsmentioning
confidence: 99%
See 1 more Smart Citation
“…If the gateway ECU is programmed to pass relevant IDs to the subnetwork, it can be fooled by sending malicious CAN frame with an ID of a node which belongs to subnetwork [4]. Kammerer et al [15] implemented star coupling router topology. The router not only separate single-bus based CAN system to multiple CAN segments but also bring new security features like unidirectional channels, traffic shaping, traffic partitioning, message integrity, and intrusion detection.…”
Section: Proposed Solutionsmentioning
confidence: 99%
“…The router not only separate single-bus based CAN system to multiple CAN segments but also bring new security features like unidirectional channels, traffic shaping, traffic partitioning, message integrity, and intrusion detection. In the paper [15], CAN segment security was taken out of the scope but replay or masquerade attacks in a CAN segment may pass the router's security checks and attack the other CAN segments. The safest solution will a node in a segment but it is not feasible for cost and timing perspective.…”
Section: Proposed Solutionsmentioning
confidence: 99%
“…The method is simple to implement, but it is not effective if the gateway ECU is compromised or manipulated like the hacking exhibited in [12]. Kammerer et al [36] addressed this issue and proposed a star coupling router with security features. The paper ignored the security inside a subnetwork, but it is possible to implement a replay attack in a subnetwork and attack the other subnetworks bypassing the security check of the router.…”
Section: Network Segmentationmentioning
confidence: 99%
“…For instance, in [29] the authors explore the feasibility of performing frame-less DoS attacks by sending well-directed error flags into the CAN network, forcing other nodes to reject a message. In [9] the authors briefly mention that similar situations could occur if a corrupted node started to upset CAN traffic bits. In [28] many bus networks (including CAN) are described as being vulnerable to "bit banging" attacks.…”
Section: Related Workmentioning
confidence: 99%
“…Network Topology Alteration. A more radical segmentation approach consists in changing the network topology from the current bus topology to a star topology, with a trusted network dispatcher in the middle, as proposed in a few prior studies [3,9]. Unfortunately, this solution would dramatically increase the wiring harness and limit the flexibility of the network, which was one of the core reasons which favored CAN bus adoption in the past.…”
Section: Detectability and Countermeasuresmentioning
confidence: 99%