2016
DOI: 10.1007/978-3-319-49806-5_2
|View full text |Cite
|
Sign up to set email alerts
|

Practical DoS Attacks on Embedded Networks in Commercial Vehicles

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
25
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 46 publications
(25 citation statements)
references
References 3 publications
0
25
0
Order By: Relevance
“…In HAPCAN, denial of service can also be achieved by exploiting the fact that all nodes are interconnected in series, and therefore a failure of one module affects overall availability. Furthermore, as HAPCAN utilises the CAN protocol, the protocol itself is at risk to several additional CAN vulnerabilities, such as request overload and false request to send [16], or rogue node packet amplification exhausting [17]. Here, it is important to note that an attacker requires physical access to the communication bus, e.g., by implanting a rogue node through the supply chain.…”
Section: Cm-wd-h: Hapcanmentioning
confidence: 99%
“…In HAPCAN, denial of service can also be achieved by exploiting the fact that all nodes are interconnected in series, and therefore a failure of one module affects overall availability. Furthermore, as HAPCAN utilises the CAN protocol, the protocol itself is at risk to several additional CAN vulnerabilities, such as request overload and false request to send [16], or rogue node packet amplification exhausting [17]. Here, it is important to note that an attacker requires physical access to the communication bus, e.g., by implanting a rogue node through the supply chain.…”
Section: Cm-wd-h: Hapcanmentioning
confidence: 99%
“…There are different types of the DoS attack implemented on CAN network. Mukherjee et al [9] implemented DoS attack on SAE J1939. SAE J1939 standard is used in commercial vehicles and it is implemented on top of the CAN physical layer.…”
Section: B Existent Attacksmentioning
confidence: 99%
“…Mukherjee et al [16] implemented DoS attacks on the SAE J1939 standard [29], which is used in heavy-duty commercial vehicles. They performed three separate DoS attacks: (i) sending too many request messages for a supported Parameter Group Number (PGN) to overload the recipient ECU, (ii) sending manipulated false request to send (RTS) and causing overflow at the recipient buffer, and (iii) keeping the connections open via Clear to Send (CTS) messages and occupying the whole network.…”
Section: Physical Access Attacksmentioning
confidence: 99%
“…Therefore, extensive studies have been carried out to find possible solutions [7,8] to the vulnerabilities of CAN. Some of these studies have performed successful experimental attacks on passenger cars [9][10][11][12][13][14] and heavy-duty vehicles [15,16]. At the same time, researchers have also proposed preventative methods for such known attacks.…”
Section: Introductionmentioning
confidence: 99%