2011
DOI: 10.1016/j.ress.2010.06.026
|View full text |Cite
|
Sign up to set email alerts
|

Security threats to automotive CAN networks—Practical examples and selected short-term countermeasures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
201
0
2

Year Published

2012
2012
2022
2022

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 251 publications
(213 citation statements)
references
References 4 publications
0
201
0
2
Order By: Relevance
“…Recent studies have exposed severe security flaws in current ITS systems [37][38] [39], directly threatening the safety of an attacked vehicle and its passengers. The threat is exacerbated for C-ITS systems where external communication channels increase the attack surface [40].…”
Section: Related Workmentioning
confidence: 99%
“…Recent studies have exposed severe security flaws in current ITS systems [37][38] [39], directly threatening the safety of an attacked vehicle and its passengers. The threat is exacerbated for C-ITS systems where external communication channels increase the attack surface [40].…”
Section: Related Workmentioning
confidence: 99%
“…Without loss of generality, we consider two trust groups in this work. 3 A major advantage of this trust group based key management is that the number of keys is independent of the number of ECUs, therefore improving the scalability of the system and reducing the costs of initializing and storing keys.…”
Section: A Trust Groupsmentioning
confidence: 99%
“…Typical internal network is CAN protocol [9] and it has some potential vulnerabilities originated from its broadcast nature, fragility to DoS, no authenticator fields and weak access control. Practically, CAN protocol itself does not support security against them [11]. In addition, attack methods utilizing CAN protocol define read, spoof, drop, modify, flood, steal and replay [10], and these attack methods are able to control the vehicle through actual experiments [1], [2], [3], [11].…”
Section: A Security Threats To the Vehicular Electronicsmentioning
confidence: 99%
“…In order to cope with these threats, several practical approaches are researched including intrusion detection technique [11], software update for a secure ECU using certificate and signature [12], providing data integrity by generating message authentication code for four data frames and secure message authentication mechanism based on certificate [14].…”
Section: A Security Threats To the Vehicular Electronicsmentioning
confidence: 99%