Protecting Our Community from the Hidden Vulnerabilities of Today’s Intelligent Transportation Systems
-
2022-05-01
Details
-
Creators:
-
Corporate Creators:
-
Corporate Contributors:State of California. Trustees of the California State University. Sponsored Programs Administration ; United States. Department of Transportation. Office of the Assistant Secretary for Research and Technology ; United States. Department of Transportation. University Transportation Centers (UTC) Program
-
Subject/TRT Terms:
-
Publication/ Report Number:
-
DOI:
-
Resource Type:
-
Geographical Coverage:
-
Corporate Publisher:
-
Abstract:The ever-evolving technology interwoven into the transportation industry leaves it frequently at risk for cyber-attacks. This study analyzes the security of a common in-vehicle network, the Controller Area Network (CAN), standard in most vehicles being manufactured today. Like many other networks, CAN comes with inherent vulnerabilities that leave CAN implementations at risk of being targeted by cybercriminals. Such vulnerabilities range from eavesdropping, where the attacker can read the raw data traversing the vehicle, to spoofing, where the attacker can place fabricated traffic on the network. The research team initially performed a simulation of CAN traffic generation followed by hardware implementation of the same on a test vehicle. Due to the concealed and untransparent nature of CAN, the team reverse-engineered the missing parameters through a series of passive "sniffing attacks" (attacks using data reading utilities called packet sniffers) on the network and then demonstrated the feasibility of the attack by placing fabricated frames on the CAN.
-
Format:
-
Funding:
-
Collection(s):
-
Main Document Checksum:urn:sha-512:4354cf969b170576943d8233335cc561db6aa33b1f98c1ba47e33efdf1f953405f12eeb23921f578e8cdb8bc8e298e6e440791363712cc24d7ef28a08cc0895a
-
Download URL:
-
File Type: