E3S Web of Conferences (Jan 2023)

Analysis of current attacks on the CAN bus and development of a new solution to detect these types of malicious threats

  • Karrouchi Mohammed,
  • Rhiat Mohammed,
  • Nasri Ismail,
  • Atmane Ilias,
  • Hirech Kamal,
  • Messaoudi Abdelhafid,
  • Melhaoui Mustapha,
  • Kassmi Kamal

DOI
https://doi.org/10.1051/e3sconf/202346900082
Journal volume & issue
Vol. 469
p. 00082

Abstract

Read online

The majority of modern vehicles have electronic control units (ECUs) in charge of controlling their functions. These ECUs communicate with one another using the CAN (Controller Area Network) communication protocol. This practical bus offers great transfer of data quality by enabling wide propagation that quickly reaches all sections of a vehicle. Unfortunately, this specific protocol places little focus on security, making the CAN bus control system susceptible. This is owing to its ease of physical or remote access and lack of confidentiality. This vulnerability makes it feasible to take control of the vehicle and endanger the safety of the passengers. The main objective of this work is to present the current existing vulnerabilities of the CAN Bus, to discuss a practical demonstration of hacking as well as to propose a technique to fight against these malicious actions, and all this by practical demonstrations on a DACIA Lodgy and Sandero 2014 vehicles.