Hardware Trojan Enabled Denial of Service Attack on CAN Bus


Bozdal M. , Randa M., Samie M., Jennions I.

7th International Conference on Through-Life Engineering Services (TESconf), Cranfield, England, 6 - 07 November 2018, vol.16, pp.47-52 identifier identifier

  • Publication Type: Conference Paper / Full Text
  • Volume: 16
  • Doi Number: 10.1016/j.promfg.2018.10.158
  • City: Cranfield
  • Country: England
  • Page Numbers: pp.47-52
  • Keywords: controller area network, can security, electronic control unit, in-vehicle communication network, hardware trojans, reliability engineering, sensor networks

Abstract

The trend of technological advances in the vehicle industry illustrates that future cars would have added functionalities with smart features, better connectivity and autonomous behaviour. These naturally involve a higher number of Electronic Control Units (ECUs) being connected using existing conventional in-vehicle network protocols such as Controller Area Network (CAN). In this context, security of systems is now becoming a major concern while industry's primary interest in the manufacturing of cars is reliability and safety. It is now in daily news that smart cars are being hacked due to weaknesses in their embedded electronics that provides ways of hardware attacks [1] [2].