BEZBJEDNOSNA ANALIZA CAN PROTOKOLA KORIŠĆENOG U AUTOMOBILIMA

  • Dragana Filipović
  • Nikola Luburić
Ključne reči: bezbjednost automobila, CAN protokol, model prijetnji

Apstrakt

U ovom radu je analizirana bezbjednost vozila sa posebnim fokusom na CAN protokol i njegove komponente. Identifikovani su potencijalni napadači i detaljno su opisani njihovi ciljevi. Opisana je arhitektura automobila, s naglaskom na elektronske kontrolne jedinice i CAN protokol kao komunikacionu mrežu. Kao rezultat ovog istraživanja, razvijen je model prijetnji koji obuhvata identifikovane i analizirane prijetnje i napade na CAN protokol, pri čemu je za kategorizaciju prijetnji korišćen STRIDE okvir. Takođe su identifikovani mitigacioni mehanizmi, koji su klasifikovani u reaktivne i preventivne, te su ovi mehanizmi detaljno opisani..

Reference

[1] Lawrenz, W. (2013b). Can system engineering: From theory to practical applications (Corr. Edition ed). New York: Springer.
[2] Ibrahim, D. (2016). Controller Area Network projects with arm and Arduino Dogan Ibrahim. London: Elektor International Media BV.
[3] Di Natale, M. (2012). Understanding and using the Controller Area Network Communication Protocol Theory and Practice. New York, NY: Springer New York.
[4] McAfee. (2017). Automotive Security Best Practices: Recommendations for security and privacy in the era of the next-generation car. https://motordna.io/static/stickerlook/images/wp-automotive-security.pdf [датум приступа јул 2024]
[5] Smith, C. (2016). The car hacker’s Handbook: A guide for the penetration tester. San Francisco, CA: No Starch Press.
[6] Studnia, I., Nicomette, V., Alata, E., Deswarte, Y., Kaâniche, M., & Laarouchi, Y. (2013, June). Survey on security threats and protection mechanisms in embedded automotive networks. In 2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W) (pp. 1-12). IEEE.
[7] Charette, R. N. (2009). This car runs on code. IEEE spectrum, 46(3), 3.
[8] Koscher, K., Czeskis, A., Roesner, F., Patel, S., Kohno, T., Checkoway, S., ... & Savage, S. (2010, May). Experimental security analysis of a modern automobile. In 2010 IEEE symposium on security and privacy (pp. 447-462). IEEE.
[9] Bozdal, M., Samie, M., & Jennions, I. (2018, August). A survey on can bus protocol: Attacks, challenges, and potential solutions. In 2018 International Conference on Computing, Electronics & Communications Engineering (iCCECE) (pp. 201-205). IEEE.
[10] Carsten, P., Andel, T. R., Yampolskiy, M., & McDonald, J. T. (2015, April). In-vehicle networks: Attacks, vulnerabilities, and proposed solutions. In Proceedings of the 10th Annual Cyber and Information Security Research Conference (pp. 1-8).
[11] M. Howard and S. Lipner, The Security Development Lifecycle. Redmond, WA, USA: Microsoft Press, 2006
[12] Luo, F., Jiang, Y., Wang, J., Li, Z., & Zhang, X. (2023). A Framework for Cybersecurity Requirements Management in the Automotive Domain. Sensors, 23(10), 4979.
[13] Aliwa, E., Rana, O., Perera, C., & Burnap, P. (2021). Cyberattacks and countermeasures for in-vehicle networks. ACM computing surveys (CSUR), 54(1), 1-37.
[14] Rathore, R. S., Hewage, C., Kaiwartya, O., & Lloret, J. (2022). In-vehicle communication cyber security: challenges and solutions. Sensors, 22(17), 6679.
[15] Hossain, M. D., Inoue, H., Ochiai, H., Fall, D., & Kadobayashi, Y. (2020). LSTM-based intrusion detection system for in-vehicle can bus communications. Ieee Access, 8, 185489-185502.
[16] Gmiden, M., Gmiden, M. H., & Trabelsi, H. (2019, March). Cryptographic and Intrusion Detection System for automotive CAN bus: Survey and contributions. In 2019 16th International Multi-Conference on Systems, Signals & Devices (SSD) (pp. 158-163). IEEE
[17] Woo, S., Jo, H. J., & Lee, D. H. (2014). A practical wireless attack on the connected car and security protocol for in-vehicle CAN. IEEE Transactions on intelligent transportation systems, 16(2), 993-1006.
[18] Hoppe, T., Kiltz, S., & Dittmann, J. (2008). Security threats to automotive CAN networks–practical examples and selected short-term countermeasures. In Computer Safety, Reliability, and Security: 27th International Conference, SAFECOMP 2008 Newcastle upon Tyne, UK, September 22-25, 2008 Proceedings 27 (pp. 235-248). Springer Berlin Heidelberg.
[19] Young, C., Zambreno, J., Olufowobi, H., & Bloom, G. (2019). Survey of automotive controller area network intrusion detection systems. IEEE Design & Test, 36(6), 48-55.
[20] F. M. Tabrizi and K. Pattabiraman, “Flexible intrusion detection systems for memory-constrained embedded systems,” in Proc. of Dependable Computing Conference (EDCC). IEEE, 2015, pp. 1–12.
Objavljeno
2024-11-06
Sekcija
Elektrotehničko i računarsko inženjerstvo