当前位置: X-MOL 学术Library Hi Tech › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Cybersecurity attacks on CAN bus based vehicles: a review and open challenges
Library Hi Tech ( IF 1.623 ) Pub Date : 2021-08-12 , DOI: 10.1108/lht-01-2021-0013
Faten Fakhfakh 1 , Mohamed Tounsi 2 , Mohamed Mosbah 3
Affiliation  

Purpose

Nowadays, connected vehicles are becoming quite complex systems which are made up of different devices. In such a vehicle, there are several electronic control units (ECUs) that represent basic units of computation. These ECUs communicate with each other over the Controller Area Network (CAN) bus protocol which ensures a high communication rate. Even though it is an efficient standard which provides communication for in-vehicle networks, it is prone to various cybersecurity attacks. This paper aims to present a systematic literature review (SLR) which focuses on potential attacks on CAN bus networks. Then, it surveys the solutions proposed to overcome these attacks. In addition, it investigates the validation strategies aiming to check their accuracy and correctness.

Design/methodology/approach

The authors have adopted the SLR methodology to summarize existing research papers that focus on the potential attacks on CAN bus networks. In addition, they compare the selected papers by classifying them according to the adopted validation strategies. They identify also gaps in the existing literature and provide a set of open challenges that can significantly improve the existing works.

Findings

The study showed that most of the examined papers adopted the simulation as a validation strategy to imitate the system behavior and evaluate a set of performance criteria. Nevertheless, a little consideration has been given to the formal verification of the proposed systems.

Originality/value

Unlike the existing surveys, this paper presents the first SLR that identifies local and remote security attacks that can compromise in-vehicle and inter-vehicle communications. Moreover, it compares the reviewed papers while focusing on the used validation strategies.



中文翻译:

基于 CAN 总线的车辆的网络安全攻击:回顾和公开挑战

目的

如今,联网车辆正在成为由不同设备组成的相当复杂的系统。在这样的车辆中,有几个代表基本计算单元的电子控制单元 (ECU)。这些 ECU 通过控制器区域网络 (CAN) 总线协议相互通信,以确保高通信速率。尽管它是一种为车载网络提供通信的高效标准,但它很容易受到各种网络安全攻击。本文旨在提出一个系统的文献综述(SLR),重点关注对 CAN 总线网络的潜在攻击。然后,它调查了为克服这些攻击而提出的解决方案。此外,它还研究了旨在检查其准确性和正确性的验证策略。

设计/方法/途径

作者采用 SLR 方法总结了现有的研究论文,重点关注对 CAN 总线网络的潜在攻击。此外,他们通过根据采用的验证策略对所选论文进行分类来比较它们。他们还确定了现有文献中的差距,并提供了一系列可以显着改进现有作品的开放式挑战。

发现

研究表明,大多数被检查的论文都采用模拟作为验证策略来模拟系统行为并评估一组性能标准。尽管如此,对所提议系统的形式验证已经给予了一些考虑。

原创性/价值

与现有调查不同,本文介绍了第一个 SLR,它可以识别可能危及车内和车间通信的本地和远程安全攻击。此外,它比较了审查过的论文,同时关注所使用的验证策略。

更新日期:2021-08-12
down
wechat
bug