Authors: Mabrouka Gmiden; Mohamed Hedi Gmiden; Hafedh Trabelsi
Addresses: National Engineers School of Gabes (ENIG), Avenue Omar Ibn Alkhattab, Zrig Gabes 6029, Tunisia ' Engineering School of Sfax (ENIS), Route de Soukra, Km 3.5 BP W, 3038 Sfax, Tunisia ' Engeneering School of Sfax (ENIS), Route de Soukra, Km 3.5 BP W, 3038 Sfax, Tunisia
Abstract: Electronic control units, so called ECUs are a major part in a today car's architecture. These devises are dedicated to control and monitor different functions in-vehicle. So, a secure communication, between those ECUs, is required. Modern cars can contain from 70-100 of ECUs which are interconnected via several protocols to form an overall internal network controller area network (CAN) bus has become the widely used among these protocol. However, CAN bus does not have enough security prosperities to protect the whole automotive system even to protect its network. Furthermore, today's car is characterised with an important external connectivity through several devices such as of Wi-Fi, Bluetooth and USB. Unfortunately, the increase of connectivity and complexity of modern in-automotive networks have increased the possibility of attacks against vehicle. So, to leave in-vehicle security level, some defence mechanisms, such as cryptographic and intrusion detection systems, are proposed. In this paper, we present, on one hand, a survey on current restrictions of CAN bus to insure a secure communication. On second hand, we give some approaches to solve CAN bus security.
Keywords: CAN bus protocol; in-vehicle security; CAN bus; vulnerabilities; in-vehicle network communication; security approaches.
International Journal of Digital Signals and Smart Systems, 2018 Vol.2 No.4, pp.345 - 365
Received: 03 Jul 2018
Accepted: 25 Dec 2018
Published online: 06 Aug 2019 *