TY - JOUR
T1 - An Experimental Study Towards the In-Vehicle Network of Intelligent and Connected Vehicles
AU - Xun, Yijie
AU - Liu, Jiajia
AU - Ning, Jing
AU - Zhang, Haibin
N1 - Publisher Copyright:
© 2018 IEEE.
PY - 2018
Y1 - 2018
N2 - As the mainstream of future automotive industry, Intelligent and Connected Vehicles (ICVs) have versatile connections between themselves and external devices, although able to provide more conveniences and better driving experiences for the users, also bring forward lots of intrusion portals for the malicious attackers. It is noticed that the final step of almost all attacks in available works, must be at the in-vehicle network, i.e., the CAN bus. Actually, the characteristics of CAN data, specifically, the broadcast transmission on the CAN bus, as well as the unencrypted authentication strategy make the CAN bus vulnerable to various attacks. Different from previous works about CAN bus, we present in this paper a comprehensive study on the in-vehicle network of a modern ICV (a Luxgen SUV), from the perspective of the vehicle auxiliary system. We first clarify the complicated communication process among the smart key, Body Control Module (BCM), and Key Control Unit (KCU), identify the loophole among the Luxgen auxiliary system, and then introduce a practical method to utilize this vulnerability. Finally, extensive experiments have been conducted on the Luxgen SUV where a wireless diagnostic equipment was utilized to achieve successful remote invasion in road tests.
AB - As the mainstream of future automotive industry, Intelligent and Connected Vehicles (ICVs) have versatile connections between themselves and external devices, although able to provide more conveniences and better driving experiences for the users, also bring forward lots of intrusion portals for the malicious attackers. It is noticed that the final step of almost all attacks in available works, must be at the in-vehicle network, i.e., the CAN bus. Actually, the characteristics of CAN data, specifically, the broadcast transmission on the CAN bus, as well as the unencrypted authentication strategy make the CAN bus vulnerable to various attacks. Different from previous works about CAN bus, we present in this paper a comprehensive study on the in-vehicle network of a modern ICV (a Luxgen SUV), from the perspective of the vehicle auxiliary system. We first clarify the complicated communication process among the smart key, Body Control Module (BCM), and Key Control Unit (KCU), identify the loophole among the Luxgen auxiliary system, and then introduce a practical method to utilize this vulnerability. Finally, extensive experiments have been conducted on the Luxgen SUV where a wireless diagnostic equipment was utilized to achieve successful remote invasion in road tests.
UR - http://www.scopus.com/inward/record.url?scp=85063433109&partnerID=8YFLogxK
U2 - 10.1109/GLOCOM.2018.8647571
DO - 10.1109/GLOCOM.2018.8647571
M3 - 会议文章
AN - SCOPUS:85063433109
SN - 2334-0983
JO - Proceedings - IEEE Global Communications Conference, GLOBECOM
JF - Proceedings - IEEE Global Communications Conference, GLOBECOM
M1 - 8647571
T2 - 2018 IEEE Global Communications Conference, GLOBECOM 2018
Y2 - 9 December 2018 through 13 December 2018
ER -