Current vehicle designs undergo real technological revolution in recent years, similar to the one which already happened in the aerospace industry in the seventies. Reason for those changes was replacement of electromechanical control systems with microprocessor-based systems, which in turn were connected by larger control networks. Internal vehicle communication networks can become a target for hacker, who, with specialized knowledge, can influence behavior of this network and alter vehicle reactions to control inputs. One could even place “logic bomb”, advanced algorithms which would wait until dangerous driving conditions are detected and only then activate itself, leading in turn to severe accidents.
So far security of car communication networks was not part of a public discussions. The reason is that until recently these systems were not so heavily involved into driver security. Currently start of these discussions seems unavoidable. In this article authors presented basic means of attacking CAN communication network within the vehicle and possible consequences. Some possible means of protection before these attacks were described. This issue was analyzed mainly in terms of possible legislation activities to enforce security procedures for civilian, governmental and military vehicles.
Zasady cytowania
Licencja
Utwór dostępny jest na licencji Creative Commons Uznanie autorstwa – Użycie niekomercyjne – Na tych samych warunkach 4.0 Międzynarodowe.