Security shortcomings of embedded network protocols in commercial vehicles
dc.contributor.author | Chatterjee, Rik, author | |
dc.contributor.author | Daily, Jeremy, advisor | |
dc.contributor.author | Ray, Indrakshi, committee member | |
dc.contributor.author | Ray, Indrajit, committee member | |
dc.date.accessioned | 2024-12-23T11:59:29Z | |
dc.date.available | 2024-12-23T11:59:29Z | |
dc.date.issued | 2024 | |
dc.description.abstract | Modern commercial vehicles depend on embedded systems that communicate via standardized protocols, forming the foundation of their internal networks. The Controller Area Network (CAN) protocol is commonly employed for communication, with protocols such as SAE J1939 and Unified Diagnostic Services (UDS) playing critical roles in medium and heavy-duty vehicles. This thesis investigates multiple attack vectors that exploit vulnerabilities in both the SAE J1939 and UDS protocols, potentially compromising electronic control units (ECUs) in commercial vehicle networks. The study presents five case scenarios related to the SAE J1939 standard, including two that validate previously proposed attack hypotheses using extensive testing setups. Additionally, three new attack vectors are explored through bench tests and in-vehicle trials. Simultaneously, the research highlights three vulnerabilities within the UDS protocol, specifically addressing weaknesses in the ISO 14229 and ISO 15765 specifications. Testing was conducted on real-world systems, including bench setups with ECUs connected to a CAN bus and in-vehicle evaluations using a 2014 Kenworth T270 and a 2018 Freightliner Cascadia Truck Front Cab configured as a test bench. The results demonstrate how these protocol-based attacks can target and compromise specific ECUs, revealing significant security gaps in current vehicular communication systems. Engineers and developers working with SAE J1939 and UDS stacks must consider these vulnerabilities to enhance the resilience of communication subsystems in future designs. | |
dc.format.medium | born digital | |
dc.format.medium | masters theses | |
dc.identifier | Chatterjee_colostate_0053N_18684.pdf | |
dc.identifier.uri | https://hdl.handle.net/10217/239780 | |
dc.language | English | |
dc.language.iso | eng | |
dc.publisher | Colorado State University. Libraries | |
dc.relation.ispartof | 2020- | |
dc.rights | Copyright and other restrictions may apply. User is responsible for compliance with all applicable laws. For information about copyright law, please see https://libguides.colostate.edu/copyright. | |
dc.subject | cybersecurity | |
dc.subject | heavy vehicles | |
dc.subject | vulnerabilities | |
dc.subject | denial of service | |
dc.subject | automotive | |
dc.subject | protocols | |
dc.title | Security shortcomings of embedded network protocols in commercial vehicles | |
dc.type | Text | |
dcterms.rights.dpla | This Item is protected by copyright and/or related rights (https://rightsstatements.org/vocab/InC/1.0/). You are free to use this Item in any way that is permitted by the copyright and related rights legislation that applies to your use. For other uses you need to obtain permission from the rights-holder(s). | |
thesis.degree.discipline | Systems Engineering | |
thesis.degree.grantor | Colorado State University | |
thesis.degree.level | Masters | |
thesis.degree.name | Master of Science (M.S.) |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- Chatterjee_colostate_0053N_18684.pdf
- Size:
- 8.88 MB
- Format:
- Adobe Portable Document Format