Preventing Frame Fingerprinting in Controller Area Network Through Traffic Mutation

Abstract

The continuous increase of connectivity in commercial vehicles is leading to a higher number of remote access points to the Controller Area Network (CAN) – the most popular in-vehicle network system. This factor, coupled with the absence of encryption in the communication protocol, poses serious threats to the security of the CAN bus. Recently, it has been demonstrated that CAN data can be reverse engineered via frame fingerprinting, i.e., identification of frames based on statistical traffic analysis. Such a methodology allows fully remote decoding of in-vehicle data and paves the way for remote pre-compiled vehicle-agnostic attacks. In this work, we propose a first solution against CAN frame fingerprinting based on mutating the traffic without applying modifications to the CAN protocol. The results show that the proposed methodology halves the accuracy of CAN frame fingerprinting.

Publication
2022 IEEE International Conference on Communications Workshops
Ion Turcanu
Ion Turcanu
Research and Technology Associate

My research interests include communications protocols for multi-technology vehicular networks, time-sensitive networking for in-vehicle communications, and next-generation cellular networks.