Cyberattacks and Countermeasures for In-Vehicle Networks
ACM Computing Surveys (CSUR), Volume 54, Issue 1, March 2021.
Modern vehicles rely on the Controller Area Network (CAN) bus as the primary communication backbone connecting electronic control units that govern critical functions including braking, steering, and engine management. As vehicles become increasingly connected through external interfaces such as telematics units, infotainment systems, and V2X communication modules, the CAN bus is exposed to new attack vectors that can be exploited to inject malicious messages or disrupt vehicle operations. This project investigates security vulnerabilities inherent in the CAN bus protocol and develops detection algorithms for identifying malicious behaviour by analysing CAN traffic patterns. The research explores how to harden controllers against cyberattacks introduced via external connectivity and edge devices, examining both intrusion detection and prevention strategies. The work also considers how edge computing can be leveraged to perform real-time security analytics within the vehicle itself, reducing dependence on external cloud services.
A comprehensive survey of cyberattacks and countermeasures for in-vehicle networks is produced. The survey catalogues known attack types, their potential consequences, and the effectiveness of existing defence mechanisms, providing a structured reference for researchers and practitioners working on automotive cybersecurity.
Autonomous on-board security monitoring is a key goal of this research. By performing analytics within the vehicle itself, the system enables real-time threat detection without latency or connectivity constraints. This research is conducted in collaboration with iPoint and contributes to the broader goal of securing the automotive Internet of Things ecosystem as vehicles become increasingly software-defined and connected.