Attacks against Controller-Area Network (CAN)-Bus Protocols and Digital Forensic Challenges for Internet of Vehicles Networks

September 19, 2023

Rhonda Johnson

Internet of Vehicles networks are becoming a reality for consumers who use modes of intelligent transportation systems such as autonomous vehicles (Ahmim et al., 2022). Within the Internet of Vehicles infrastructures, as autonomous vehicles increase in society, there is an increased likelihood of such vehicles being used for criminal activity. This article will explore how to conduct a forensic analysis of cyber-attacks against the CAN-Bus protocol of the Internet of Vehicles environment. 

CAN Protocols

Connected vehicles use various components, including software and storage features, hardware, and communication protocols. Hardware includes sensors, actuators, and electronic control units (ECUs). ECUs can range in complexity and function and can be as simple as a sensor processor or as complex as applications on an infotainment system (Bozdal et al., 2018). The Internet of Vehicles network has a vast selection of electronic software control units, that control the various functions of the vehicle using a CAN BUS protocol. The CAN Protocol is an in-vehicle communication interface developed by Robert Bosh in 1980. The CAN protocol has a distributed broadcast network architecture, enjoys the benefits of low risk of interference from electrical sources, and has several self-correcting repair features (Bozdal et al., 2018). 

Algorithmic Diagram Showing Connectivity Between Various Devices Using CAN Protocol

Figure 1. Device Connectivity in CAN Protocol 


CAN message frame
Start of Frame (SOF) Initiates communication with other electronic control units during incoming....

Notify of

Inline Feedbacks
View all comments
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023