Research

Sep 19, 2024

Understanding CAN Bus Vulnerabilities and How Blockchain Can Amplify Security

The Controller Area Network (CAN) bus is a communication protocol widely used in modern vehicles to connect various Electronic Control Units (ECUs). These ECUs manage critical functions such as braking, engine control, and airbag deployment, making the CAN bus an integral part of a vehicle’s operational framework. Access to the CAN bus is often facilitated through the OBD-II port, which allows technicians and diagnostic tools to interface with the vehicle’s system. However, this entry point also presents a potential vulnerability, as attackers can exploit it to gain unauthorized access.

The Nature of CAN Bus Vulnerabilities


The CAN bus was originally designed in the 1980s when cybersecurity was not a primary concern in automotive design. As a result, it lacks many of the fundamental security measures found in more modern networks, such as encryption and authentication. The CAN bus operates on a “broadcast communication model”, where all ECUs on the network can "hear" each other’s messages. This openness, while efficient, poses several security risks:


1. No Authentication: The CAN protocol does not verify the identity of the sending ECU. Any compromised ECU can send messages to the entire network, potentially controlling or disrupting other ECUs. For example, an attacker could inject malicious commands to disable the brakes or steer the vehicle remotely.

2. Lack of Encryption: CAN bus messages are not encrypted, meaning any ECU or external entity with access to the bus can read the data being transmitted. This exposes sensitive information, such as engine data or user inputs, to attackers who may use it for malicious purposes.


3. Message Prioritization: In the CAN bus protocol, messages with lower ID numbers are given higher priority. Attackers can exploit this by injecting messages with low ID numbers (high priority) to overwhelm the network, effectively launching a Denial of Service (DoS) attack, where legitimate messages are delayed or blocked.


4. Broadcast Nature: Since the CAN bus uses a broadcast system, a single malicious ECU can inject false or malicious data into the network, affecting multiple systems at once. This broad attack surface makes it easier for attackers to target multiple vehicle systems simultaneously.


5. Physical Access Requirement: While many CAN bus vulnerabilities require physical access to the vehicle, modern vehicles with remote access capabilities (via Wi-Fi, Bluetooth, or cellular networks) introduce remote attack vectors. Attackers could gain access to the CAN bus by exploiting these interfaces, making remote hacking a realistic threat.


Common Types of CAN Bus Attacks


Several types of attacks exploit these vulnerabilities, each with different levels of complexity and potential damage:


1. Fuzzing Attacks: Attackers send random data packets to the CAN bus with legitimate message IDs, overwhelming the system and potentially causing malfunctions in the vehicle’s systems.


2. Replay Attacks: In this attack, legitimate CAN bus messages are captured, stored, and replayed at a later time to trick the system. For example, an attacker could record a door unlock message and replay it to unlock the vehicle without a key.


3. Denial of Service (DoS) Attacks: By sending high-priority messages continuously, an attacker can block other ECUs from sending their messages, effectively disrupting vehicle operations. This could lead to critical failures, such as brakes not responding.


4. Injection Attacks: Malicious data is injected into the CAN bus by exploiting the lack of message authentication. Attackers can send false information, such as incorrect speed or sensor data, which could lead to unsafe driving conditions or compromised safety features.


5. Man-in-the-Middle Attacks: An attacker intercepts CAN bus messages, alters them, and forwards the modified messages to other ECUs, causing the vehicle to behave in unintended ways. This could involve tricking the ECU into displaying false information or activating systems at inappropriate times.


How Blockchain Can Enhance CAN Bus Security


To address these vulnerabilities, integrating blockchain technology into CAN bus security offers a promising solution. Blockchain provides several key features that can enhance the security of CAN bus systems, including immutability, decentralized data storage, and traceability.



1. Immutability and Tamper Resistance: Blockchain technology ensures that once data is recorded, it cannot be altered or deleted without detection. In the context of CAN bus intrusion detection, this means that every detected anomaly or malicious activity can be securely logged in a blockchain ledger. This immutable log provides a verifiable record of all security incidents, preventing attackers from tampering with the evidence or hiding their tracks.


2. Decentralized Data Storage: With blockchain, intrusion detection data can be stored across multiple nodes (e.g., local ECUs, cloud systems, or manufacturer databases). This decentralized structure ensures that no single point of failure exists. Even if one node is compromised, the rest of the network remains secure and can continue operating. Decentralization also enhances data redundancy, ensuring that intrusion reports are not lost or manipulated.


3. Traceability and Accountability: Blockchain’s inherent traceability allows all security incidents and actions taken to be fully transparent. Each report generated by the Intrusion Detection System (IDS) is logged in a blockchain ledger, making it possible to trace the origin of each event. This is critical for ISO/SAE 21434 compliance, which mandates that all cybersecurity incidents in vehicles be traceable. In the event of an attack, blockchain can identify which ECU was compromised, which reports were generated, and who responded to the incident.


4. Secure Incident Reporting: When an intrusion is detected, the IDS can report the incident using blockchain. By utilizing smart contracts, the IDS can automate the process of sending the detected anomaly to a cloud-based monitoring system. The blockchain ledger stores a timestamp, the nature of the attack, and relevant data for future analysis. This automated reporting process ensures that security incidents are reported accurately and promptly, without the risk of tampering.


Integrating Blockchain with CAN Bus Intrusion Detection


As highlighted in a 2024 study published in Scientific Reports, the combination of blockchain and a cloud-based IDS provides a scalable and effective solution for securing CAN bus networks. This approach works by deploying a local IDS on the vehicle’s head unit, which monitors real-time CAN bus traffic for anomalies. Simultaneously, a centralized cloud-based IDS aggregates data from multiple vehicles to identify new and emerging attack patterns.


When a threat is detected, the blockchain records the incident, ensuring the information remains transparent, immutable, and accessible to all stakeholders, such as vehicle manufacturers, cybersecurity teams, and regulators. These reports are then compliant with ISO/SAE 21434 standards, making it easier to analyze and address potential security risks.


The cloud-based IDS is continuously updated with the latest attack signatures, ensuring that all connected vehicles benefit from the most up-to-date cybersecurity defenses. This centralized system reduces the computational burden on individual vehicles and allows for more sophisticated, resource-intensive analysis to be conducted in the cloud.



Practical Application of Blockchain in CAN Bus Security


- Intrusion Detection: The IDS detects anomalies in the CAN bus traffic and immediately records the event on the blockchain. The report includes details such as the type of attack (e.g., fuzzing or replay), the affected ECU, and the potential impact.

- Response Team Analysis: A cybersecurity team reviews the blockchain report, verifies the attack, and performs a detailed analysis. This process is recorded and stored as an immutable record in the blockchain, ensuring traceability.


- Software Updates: When new vulnerabilities are discovered, the IDS can be updated over-the-air (OTA) using blockchain. This ensures that all vehicles in the network receive the necessary updates securely and without the risk of tampering.

By integrating blockchain with a cloud-based intrusion detection system, vehicle manufacturers can improve the detection, reporting, and mitigation of cyberattacks, ultimately safeguarding both the vehicle and its occupants.

As vehicles become more connected and autonomous, the need for secure and reliable communication systems will only grow. Blockchain offers a scalable solution for securing CAN bus networks and protecting the future of automotive cybersecurity.


Sources:

1. Andreica, Tudor, et al. "Blockchain Integration for In-Vehicle CAN Bus Intrusion Detection Systems with ISO/SAE 21434 Compliant Reporting." Scientific Reports, vol. 14, 2024, article 8169, https://doi.org/10.1038/s41598-024-58694-4.


2. Offensive Security. "Introduction to Car Hacking: The CAN Bus." Offensive Security, 25 June 2021, www.offsec.com/blog/introduction-to-car-hacking-the-can-bus/.


About Chain

Chain is a blockchain infrastructure solution company that has been on a mission to enable a smarter and more connected economy since 2014. Chain offers builders in the Web3 industry services that help streamline the process of developing, and maintaining their blockchain infrastructures. Chain implements a SaaS model for its products that addresses the complexities of overall blockchain management. Chain offers a variety of products such as Ledger, Cloud, and NFTs as a service. Companies who choose to utilize Chain’s services will be able to free up resources for developers and cut costs so that clients can focus on their own products and customer experience. Learn more: https://chain.com.


Connect with Chain for the latest updates:

X (Previously Twitter): x.com/Chain

Facebook: facebook.com/Chain

Instagram: instagram.com/Chain

Telegram: t.me/Chain

TikTok: tiktok.com/@Chain

Youtube: youtube.com/Chain

Chain News & Updates

Latest News & Updates

Sign up for the Chain Newsletter - a weekly roundup of new platform features and the latest from the industry.