Automotive Cybersecurity

  1. In-Vehicle Network Protocols and Vulnerabilities
    1. Controller Area Network (CAN) Bus
      1. Protocol Operation
        1. Message Frame Structure
          1. Message Arbitration Process
            1. Broadcast Communication Model
              1. Error Detection Mechanisms
              2. Inherent Security Weaknesses
                1. Lack of Authentication
                  1. Lack of Encryption
                    1. Broadcast Nature Vulnerabilities
                      1. Message Injection Risks
                        1. Denial of Service Vulnerabilities
                        2. CAN with Flexible Data-Rate (CAN FD)
                          1. Enhanced Data Rates
                            1. Improved Payload Capacity
                              1. Security Implications
                            2. Local Interconnect Network (LIN) Bus
                              1. Protocol Characteristics
                                1. Master-Slave Architecture
                                  1. Low-Cost Implementation
                                    1. Low-Speed Communication
                                    2. Typical Applications
                                      1. Body Control Functions
                                        1. Sensor Networks
                                        2. Security Limitations
                                          1. Lack of Built-in Security Features
                                            1. Susceptibility to Message Injection
                                              1. Eavesdropping Vulnerabilities
                                            2. FlexRay Protocol
                                              1. Features and Capabilities
                                                1. High-Speed Communication
                                                  1. Deterministic Timing
                                                    1. Fault Tolerance
                                                    2. Applications
                                                      1. Safety-Critical Systems
                                                        1. X-by-Wire Systems
                                                        2. Security Considerations
                                                          1. Limited Built-in Security
                                                            1. Potential Attack Vectors
                                                              1. Message Authentication Challenges
                                                            2. Media Oriented Systems Transport (MOST)
                                                              1. Purpose and Applications
                                                                1. Infotainment Systems
                                                                  1. Audio/Video Data Transmission
                                                                    1. Multimedia Distribution
                                                                    2. Protocol Characteristics
                                                                      1. Ring Topology
                                                                        1. Synchronous Data Transfer
                                                                        2. Vulnerabilities
                                                                          1. Lack of Encryption
                                                                            1. Data Injection Potential
                                                                              1. Network Disruption Risks
                                                                            2. Automotive Ethernet
                                                                              1. Rationale for Adoption
                                                                                1. High Bandwidth Requirements
                                                                                  1. Scalability Needs
                                                                                    1. ADAS Data Requirements
                                                                                      1. Infotainment Data Requirements
                                                                                      2. Implementation Variants
                                                                                        1. 100BASE-T1
                                                                                          1. 1000BASE-T1
                                                                                            1. Multi-Gigabit Ethernet
                                                                                            2. Security Mechanisms
                                                                                              1. Virtual LANs (VLANs)
                                                                                                1. Secure Onboard Communication (SecOC)
                                                                                                  1. MACsec (IEEE 802.1AE)
                                                                                                    1. Network Access Control
                                                                                                      1. Port Security