Published January 1, 2021
| Version v1
Journal article
Open
Implementation of a bluetooth attack on controller area network
Authors/Creators
- 1. Faculty of sciences and Technology (FST), University Sidi Mohamed Ben Abdellah, Signals Systems and Components Laboratory (LSSC), Fez, Morocco
Description
In this paper a general overview of the vulnerability of the controller area network (CAN) bus is presented and a practical short-range attack is proposed. There are more and more potential attacks on the CAN bus, which may cause leakage of information and thereby there may be danger for safe driving. The attack combines several techniques, such as how to update a node firmware using a Bluetooth module and inject a priority fake frame, in order to block the legitimate messages.
Files
36 23100.pdf
Files
(378.8 kB)
| Name | Size | Download all |
|---|---|---|
|
md5:49a7aa3099fbb5c2aea630a03817776a
|
378.8 kB | Preview Download |