Published January 1, 2021 | Version v1
Journal article Open

Implementation of a bluetooth attack on controller area network

  • 1. Faculty of sciences and Technology (FST), University Sidi Mohamed Ben Abdellah, Signals Systems and Components Laboratory (LSSC), Fez, Morocco

Description

In this paper a general overview of the vulnerability of the controller area network (CAN) bus is presented and a practical short-range attack is proposed. There are more and more potential attacks on the CAN bus, which may cause leakage of information and thereby there may be danger for safe driving. The attack combines several techniques, such as how to update a node firmware using a Bluetooth module and inject a priority fake frame, in order to block the legitimate messages.

Files

36 23100.pdf

Files (378.8 kB)

Name Size Download all
md5:49a7aa3099fbb5c2aea630a03817776a
378.8 kB Preview Download