Site Information

 Loading... Please wait...

Blog

The Myth: Controller Area Network (CAN) is “Too Easy to Hack”

Posted by Wilfried Voss on

The potential security issues of CAN and its higher-layer protocols attract increased attention from the automotive, control, and medical industries. At first glance, believing that a well-documented standard like ISO 11898 makes it easier to manipulate control functions, whether in an automobile or a medical device such as an MRI or CT scanner, makes sense. This view may be especially true for SAE J1939, the standard for diesel engines, which includes not only trucks but also tanks, ships, trains, and more. The SAE J1939 Standard Collection meticulously documents thousands of parameters (PGNs) transmitted throughout a vehicle network.

The gravity of the security concerns is underscored by real-world incidents. For instance, reports have surfaced about hackers gaining control of modern cars by simply removing the headlights, thereby accessing the vehicle’s control network and enabling them to open the doors and drive away. In another alarming case, hackers successfully disconnected the sway bar in a Jeep Wrangler, a move that could prove catastrophic for the vehicle and its occupants at speeds above 18 mph (29 km/h).

Specifically, in the sway bar scenario, let me be blunt and call this a matter of lousy engineering. Jeep may very well have learned their lesson for newer models - the model in question was a 2010 Jeep Wrangler (AKA Jeep JK) Rubicon 2DR.

But let me address my problem with identifying Controller Area Network as the “enabler” of hacking attempts. Every serial networking technology is vulnerable to “hacking,” specifically ethernet, the basis for the World Wide Web. The point is that networking technology is not the deciding factor for hacking. The motivation for hacking is simple: Because I can. Automobiles and the Internet are desirable targets.

The physical access to a vehicle is not exclusively a CAN weakness. If I wanted to disable a vehicle, I wouldn’t spend weeks or months analyzing and re-engineer CAN data traffic. Multiple, more effective methods exist to immobilize a passenger car or diesel truck. Staying with the CAN technology, I might install a jumper between CAN_H and CAN_L. The result may be unpredictable, but that is exactly what a hacker would have in mind, yet easy to accomplish. A more brutal approach would be stuffing a banana into the exhaust pipe – and yes, I am serious. I'm sure any car enthusiast can generate a list of similarly effective techniques.

The situation becomes more serious when rightful owners or users attempt to add or modify functionality that violates the manufacturer's safety standards. As in the case of the Jeep sway bar, there are serious legal consequences when the access causes damage to the vehicle or drivers and passengers. As previously mentioned, analyzing and re-engineering CAN control functions requires a significant amount of time. However, as the earlier examples indicate, this does not deter dedicated hackers.

However, the primary enabling factor for malicious hacking is remote (non-physical) access. With passenger vehicles, trucks, and even medical devices having experienced a massive increase in connectivity, hackers are more likely to exploit networking vulnerabilities. In particular, wireless networking via WIFI, Bluetooth, or GSM may affect the integrity and availability of connected cars. Consequently, compromised remote access may result in a vulnerable Controller Area Network.

From my perspective, the key to securing a control network lies in meticulous engineering, especially when human lives are at stake. While I won't delve into the specific protection methods in this post, I believe that understanding the various safety aspects and their consequences is a crucial first step. To aid in this, I've compiled a list of informative references below that delve deeper into the topic.

Presentations (YouTube)

Internet References

Supplement: Truck-to-truck Cyber Worm

The CiA (CAN-in-Automation) introduced this paper in their CAN Community News with the remarks:

"Researchers at Colorado State University have evaluated the risk of attacking the CAN-connectable Electronic Logging Devices (ELD) required by a U.S law. They demonstrate that these devices can be wirelessly controlled to send arbitrary Controller Area Network (CAN) frames, enabling unauthorized control over vehicle systems. The second vulnerability demonstrates that malicious firmware can be uploaded to these ELDs, allowing attackers to arbitrarily manipulate data and vehicle operations. The final vulnerability, and perhaps the most concerning, is the potential for a self-propagating truck-to-truck worm, which takes advantage of the inherent networked nature of these devices. Such an attack could lead to widespread disruptions in commercial fleets, with severe safety and operational implications." Download the paper free of charge.

The primary result of their research is that they have found a vulnerability in the ESP32 processor, specifically in the wireless firmware update (OTA). This proves, yet again, the point of my post: CAN is not the weak link.


SAE J1939 Starter Kit And Network Simulator

SAE J1939 Starter Kit and Network Simulator

Our SAE J1939 Starter Kit and Network Simulator is designed to allow the experienced engineer and the beginner to experiment with SAE J1939 data communication without the need to connect to a real-world J1939 network, i.e., a diesel engine. 

To establish a network, you need at least two nodes, which applies especially to CAN/J1939, where the CAN controller will shut down after transmitting data without receiving a response. Therefore, our jCOM.J1939 Starter Kit and Network Simulator consists of two J1939 nodes, namely our jCOM.J1939.USB, an SAE J1939 ECU Simulator Board with USB Port.

More Information...

Automotive Ethernet to CAN Bus Converter For Mobile SAE J1939, ISOBUS Applications

Axiomatic Technologies introduced their AX141530, a CAN-to-Ethernet protocol converter to support automation for mobile applications.The module translates CAN Bus 29-bit extended data frame to Automotive Ethernet (100 Mbit/s) and vice versa. It comes with Power, Link, and Speed LED indicators and an IP67 rating, making the product fitting for harsh environments, such as vibration and water resistance. [...]

Read More »


Higher-Layer Protocol Specifications for CAN XL

The new year will see the release of CAN XL and its implementation into new applications. Additionally, CAN in Automation (CiA) will provide higher-layer protocol (HLP) specifications for CAN XL.Since its introduction, CAN XL, the third generation CAN protocol, was developed to interact with TCP/IP networks. The CAN XL protocol provides a layer management service access point [...]

Read More »


Low-Cost CAN Bus Monitor For Developing And Debugging High-Speed CAN Networks

Controller Area Network (CAN) is a serial network technology that was originally designed for the automotive industry, especially for European cars, but has also become a popular bus in industrial automation as well as other applications. The CAN Bus is primarily used in embedded systems, and as its name implies, is a network technology that provides [...]

Read More »


Controller Area Network (CAN Bus) Tutorial - Higher Layer Protocols

The following is an excerpt from A Comprehensible Controller Area Network by Wilfried Voss. Even though highly influential in automobiles and small applications, the CAN Bus technology alone is not suitable for machine automation since its communication between devices is limited to only 8 bytes. Consequently, higher layer protocols such as CANopen for machine control, DeviceNet for factory [...]

Read More »


Controller Area Network (CAN Bus) Tutorial - CAN Bus Controller Firmware

The following is an excerpt from A Comprehensible Controller Area Network by Wilfried Voss. As demonstrated in the image below, the ISO/OSI Reference Model specifies seven levels beginning with the physical connection to the actual user application, i.e., the Application Layer. The standard CAN implementation bypasses the connection between the Data Link Layer and the Application Layer to [...]

Read More »


Controller Area Network (CAN Bus) Tutorial - Remote Frame

The following is an excerpt from A Comprehensible Controller Area Network by Wilfried Voss. A Remote Frame requests the transmission of a message by another node. The requested data frame, identified by a unique message ID, may be accepted by any number of nodes in the network according to the individual application needs but can only be [...]

Read More »


Controller Area Network (CAN Bus) Tutorial - Dominant And Recessive Bus Level

The following is an excerpt from A Comprehensible Controller Area Network by Wilfried Voss. Before discussing each bit in a CAN Bus frame, it is helpful to briefly examine the physical layer (for more details, refer to Chapter 9—Physical Layer) to understand the nature of, for instance, the SOF (Start of Frame) bit, the RTR (Remote Transmission [...]

Read More »


SAE J1939 vs. CAN Bus - Physical Layer And Higher Layer Protocol (HLP)

To answer the fundamental question upfront: SAE J1939 is a higher-layer protocol (i.e., an add-on software) that uses the CAN Bus technology as a physical layer. In addition to the standard CAN Bus capabilities, SAE J1939 supports node addresses, and it can deliver data frames longer than 8 bytes (in fact, up to 1785 bytes). However, [...]

Read More »


Passive I/Y CAN Bus Repeaters Improve CAN Bus Network Conditions

esd electronics announced their line of passive CAN Bus I- and Y-Repeaters. The I-Repeater improves the node capacity of a CAN Bus network or to insert electrical isolation, while the Y-Repeater creates a branch from one to two CAN Bus lines.All of the repeaters' CAN Bus ports comply with ISO 11898, and each repeater is available without electrical [...]

Read More »