How is it possible to hack a vehicle?
There are many vulnerabilities that could be exploited to launch cyber attacks on vehicles.
One example attack is to exploit the vulnerabilities of the controller area network (CAN) and OBD-2 port. CAN is the main backbone in-vehicle network, which does not have any encryption or authentication mechanism embedded.
Many cheap CAN loggers are available to record the communication and even replay CAN frames. Now the question is how can we connect these loggers to vehicles? There are two ways:
- We physically connect the CAN logger through the OBD-2 port, which has been left open for everyone by law for vehicle diagnostic purposes
- We connect the CAN logger remotely – for example, this could be achieved by taking control of the infotainment system
© Coventry University. CC BY-NC 4.0