This content is not included in your SAE MOBILUS subscription, or you are not logged in.

Real-Time Network Defense of SAE J1939 Address Claim Attacks

Journal Article
02-14-03-0026
ISSN: 1946-391X, e-ISSN: 1946-3928
Published August 30, 2021 by SAE International in United States
Real-Time Network Defense of SAE J1939 Address Claim Attacks
Citation: Campo, M., Mukherjee, S., and Daily, J., "Real-Time Network Defense of SAE J1939 Address Claim Attacks," SAE Int. J. Commer. Veh. 14(3):319-328, 2021, https://doi.org/10.4271/02-14-03-0026.
Language: English

Abstract:

Heavy vehicles are essential for the modern economy, delivering critical food, supplies, and freight throughout the world. Connected heavy vehicles are also driven by embedded computers that utilize internal communication using common standards. However, some implementations of the standards leave an opening for a malicious actor to abuse the system. One such abuse case is a cyber-attack known as the “Address Claim Attack.” Proposed in 2018, this attack uses a single network message to disable all communication to and from a target electronic control unit, which may have a detrimental effect on operating the vehicle. This article demonstrates the viability of the attack and then describes the implementation of a solution to prevent this attack in real time without requiring any intervention from the manufacturer of the target devices. The defense technique uses a bit-banged Controller Area Network (CAN) filter to detect the attack. Once an attack is discovered, the defender induces a CAN protocol error to remove the malicious message from the network. We discuss our results in terms of their applicability for Address Claim Attacks and possible implications for preventing a variety of network-based attacks in real time.