This content is not included in your SAE MOBILUS subscription, or you are not logged in.

Towards a Cyber Assurance Testbed for Heavy Vehicle Electronic Controls

Journal Article
ISSN: 1946-391X, e-ISSN: 1946-3928
Published September 27, 2016 by SAE International in United States
Towards a Cyber Assurance Testbed for Heavy Vehicle Electronic Controls
Citation: Daily, J., Gamble, R., Moffitt, S., Raines, C. et al., "Towards a Cyber Assurance Testbed for Heavy Vehicle Electronic Controls," SAE Int. J. Commer. Veh. 9(2):339-349, 2016,
Language: English


Cyber assurance of heavy trucks is a major concern with new designs as well as with supporting legacy systems. Many cyber security experts and analysts are used to working with traditional information technology (IT) networks and are familiar with a set of technologies that may not be directly useful in the commercial vehicle sector. To help connect security researchers to heavy trucks, a remotely accessible testbed has been prototyped for experimentation with security methodologies and techniques to evaluate and improve on existing technologies, as well as developing domain-specific technologies. The testbed relies on embedded Linux-based node controllers that can simulate the sensor inputs to various heavy vehicle electronic control units (ECUs). The node controller also monitors and affects the flow of network information between the ECUs and the vehicle communications backbone. For example, a node controller acts as a clone that generates analog wheel speed sensor data while at the same time monitors or controls the network traffic on the J1939 and J1708 networks. The architecture and functions of the node controllers are detailed. Sample interaction with the testbed is illustrated, along with a discussion of the challenges of running remote experiments. Incorporating high fidelity hardware in the testbed enables security researchers to advance the state of the art in hardening heavy vehicle ECUs against cyber-attacks. How the testbed can be used for security research is presented along with an example of its use in evaluating seed/key exchange strength and in intrusion detection systems (IDSs).