Designing Software for SAE J1939 ECUs to Improve Cybersecurity

2025-01-8082

04/01/2025

Features
Event
WCX SAE World Congress Experience
Authors Abstract
Content
SAE J1939 is a CAN-based standard used for connecting various ECUs together within a vehicle. There are also some related protocols sharing many of the features of SAE J1939 across other industries including ISO11783, RVC and NMEA 2000. The standard has enabled the easy integration of electronic devices into a vehicle. However, as with all CAN-based protocols, several vulnerabilities to cyberattacks have been identified and are discussed in this paper. Many are at the CAN-level, whilst others are in common with those protocols from the SAE J1939 family of protocols. This paper reviews the known vulnerabilities that have been identified with the SAE J1939 protocol at CAN and J1939-levels, along with proposed mitigation strategies that can be implemented in software. At the CAN-level, the weaknesses include ways to spoof the network by exploiting parts of the protocol. Denial of Service is also possible at the CAN-level. At the SAE J1939-level, weaknesses include Denial of Service type attacks, exploiting the transport protocol and address claim features, and leaving the ECU inoperable. Finally, the implementation of covert communication channels using methods based on steganography is discussed. It is highlighted how this can be used as a means of attack and also as a means to protect a network.
Meta TagsDetails
DOI
https://doi.org/10.4271/2025-01-8082
Pages
7
Citation
Quigley, C., "Designing Software for SAE J1939 ECUs to Improve Cybersecurity," SAE Technical Paper 2025-01-8082, 2025, https://doi.org/10.4271/2025-01-8082.
Additional Details
Publisher
Published
Apr 01
Product Code
2025-01-8082
Content Type
Technical Paper
Language
English