{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,20]],"date-time":"2024-09-20T16:49:16Z","timestamp":1726850956313},"reference-count":88,"publisher":"Emerald","issue":"5","license":[{"start":{"date-parts":[[2021,8,12]],"date-time":"2021-08-12T00:00:00Z","timestamp":1628726400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["LHT"],"published-print":{"date-parts":[[2022,11,22]]},"abstract":"Purpose<\/jats:title>Nowadays, connected vehicles are becoming quite complex systems which are made up of different devices. In such a vehicle, there are several electronic control units (ECUs) that represent basic units of computation. These ECUs communicate with each other over the Controller Area Network (CAN) bus protocol which ensures a high communication rate. Even though it is an efficient standard which provides communication for in-vehicle networks, it is prone to various cybersecurity attacks. This paper aims to present a systematic literature review (SLR) which focuses on potential attacks on CAN bus networks. Then, it surveys the solutions proposed to overcome these attacks. In addition, it investigates the validation strategies aiming to check their accuracy and correctness.<\/jats:p><\/jats:sec>Design\/methodology\/approach<\/jats:title>The authors have adopted the SLR methodology to summarize existing research papers that focus on the potential attacks on CAN bus networks. In addition, they compare the selected papers by classifying them according to the adopted validation strategies. They identify also gaps in the existing literature and provide a set of open challenges that can significantly improve the existing works.<\/jats:p><\/jats:sec>Findings<\/jats:title>The study showed that most of the examined papers adopted the simulation as a validation strategy to imitate the system behavior and evaluate a set of performance criteria. Nevertheless, a little consideration has been given to the formal verification of the proposed systems.<\/jats:p><\/jats:sec>Originality\/value<\/jats:title>Unlike the existing surveys, this paper presents the first SLR that identifies local and remote security attacks that can compromise in-vehicle and inter-vehicle communications. Moreover, it compares the reviewed papers while focusing on the used validation strategies.<\/jats:p><\/jats:sec>","DOI":"10.1108\/lht-01-2021-0013","type":"journal-article","created":{"date-parts":[[2021,8,10]],"date-time":"2021-08-10T18:05:12Z","timestamp":1628618712000},"page":"1179-1203","source":"Crossref","is-referenced-by-count":12,"title":["Cybersecurity attacks on CAN bus based vehicles: a review and open challenges"],"prefix":"10.1108","volume":"40","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-4196-0986","authenticated-orcid":false,"given":"Faten","family":"Fakhfakh","sequence":"first","affiliation":[]},{"given":"Mohamed","family":"Tounsi","sequence":"additional","affiliation":[]},{"given":"Mohamed","family":"Mosbah","sequence":"additional","affiliation":[]}],"member":"140","published-online":{"date-parts":[[2021,8,12]]},"reference":[{"key":"key2022112909400455100_ref001","doi-asserted-by":"crossref","first-page":"21266","DOI":"10.1109\/ACCESS.2019.2894183","article-title":"Intrusion detection systems for intra-vehicle networks: a review","volume":"7","year":"2019","journal-title":"IEEE Access"},{"key":"key2022112909400455100_ref002","first-page":"1","article-title":"Securing vehicle ecu communications and stored data","year":"2019"},{"key":"key2022112909400455100_ref003","doi-asserted-by":"crossref","first-page":"127580","DOI":"10.1109\/ACCESS.2019.2937576","article-title":"An intelligent secured framework for cyberattack detection in electric vehicles' can bus using machine learning","volume":"7","year":"2019","journal-title":"IEEE Access"},{"key":"key2022112909400455100_ref004","volume-title":"Principles of Model Checking","year":"2008"},{"issue":"8","key":"key2022112909400455100_ref005","doi-asserted-by":"crossref","first-page":"2364","DOI":"10.3390\/s20082364","article-title":"Evaluation of can bus security challenges","volume":"20","year":"2020","journal-title":"Sensors"},{"issue":"2-3","key":"key2022112909400455100_ref006","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1007\/s10796-007-9029-4","article-title":"Reducing verification effort in component-based software engineering through built-in testing","volume":"9","year":"2007","journal-title":"Information Systems Frontiers"},{"issue":"4","key":"key2022112909400455100_ref007","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1109\/MDAT.2016.2573598","article-title":"Automotive cyber\u2013physical systems: a tutorial introduction","volume":"33","year":"2016","journal-title":"IEEE Design and Test"},{"key":"key2022112909400455100_ref008","first-page":"447","article-title":"Comprehensive experimental analyses of automotive attack surfaces","year":"2011"},{"key":"key2022112909400455100_ref009","article-title":"Smart cities in the 21st century","volume-title":"Technological Forecasting and Social Change","year":"2020"},{"key":"key2022112909400455100_ref010","article-title":"Fiden: intelligent fingerprint learning for attacker identification in the industrial internet of things","year":"2019","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"key2022112909400455100_ref011","first-page":"54","article-title":"Security patterns for automotive systems","year":"2019"},{"key":"key2022112909400455100_ref012","first-page":"911","article-title":"Fingerprinting electronic control units for vehicle intrusion detection","year":"2016"},{"key":"key2022112909400455100_ref013","article-title":"Detecting attacks on the can protocol with machine learning","year":"2016"},{"issue":"8","key":"key2022112909400455100_ref014","doi-asserted-by":"crossref","first-page":"2114","DOI":"10.1109\/TIFS.2018.2812149","article-title":"Voltageids: low-level communication characteristics for automotive intrusion detection system","volume":"13","year":"2018","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"1","key":"key2022112909400455100_ref015","first-page":"198","article-title":"Flexray communications system protocol specification","volume":"2","year":"2005","journal-title":"Version"},{"key":"key2022112909400455100_ref016","first-page":"151","article-title":"The complexity of theorem-proving procedures","year":"1971"},{"key":"key2022112909400455100_ref017","first-page":"414","article-title":"The scyther tool: verification, falsification, and analysis of security protocols","year":"2008"},{"key":"key2022112909400455100_ref018","article-title":"Hashing-based authentication for can bus and application to denial-of-service protection","year":"2019"},{"key":"key2022112909400455100_ref019","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1016\/j.comcom.2018.09.010","article-title":"Security and privacy for innovative automotive applications: a survey","volume":"132","year":"2018","journal-title":"Computer Communications"},{"key":"key2022112909400455100_ref020","article-title":"An overview of attacks and defences on intelligent connected vehicles","year":"2019"},{"key":"key2022112909400455100_ref021","first-page":"100214","article-title":"Cybersecurity challenges in vehicular communications","volume":"23","year":"2019","journal-title":"Vehicular Communications"},{"key":"key2022112909400455100_ref022","first-page":"406","article-title":"Design patterns: abstraction and reuse of object-oriented design","year":"1993"},{"key":"key2022112909400455100_ref023","first-page":"145","article-title":"Toward a honeypot solution for proactive security in vehicular ad hoc networks","volume-title":"Future Information Technology","year":"2014"},{"issue":"6","key":"key2022112909400455100_ref024","first-page":"14721","article-title":"Intrusion detection system using soeks and deep learning for in-vehicle security","volume":"22","year":"2019","journal-title":"Cluster Computing"},{"key":"key2022112909400455100_ref025","first-page":"176","article-title":"An intrusion detection method for securing in-vehicle can bus","year":"2016"},{"key":"key2022112909400455100_ref026","first-page":"158","article-title":"Cryptographic and intrusion detection system for automotive can bus: survey and contributions","year":"2019"},{"key":"key2022112909400455100_ref027","first-page":"288","article-title":"5G technology of mobile communication: a survey","year":"2013"},{"key":"key2022112909400455100_ref028","volume-title":"Deep Learning","year":"2016"},{"key":"key2022112909400455100_ref029","first-page":"462","article-title":"An extended hybrid anomaly detection system for automotive electronic control units communicating via ethernet - efficient and effective analysis using a specification- and machine learning-based approach","year":"2018"},{"issue":"6245","key":"key2022112909400455100_ref030","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1126\/science.aaa8415","article-title":"Machine learning: trends, perspectives, and prospects","volume":"349","year":"2015","journal-title":"Science"},{"issue":"1","key":"key2022112909400455100_ref031","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1016\/j.infsof.2008.09.009","article-title":"Systematic literature reviews in software engineering\u2013a systematic literature review","volume":"51","year":"2009","journal-title":"Information and Software Technology"},{"issue":"5","key":"key2022112909400455100_ref032","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1109\/MM.2018.053631143","article-title":"Hardware-assisted security in electronic control units: secure automotive communications by utilizing one-time-programmable network on chip and firewalls","volume":"38","year":"2018","journal-title":"IEEE Micro"},{"issue":"3 and 4","key":"key2022112909400455100_ref033","article-title":"Recent development and applications of sumo-simulation of urban mobility","volume":"5","year":"2012","journal-title":"International Journal On Advances in Systems and Measurements"},{"issue":"3-4","key":"key2022112909400455100_ref034","first-page":"228","article-title":"Security enhancement in in-vehicle controller area networks by electronic control unit authentication","volume":"22","year":"2019","journal-title":"Science and Technology"},{"key":"key2022112909400455100_ref035","first-page":"1272","article-title":"Most network system supporting full-duplexing communication","year":"2012"},{"key":"key2022112909400455100_ref036","first-page":"1","article-title":"Advanced analytics for connected car cybersecurity","year":"2018"},{"issue":"1","key":"key2022112909400455100_ref037","first-page":"124","article-title":"Toward intelligent vehicular networks: a machine learning framework","volume":"6","year":"2018","journal-title":"IEEE Internet of Things Journal"},{"key":"key2022112909400455100_ref038","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1016\/j.jnca.2018.02.002","article-title":"Location and trajectory privacy preservation in 5g-enabled vehicle social network services","volume":"110","year":"2018","journal-title":"Journal of Network and Computer Applications"},{"key":"key2022112909400455100_ref039","article-title":"Runtime self-protection in a trusted blockchain-inspired ledger","year":"2017"},{"issue":"1","key":"key2022112909400455100_ref040","first-page":"184","article-title":"Intrusion detection system for automotive controller area network (CAN) bus system: a review","year":"2019","journal-title":"EURASIP Journal on Wireless Communications and Networking"},{"key":"key2022112909400455100_ref041","first-page":"1158","article-title":"Leap: a lightweight encryption and authentication protocol for in-vehicle communications","year":"2019"},{"key":"key2022112909400455100_ref042","first-page":"1577","article-title":"Anomaly detection of CAN bus messages through analysis of ID sequences","year":"2017"},{"key":"key2022112909400455100_ref043","first-page":"1","article-title":"A method of preventing unauthorized data transmission in controller area network","year":"2012"},{"key":"key2022112909400455100_ref044","first-page":"432","article-title":"Towards verified handwritten calculational proofs","year":"2018"},{"issue":"2","key":"key2022112909400455100_ref045","first-page":"800","article-title":"Applicability of big data techniques to smart cities deployments","volume":"13","year":"2016","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"3","key":"key2022112909400455100_ref046","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1145\/2983185.2983186","article-title":"Open source model and simulator for real-time performance analysis of automotive network security","volume":"13","year":"2016","journal-title":"ACM Sigbed Review"},{"issue":"2","key":"key2022112909400455100_ref047","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2960407","article-title":"Security in automotive networks: lightweight authentication and authorization","volume":"22","year":"2017","journal-title":"ACM Transactions on Design Automation of Electronic Systems (TODAES)"},{"key":"key2022112909400455100_ref048","first-page":"92","article-title":"A structured approach to anomaly detection for in-vehicle networks","year":"2010"},{"key":"key2022112909400455100_ref049","first-page":"1","article-title":"Obd_securealert: an anomaly detection system for vehicles","year":"2016"},{"key":"key2022112909400455100_ref050","doi-asserted-by":"crossref","first-page":"100201","DOI":"10.1016\/j.vehcom.2019.100201","article-title":"Secmonq: an hsm based security monitoring approach for protecting autosar safety-critical systems","volume":"21","year":"2020","journal-title":"Vehicular Communications"},{"key":"key2022112909400455100_ref051","article-title":"Saiducant: specification-based automotive intrusion detection using controller area network (can) timing","year":"2019","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"key2022112909400455100_ref052","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1016\/j.jisa.2017.08.005","article-title":"Cyber security attacks to modern vehicular systems","volume":"36","year":"2017","journal-title":"Journal of Information Security and Applications"},{"key":"key2022112909400455100_ref053","first-page":"389","article-title":"A honeypot scheme to detect selfish vehicles in vehicular ad-hoc network","volume-title":"Computing and Network Sustainability","year":"2017"},{"key":"key2022112909400455100_ref054","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1016\/j.cose.2013.11.003","article-title":"Towards a distributed secure in-vehicle communication architecture for modern vehicles","volume":"40","year":"2014","journal-title":"Computers and Security"},{"key":"key2022112909400455100_ref055","article-title":"Flexibility, timeliness and efficiency over ethernet","year":"2002"},{"key":"key2022112909400455100_ref056","first-page":"1","article-title":"Protecting an automobile network using distributed firewall system","year":"2017"},{"key":"key2022112909400455100_ref057","first-page":"3382","article-title":"Evolution of local interconnect network (LIN) solutions","year":"2003"},{"key":"key2022112909400455100_ref058","first-page":"1","article-title":"Exploring attack surfaces of voltage-based intrusion detection systems in controller area networks","year":"2018"},{"key":"key2022112909400455100_ref059","first-page":"797","article-title":"Autonomous vehicles and blockchain technology are shaping the future of transportation","year":"2018"},{"key":"key2022112909400455100_ref060","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1016\/j.vehcom.2018.04.005","article-title":"A survey on intrusion detection systems and honeypot based proactive security mechanisms in vanets and vanet cloud","volume":"12","year":"2018","journal-title":"Vehicular Communications"},{"key":"key2022112909400455100_ref061","doi-asserted-by":"crossref","first-page":"53040","DOI":"10.1109\/ACCESS.2019.2912200","article-title":"Review of deep learning algorithms and architectures","volume":"7","year":"2019","journal-title":"IEEE Access"},{"key":"key2022112909400455100_ref062","article-title":"A new type of blockchain for secure message exchange in Vanet","year":"2020","journal-title":"Digital Communications and Networks"},{"key":"key2022112909400455100_ref063","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1016\/j.cose.2017.08.016","article-title":"A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments","volume":"74","year":"2018","journal-title":"Computers and Security"},{"key":"key2022112909400455100_ref064","first-page":"63","article-title":"Intrusion detection system based on the analysis of time intervals of can messages for in-vehicle network","year":"2016"},{"key":"key2022112909400455100_ref065","doi-asserted-by":"crossref","first-page":"100198","DOI":"10.1016\/j.vehcom.2019.100198","article-title":"In-vehicle network intrusion detection using deep convolutional neural network","volume":"21","year":"2020","journal-title":"Vehicular Communications"},{"key":"key2022112909400455100_ref066","first-page":"5","article-title":"Honeypots: tracking hackers","volume-title":"IEEE Network","year":"2003"},{"key":"key2022112909400455100_ref067","volume-title":"Road Vehicles\u2013Controller Area Network (CAN)\u2013part 1: Data Link Layer and Physical Signalling","year":"2003"},{"key":"key2022112909400455100_ref068","first-page":"1","article-title":"Survey on security threats and protection mechanisms in embedded automotive networks","year":"2013"},{"issue":"1","key":"key2022112909400455100_ref069","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1504\/IJES.2018.089430","article-title":"A language-based intrusion detection approach for automotive embedded networks","volume":"10","year":"2018","journal-title":"International Journal of Embedded Systems"},{"issue":"5","key":"key2022112909400455100_ref070","first-page":"1749","article-title":"Analytical exploration of energy savings for parked vehicles to enhance vanet connectivity","volume":"20","year":"2018","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"key":"key2022112909400455100_ref071","doi-asserted-by":"crossref","first-page":"87425","DOI":"10.1109\/ACCESS.2019.2925571","article-title":"Location privacy preservation for mobile users in location-based services","volume":"7","year":"2019","journal-title":"IEEE Access"},{"key":"key2022112909400455100_ref072","first-page":"96","article-title":"Counter attack against the bus-off attack on can","year":"2019"},{"key":"key2022112909400455100_ref073","first-page":"130","article-title":"Anomaly detection in automobile control network data with long short-term memory networks","year":"2016"},{"key":"key2022112909400455100_ref074","first-page":"1","article-title":"An approach to using honeypots in in-vehicle networks","year":"2008"},{"issue":"7","key":"key2022112909400455100_ref075","doi-asserted-by":"crossref","first-page":"2349","DOI":"10.1109\/JPROC.2011.2179630","article-title":"Antennas for global navigation satellite system (GNSS)","volume":"100","year":"2012","journal-title":"Proceedings of Te IEEE"},{"issue":"5","key":"key2022112909400455100_ref076","doi-asserted-by":"crossref","first-page":"3548","DOI":"10.1109\/JIOT.2018.2800281","article-title":"Notsa: novel obu with three-level security architecture for internet of vehicles","volume":"5","year":"2018","journal-title":"IEEE Internet of Things Journal"},{"key":"key2022112909400455100_ref077","first-page":"13","article-title":"Vecure: a practical security framework to protect the can bus of vehicles","year":"2014"},{"key":"key2022112909400455100_ref078","first-page":"1","article-title":"Aspect-oriented modeling of attacks in automotive cyber-physical systems","year":"2014"},{"issue":"2","key":"key2022112909400455100_ref079","first-page":"993","article-title":"A practical wireless attack on the connected car and security protocol for in-vehicle can","volume":"16","year":"2014","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"key":"key2022112909400455100_ref080","doi-asserted-by":"crossref","first-page":"15521","DOI":"10.1109\/ACCESS.2019.2892961","article-title":"Can id shuffling technique (CIST): moving target defense strategy for protecting in-vehicle can","volume":"7","year":"2019","journal-title":"IEEE Access"},{"key":"key2022112909400455100_ref081","article-title":"A survey of intrusion detection for in-vehicle networks","year":"2019","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"issue":"5","key":"key2022112909400455100_ref082","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1504\/IJBIC.2011.042259","article-title":"Bat algorithm for multi-objective optimisation","volume":"3","year":"2011","journal-title":"International Journal of Bio-Inspired Computation"},{"issue":"2","key":"key2022112909400455100_ref083","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1109\/MVT.2018.2811185","article-title":"Machine learning for vehicular networks: recent advances and application examples","volume":"13","year":"2018","journal-title":"IEEE Vehicular Technology Magazine"},{"key":"key2022112909400455100_ref084","first-page":"23","article-title":"Tacan: transmitter authentication through covert channels in controller area networks","year":"2019"},{"issue":"6","key":"key2022112909400455100_ref085","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1109\/MDAT.2019.2899062","article-title":"Survey of automotive controller area network intrusion detection systems","volume":"36","year":"2019","journal-title":"IEEE Design and Test"},{"issue":"3","key":"key2022112909400455100_ref086","doi-asserted-by":"crossref","first-page":"1552","DOI":"10.1109\/COMST.2016.2521642","article-title":"In-vehicle networks outlook: achievements and challenges","volume":"18","year":"2016","journal-title":"IEEE Communications Surveys and Tutorials"},{"key":"key2022112909400455100_ref087","first-page":"1","article-title":"A two-stage deep learning approach for can intrusion detection","year":"2018"},{"key":"key2022112909400455100_ref088","first-page":"1","article-title":"Convince: a cross-layer modeling, exploration and validation framework for next-generation connected vehicles","year":"2016"}],"container-title":["Library Hi Tech"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/LHT-01-2021-0013\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/LHT-01-2021-0013\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,29]],"date-time":"2022-11-29T09:40:34Z","timestamp":1669714834000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/LHT-01-2021-0013\/full\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,12]]},"references-count":88,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2021,8,12]]},"published-print":{"date-parts":[[2022,11,22]]}},"alternative-id":["10.1108\/LHT-01-2021-0013"],"URL":"https:\/\/doi.org\/10.1108\/lht-01-2021-0013","relation":{},"ISSN":["0737-8831"],"issn-type":[{"value":"0737-8831","type":"print"}],"subject":[],"published":{"date-parts":[[2021,8,12]]}}}