Skip to main content

Detecting CAN Attacks on J1939 and NMEA 2000 Networks

Matthew Rogers‚ Phillip Weigand‚ Jassim Happa and Kasper Rasmussen

Abstract

J1939 is a networking layer built on top of the widespread CAN bus used for communication between different subsystems within a vehicle. The J1939 and NMEA 2000 protocols standardize data enrichment for these subsystems, and are used for trucks, weapon systems, naval vessels, and other industrial systems. Practical security solutions for existing CAN based communication systems are notoriously difficult because of the lack of cryptographic capabilities of the devices involved. In this paper we propose a novel intrusion detection system (IDS) for J1939 and NMEA 2000 networks. Our IDS (CANDID) combines timing analysis with a packet manipulation detection system and data analysis. This data analysis enables us to capture the state of the vehicle, detect messages with irregular timing intervals, and take advantage of the dependencies between different Electronic Control Units (ECUs) to restrict even the most advanced attacker. Our IDS is deployed and tested on multiple vehicles, and has demonstrated greater accuracy and detection capabilities than previous work.

Journal
IEEE Transactions on Dependable and Secure Computing
Keywords
Timing;Fingerprint recognition;Cruise control;Computer crime;Reverse engineering;Engines;Data analysis;Information security;intrusion detection;land vehicles
Month
May
Number
3
Pages
2406−2420
Volume
20
Year
2023