Man-in-the-OBD: A modular, protocol agnostic firewall for automotive dongles to enhance privacy and security

10/15/2022
by   Felix Klement, et al.
0

Third-party dongles for cars, e.g. from insurance companies, can extract sensitive data and even send commands to the car via the standardized OBD-II interface. Due to the lack of message authentication mechanisms, this leads to major security vulnerabilities for example regarding the connection with malicious devices. Therefore, we apply a modular, protocol-independent firewall approach by placing a man-in-the-middle between the third-party dongle and the car's OBD-II interface. With this privileged network position, we demonstrate how the data flow accessible through the OBD-II interface can be modified or restricted. We can modify the messages contents or delay the arrival of messages by using our fine-granular configurable rewriting rules, specifically designed to work protocol agnostic. We have implemented our modular approach for a configurable firewall at the OBD-II interface and successfully tested it against third-party dongles available on the market. Thus, our approach enables a security layer to enhance automotive privacy and security of dongle users, which is of high relevance due to missing message authentications on the level of the electronic control units.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
11/15/2017

Security Issues in Controller Area Networks in Automobiles

Modern vehicles may contain a considerable number of ECUs (Electronic Co...
research
11/16/2018

The 5G-AKA Authentication Protocol Privacy

We study the 5G-AKA authentication protocol described in the 5G mobile c...
research
07/13/2021

On SDVS Sender Privacy In The Multi-Party Setting

Strong designated verifier signature schemes rely on sender-privacy to h...
research
11/20/2021

TOUCAN: A proTocol tO secUre Controller Area Network

Modern cars are no longer purely mechanical devices but shelter so much ...
research
10/02/2019

Sensor Networks in Healthcare: Ensuring Confidentiality and User Anonymity in WBAN

Wireless body area network(WBAN) is becoming more popular in recent year...
research
09/02/2021

TLS Beyond the Broker: Enforcing Fine-grained Security and Trust in Publish/Subscribe Environments for IoT

Message queuing brokers are a fundamental building block of the Internet...
research
04/08/2021

Detection of Message Injection Attacks onto the CAN Bus using Similarity of Successive Messages-Sequence Graphs

The smart features of modern cars are enabled by a number of Electronic ...

Please sign up or login with your details

Forgot password? Click here to reset