Exploring the consequences of cyber attacks on Powertrain Cyber Physical Systems

  • Dario Stabili
  • , Raffaele Romagnoli
  • , Mirco Marchetti
  • , Bruno Sinopoli
  • , Michele Colajanni

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

This paper proposes a novel approach for the study of cyber-attacks against the powertrain of a generic vehicle. The proposed model is composed of a generic Internal Combustion engine and a speed controller, that communicate through a Controller Area Network (CAN) bus. We consider a threat model composed of three representative attack scenarios designed to modify the output of the model, thus affecting the rotational speed of the engine. Two attack scenarios target both vehicle sensor systems and CAN communication, while one attack scenario only requires injection of CAN messages. To the best of our knowledge, this is the first attempt of modeling the consequences of realistic cyber attacks against a modern vehicle.

Original languageEnglish
Title of host publicationProceedings - 2022 International Conference on Control, Robotics and Informatics, ICCRI 2022
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages96-103
Number of pages8
ISBN (Electronic)9781665468008
DOIs
StatePublished - 2022
Event5th International Conference on Control, Robotics and Informatics, ICCRI 2022 - Danang, Viet Nam
Duration: Apr 2 2022Apr 4 2022

Publication series

NameProceedings - 2022 International Conference on Control, Robotics and Informatics, ICCRI 2022

Conference

Conference5th International Conference on Control, Robotics and Informatics, ICCRI 2022
Country/TerritoryViet Nam
CityDanang
Period04/2/2204/4/22

Keywords

  • control system.
  • controller area network
  • cyber attacks
  • cyber-physical systems
  • powertrain

Fingerprint

Dive into the research topics of 'Exploring the consequences of cyber attacks on Powertrain Cyber Physical Systems'. Together they form a unique fingerprint.

Cite this