Cybersecurity Research Considerations for Heavy Vehicles
Total Page:16
File Type:pdf, Size:1020Kb
DOT HS 812 636 December 2018 Cybersecurity Research Considerations for Heavy Vehicles Disclaimer This publication is distributed by the U.S. Department of Transportation, National Highway Traffic Safety Administration, in the interest of information exchange. The opinions, findings, and conclusions expressed in this publication are those of the authors and not necessarily those of the Department of Transportation or the National Highway Traffic Safety Administration. The United States Government assumes no liability for its contents or use thereof. If trade or manufacturers’ names are mentioned, it is only because they are considered essential to the object of the publication and should not be construed as an endorsement. The United States Gov- ernment does not endorse products or manufacturers. Suggested APA Format Citation: Stachowski, S., Bielawski, R., & Weimerskirch, A. (2018, December). Cybersecurity research considerations for heavy vehicles (Report No. DOT HS 812 636). Washington, DC: National Highway Traffic Safety Administration. 1. Report No. 2. Government Accession No. 3. Recipient's Catalog No. DOT HS 812 636 4. Title and Subtitle 5. Report Date Cybersecurity Research Considerations for Heavy Vehicles December 2018 6. Performing Organization Code 7. Authors 8. Performing Organization Report No. Stephen Stachowski, P.E. (UMTRI), Russ Bielawski (UMTRI), André Weimerskirch 9. Performing Organization Name and Address 10. Work Unit No. (TRAIS) University of Michigan Transportation Research Institute 2901 Baxter Rd Ann Arbor, MI 48109 11. Contract or Grant No. DTNH22-15-R-00101, a Vehicle Electronics Systems Safety IDIQ 12. Sponsoring Agency Name and Address 13. Type of Report and Period Covered National Highway Traffic Safety Administration Final Report 1200 New Jersey Avenue SE. 14. Sponsoring Agency Code Washington, DC 20590 15. Supplementary Notes Laura Gillespie was the Contracting Office Representative for this report. 16. Abstract The intent of this research is to investigate cybersecurity aspects of medium-duty/heavy-duty (MD/HD) trucks (classes 1 to 8) and compare those aspects to passenger vehicles. Information collected had a significant bias to- wards HD vehicles (class 7/8), as opposed to MD vehicles. This was due to the discovery process yielding very limited data on MD vehicles (class 3 to 6). This directly correlates to the types of responses provided by industry experts and their cybersecurity concerns (mainly by heavy truck OEMs and suppliers). Much focus was centered around their higher electronic content products that typically occur on class 7/8 vehicle platforms. Often, stake- holder feedback indicated that MD trucks have similar vulnerabilities to either light-duty or heavy-duty trucks but not necessarily anything particularly unique to that segment. This generality likely originates from the simi- larities between MD truck architectures/designs and HD truck architectures. The objective is to develop a frame- work to understand common features and differences between passenger vehicle and heavy-duty vehicle cyber- security in terms of lifecycle, threats and risks, electrical/electronic architectures, control applications, security countermeasures, and industry aspects. Considering recent public awareness of passenger vehicle cybersecurity vulnerabilities, NHTSA undertook this research to understand potential impacts in the heavy-truck vehicle do- main. This task started with the investigation of heavy-vehicle cybersecurity practices by contrasting the passen- ger vehicle cybersecurity knowledge-base to that of heavy vehicles. The project next considered risks in a more generic manner, and identified possible mitigation mechanisms. The comparison framework developed in this document was leveraged to help indemnify the possible mitigation mechanisms. The investigation and data gath- ering concentrated efforts on issues that affect vehicle safety, but not necessarily asset protection. 17. Key Words 18. Distribution Statement Driver Document is available to the public from the National Technical Information Service www.ntis.gov. 19. Security Classif. (of this report) 20. Security Classif. (of this page) 21. No. of Pages 22. Price Unclassified Unclassified 112 i Table of Contents Glossary ..........................................................................................................................................v 1. Executive Summary .................................................................................................................1 1.1 Key Findings .....................................................................................................................1 1.2 Conclusions .......................................................................................................................4 1.3 Prologue ............................................................................................................................4 2. Introduction: Develop a Comparison Framework (Task 2) ................................................5 2.1 Information Collection Methodology ...............................................................................5 2.2 Relevant Standards: SAE J1939: Serial Control & Communications Heavy-Duty Vehicle Network ..........................................................................................6 2.3 Comparison Framework Overview ...................................................................................9 2.4 Comparison Framework Categories ...............................................................................11 2.4.1 Truck Classification ............................................................................................11 2.4.2 Communication Bus Communications Protocols ...............................................14 2.4.3 Electronics Architecture......................................................................................15 2.4.4 Communication Interfaces ..................................................................................18 2.4.5 Control Systems Impacting Vehicle Dynamics ..................................................19 2.4.6 Privacy ................................................................................................................20 2.4.7 Fleet Management ...............................................................................................20 2.4.8 Private and Commercial Sector ..........................................................................20 2.4.9 Customer Demands .............................................................................................21 2.4.10 Hardware Interoperability ...................................................................................21 2.4.11 Organizational Structure .....................................................................................21 2.4.12 Development Process ..........................................................................................22 2.4.13 Federal Compliance ............................................................................................22 2.4.14 Future Applications .............................................................................................22 2.5 Conclusion: Develop a Comparison Framework (Task 2) .............................................23 3. Introduction: Compile a Body of Findings (Task 3) ...........................................................25 3.1 Information Collection Methodology .............................................................................25 3.1.1 Interviews ............................................................................................................25 3.1.2 Internal expertise .................................................................................................25 3.1.3 Literature review .................................................................................................25 3.2 Technical Standards review ............................................................................................26 3.3 Literature Review: Passenger Vehicle Domain ............................................................26 3.3.1 Comprehensive Experimental Analyses of Automotive Attack Surfaces ..........26 3.3.2 Adventures in Automotive Networks and Control Units ....................................27 3.3.3 Remote Exploitation of an Unaltered Passenger Vehicle ...................................27 3.3.4 Remote Control Automobiles .............................................................................27 3.3.5 Fast and Vulnerable: A Story of Telematics Failures .........................................28 3.3.6 OwnStar Attack on OnStar .................................................................................28 3.4 Compile a Body of Findings - Framework Overview ....................................................28 ii 3.5 Potential Threat Vectors – Wired ...................................................................................32 3.5.1 Diagnostic Connector..........................................................................................32 3.5.2 USB Ports, CD Drives, SD Cards, and Auxiliary Audio Inputs .........................34 3.5.3 12-Volt Accessory Outlet ...................................................................................36 3.5.4 Body Builder Interface ........................................................................................36 3.5.5 Trailer Power Line Communication (PLC-J2497) .............................................36