Aviation Industry
The aviation industry, commercial and
defense, also relies on CAN Bus protocols
to interconnect the engine, navigations,
flight controls, control surface
actuations, radar, and other avionic
units. As ground vehicles, the
cybersecurity in avionic CAN-Bus
communications can be originated from
external cyber-attacks or inherited from
internal vulnerabilities (e.g., embedded
malicious code). In 2016, a cybersecurity
researcher shows the hack into a
commercial aircraft and gain access to the
avionics to disrupt the control. In 2019,
it was reported that Boeing had discovered
a cybersecurity vulnerability in its 787
Dreamliner aircraft that could potentially
allow a hacker to access the aircraft’s
critical systems.
In 2019, the Department of Homeland
Security (DHS) and the Cybersecurity and
Infrastructure Security Agency (CISA) have
warned of insecure CAN bus network
implementations affecting aircraft where
engine telemetry readings, compass and
attitude data, altitude, airspeeds, and
angle of attack could all be manipulated
to provide false measurements to the
pilot. These falsified readings could
cause the pilot to lose control of the
aircraft. VehChain can be adapted to
encrypt CAN messages on aircraft to
mitigate an attack of this nature from
taking place.