ReCAN – Dataset for reverse engineering of Controller Area Networks

This article details the methodology and the approach used to extract and decode the data obtained from the Controller Area Network (CAN) buses in two personal vehicles and three commercial trucks for a total of 36 million data frames. The dataset is composed of two complementary parts, namely the r...

Full description

Bibliographic Details
Main Authors: Mattia Zago, Stefano Longari, Andrea Tricarico, Michele Carminati, Manuel Gil Pérez, Gregorio Martínez Pérez, Stefano Zanero
Format: Article
Language:English
Published: Elsevier 2020-04-01
Series:Data in Brief
Online Access:http://www.sciencedirect.com/science/article/pii/S2352340920300433
id doaj-9f642e88da67474dbacc728a5067d78a
record_format Article
spelling doaj-9f642e88da67474dbacc728a5067d78a2020-11-25T02:44:17ZengElsevierData in Brief2352-34092020-04-0129ReCAN – Dataset for reverse engineering of Controller Area NetworksMattia Zago0Stefano Longari1Andrea Tricarico2Michele Carminati3Manuel Gil Pérez4Gregorio Martínez Pérez5Stefano Zanero6Department of Information Engineering and Communications, University of Murcia, Murcia, Spain; Corresponding author.Dipartimento di Elettronica, Informazione e Bioingegneria, Politecnico di Milano, Milan, ItalyDipartimento di Elettronica, Informazione e Bioingegneria, Politecnico di Milano, Milan, ItalyDipartimento di Elettronica, Informazione e Bioingegneria, Politecnico di Milano, Milan, ItalyDepartment of Information Engineering and Communications, University of Murcia, Murcia, SpainDepartment of Information Engineering and Communications, University of Murcia, Murcia, SpainDipartimento di Elettronica, Informazione e Bioingegneria, Politecnico di Milano, Milan, ItalyThis article details the methodology and the approach used to extract and decode the data obtained from the Controller Area Network (CAN) buses in two personal vehicles and three commercial trucks for a total of 36 million data frames. The dataset is composed of two complementary parts, namely the raw data and the decoded ones. Along with the description of the data, this article also reports both hardware and software requirements to first extract the data from the vehicles and secondly decode the binary data frames to obtain the actual sensors’ data. Finally, to enable analysis reproducibility and future researches, the code snippets that have been described in pseudo-code will be publicly available in a code repository. Motivated enough actors may intercept, interact, and recognize the vehicle data with consumer-grade technology, ultimately refuting, once-again, the security-through-obscurity paradigm used by the automotive manufacturer as a primary defensive countermeasure. Keywords: Automotive, Controller area network (CAN), Reverse engineering, Datasethttp://www.sciencedirect.com/science/article/pii/S2352340920300433
collection DOAJ
language English
format Article
sources DOAJ
author Mattia Zago
Stefano Longari
Andrea Tricarico
Michele Carminati
Manuel Gil Pérez
Gregorio Martínez Pérez
Stefano Zanero
spellingShingle Mattia Zago
Stefano Longari
Andrea Tricarico
Michele Carminati
Manuel Gil Pérez
Gregorio Martínez Pérez
Stefano Zanero
ReCAN – Dataset for reverse engineering of Controller Area Networks
Data in Brief
author_facet Mattia Zago
Stefano Longari
Andrea Tricarico
Michele Carminati
Manuel Gil Pérez
Gregorio Martínez Pérez
Stefano Zanero
author_sort Mattia Zago
title ReCAN – Dataset for reverse engineering of Controller Area Networks
title_short ReCAN – Dataset for reverse engineering of Controller Area Networks
title_full ReCAN – Dataset for reverse engineering of Controller Area Networks
title_fullStr ReCAN – Dataset for reverse engineering of Controller Area Networks
title_full_unstemmed ReCAN – Dataset for reverse engineering of Controller Area Networks
title_sort recan – dataset for reverse engineering of controller area networks
publisher Elsevier
series Data in Brief
issn 2352-3409
publishDate 2020-04-01
description This article details the methodology and the approach used to extract and decode the data obtained from the Controller Area Network (CAN) buses in two personal vehicles and three commercial trucks for a total of 36 million data frames. The dataset is composed of two complementary parts, namely the raw data and the decoded ones. Along with the description of the data, this article also reports both hardware and software requirements to first extract the data from the vehicles and secondly decode the binary data frames to obtain the actual sensors’ data. Finally, to enable analysis reproducibility and future researches, the code snippets that have been described in pseudo-code will be publicly available in a code repository. Motivated enough actors may intercept, interact, and recognize the vehicle data with consumer-grade technology, ultimately refuting, once-again, the security-through-obscurity paradigm used by the automotive manufacturer as a primary defensive countermeasure. Keywords: Automotive, Controller area network (CAN), Reverse engineering, Dataset
url http://www.sciencedirect.com/science/article/pii/S2352340920300433
work_keys_str_mv AT mattiazago recandatasetforreverseengineeringofcontrollerareanetworks
AT stefanolongari recandatasetforreverseengineeringofcontrollerareanetworks
AT andreatricarico recandatasetforreverseengineeringofcontrollerareanetworks
AT michelecarminati recandatasetforreverseengineeringofcontrollerareanetworks
AT manuelgilperez recandatasetforreverseengineeringofcontrollerareanetworks
AT gregoriomartinezperez recandatasetforreverseengineeringofcontrollerareanetworks
AT stefanozanero recandatasetforreverseengineeringofcontrollerareanetworks
_version_ 1724766604119506944