moridin2002
Member
I'm surprised they don't do that already.
In addition to encryption, each device can also be upgraded to digitally sign each CAN packet, and the receiver can verify the digital signature. Injecting packets onto the bus then becomes impossible, as you won't have the signing key.
Without revealing too much info, I have first-hand knowledge of a hackable system that was heavily exploited by hackers in the early 2000's. Encryption, digital signatures, ROM checksums, and dynamically-changing executable code was used by the designers of the system to make the hacking impossible. By 2004, this system was no longer hackable, and remains secure to this day. Tesla can easily duplicate these efforts if they desire.
Not trying to probe too much, but was that system operating over CAN? I only ask, because I'm curious how that would work within the confines of CAN data package standards.