Investigation into In-Vehicle Information Security

Article Preview

Abstract:

Along with the penetration of in-vehicle intelligent devices, the in-vehicle networks are changed from a closed environment to an open environment, and thus the concern of in-vehicle information security becomes increasingly prominent. In this paper, we analyzed the damages of in-vehicle information insecurity, studied the corresponding defense requirements, and summarized the applicable analytical methods. Based on the demands for in-vehicle information security, we analyzed the corresponding defenses, and summarized the defense approaches for in-vehicle networks and in-vehicle field-bus information security.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

273-278

Citation:

Online since:

July 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Koscher, K. ; Czeskis, A. ; Roesner, F. ; Patel, S. ; Kohno, T. ; Checkoway, S. ; McCoy, D. ; Kantor, B. ; Anderson, D. ; Shacham, H. ; Savage, S. Experimental Security Analysis of a Modern Automobile. Security and Privacy (SP), 2010 IEEE Symposium on Digital Object Identifier: 10. 1109/SP. 2010, Page(s): 447 – 462.

DOI: 10.1109/sp.2010.34

Google Scholar

[2] I. Rouf, R. Miller, H. Mustafa, T. Taylor, S. Oh, W. Xu et al. Security and privacy vulnerabilities of in-car wireless networks: a tire pressure monitoring system case study, in 19th USENIX Security, (2010).

Google Scholar

[3] A. Francillon, B. Danev, and S. Capkun. Relay attacks on passive keyless entry and start systems in modern cars. In A. Perrig, editor, NDSS 2011. ISOC, Feb. (2011).

Google Scholar

[4] Dr. Charlie Miller ; Chris Valasek. Adventures in Automotive Networks and Control Units.

Google Scholar

[5] Chavez ML, Rosete CH, Henriguez FR. Security and privacy vulnerabilities of in-car wireless networks: a tire pressure monitoring system case study. In: Proceedings of the 15thInternational conference on electronics, communications and computers (CONIELECOMP) 2005. pp.166-70.

Google Scholar

[6] Weimerskirch A, Paar C, Wolf M. Secure in-vehicle communication. In: Lemke K, Paar C, Wolf M, editors. Embedded security in cars. Springer-Verlag; (2006).

DOI: 10.1007/3-540-28428-1_6

Google Scholar

[7] Szilagyi C, Koopman P. A flexible approach to embedded network multicast authentication. In: 2nd Workshop on embedded systems security (WESS) 2008. pp.165-74.

Google Scholar

[8] Szilagyi C, Koopman P. Flexible multicast authentication for time-triggered embedded control network applications in dependable systems networks. In: IEEE/IFIP Int Conf on dependable systems networks 2009. pp.165-74.

DOI: 10.1109/dsn.2009.5270342

Google Scholar

[9] Groll A, Ruland C. Secure and authentic communication on existing in-vehicle networks. In: Proceedings of the IEEE Intelligent vehicles symposium 2009. pp.1093-7.

DOI: 10.1109/ivs.2009.5164434

Google Scholar