A Mathematical Modeling of Stuxnet-Style Autonomous Vehicle Malware

被引:11
作者
Ahn, Haesung [1 ]
Choi, Juyeong [2 ]
Kim, Yong Hoon [1 ]
机构
[1] Univ Windsor, Civil & Environm Engn Dept, Windsor, ON N9B 3P4, Canada
[2] FAMU FSU Coll Engn, Civil & Environm Engn Dept, Tallahassee, FL 32310 USA
基金
加拿大自然科学与工程研究理事会;
关键词
Autonomous vehicles; cybersecurity; epidemic model; malaria; mechanic shop; OBD-II; Stuxnet; vector-host model; CONNECTED VEHICLES; PROPAGATION; INFORMATION;
D O I
10.1109/TITS.2022.3213771
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
Autonomous vehicles (AVs) have the potential to provide new paradigms to enhance the safety, mobility, and environmental sustainability of surface transportation. However, as vehicles become more computerized and internally interconnected by electronic control systems, their vulnerability to cyber-attacks is a fast-growing concern and a national priority. Evidence from the Internet virus suggests that AVs will have critical challenges posed by epidemic-style malware like Stuxnet. This self-propagating malware is a fast and powerful way of disrupting the AV system and transportation infrastructure. This study presents a mathematical model for Stuxnet-style malware's temporal and spatial spread. Taking cues from the field of epidemiology and ecology, the malware will be described as an infectious epidemic to capture the dynamics of temporal and spatial propagation behavior. This study is the first attempt to analyze the spread of Stuxnet-style malware on AVs. The future uses of such a model for the temporal-geographic spread of AVs-based infectious malware are discussed.
引用
收藏
页码:673 / 683
页数:11
相关论文
共 45 条
[1]   Security Vulnerabilities of Connected Vehicle Streams and Their Impact on Cooperative Driving [J].
Amoozadeh, Mani ;
Raghuramu, Arun ;
Chuah, Chen-Nee ;
Ghosal, Dipak ;
Zhang, H. Michael ;
Rowe, Jeff ;
Levitt, Karl .
IEEE COMMUNICATIONS MAGAZINE, 2015, 53 (06) :126-132
[2]  
[Anonymous], FREQUENTLY ASKED QUE
[3]  
[Anonymous], PUBLIC PROPERTY INQU
[4]  
Car Care Guide, US
[5]  
Charette R., 2010, IEEE Spectrum
[6]  
Checkoway S., 2011, 20 USENIX SEC S AUG, P77
[7]   Lessons from Stuxnet [J].
Chen, Thomas M. ;
Abu-Nimeh, Saeed .
COMPUTER, 2011, 44 (04) :91-93
[8]  
Corrigan S., 2002, Introduction to the controller area network (CAN)
[9]  
Falliere Nicolas., 2011, W32. stuxnet dossier
[10]   Stuxnet and the Future of Cyber War [J].
Farwell, James P. ;
Rohozinski, Rafal .
SURVIVAL, 2011, 53 (01) :23-40