Attacks and defences on intelligent connected vehicles: a survey

被引:115
作者
Dibaei, Mahdi [1 ]
Zheng, Xi [1 ]
Jiang, Kun [2 ]
Abbas, Robert [3 ]
Liu, Shigang [4 ]
Zhang, Yuexin [4 ]
Xiang, Yang [4 ]
Yu, Shui [5 ]
机构
[1] Macquarie Univ, Dept Comp, Sydney, NSW, Australia
[2] Tsinghua Univ, China State Key Lab Automot Safety & Energy, Beijing, Peoples R China
[3] Macquarie Univ, Sch Engn, Sydney, NSW, Australia
[4] Swinburne Univ Technol, Sch Software & Elect Engn, Hawthorn, Vic, Australia
[5] Univ Technol Sydney, Sch Software, Sydney, NSW, Australia
关键词
Intelligent vehicles; Vehicular networks; Software vulnerabilities; Deep learning; 3GPP; Software defined; INTRUSION DETECTION SYSTEMS; OF-THE-ART; COMMUNICATIONS PROTOCOL; SECURITY CHALLENGES; STATIC ANALYSIS; PRIVACY; COMMUNICATION; ARCHITECTURE; EFFICIENT; MODEL;
D O I
10.1016/j.dcan.2020.04.007
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Intelligent vehicles are advancing at a fast speed with the improvement of automation and connectivity, which opens up new possibilities for different cyber-attacks, including in-vehicle attacks (e.g., hijacking attacks) and vehicle-to-everything communicationattacks (e.g., data theft). These problems are becoming increasingly serious with the development of 4G LTE and 5G communication technologies. Although many efforts are made to improve the resilience to cyber attacks, there are still many unsolved challenges. This paper first identifies some major security attacks on intelligent connected vehicles. Then, we investigate and summarize the available defences against these attacks and classify them into four categories: cryptography, network security, software vulnerability detection, and malware detection. Remaining challenges and future directions for preventing attacks on intelligent vehicle systems have been discussed as well.
引用
收藏
页码:399 / 421
页数:23
相关论文
共 197 条
[1]  
3GPP, 2018, 33185 3GPP, V16
[2]  
3GPP, 2018, 3318516 3GPP
[3]  
Abadi M., 2005, P ACM C COMP COMM SE
[4]  
Afsin ME, 2017, INT SYM IND EMBED, P73
[5]  
Al Abdulsalam N, 2015, 2015 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY RESEARCH (ICTRC), P136, DOI 10.1109/ICTRC.2015.7156440
[6]  
Al-kahtani MohammedSaeed., 2012, Signal Processing and Communication Systems (ICSPCS), 2012 6th International Conference on, P1
[7]   KEY EXCHANGE USING KEYLESS CRYPTOGRAPHY [J].
ALPERN, B ;
SCHNEIDER, FB .
INFORMATION PROCESSING LETTERS, 1983, 16 (02) :79-81
[8]  
Alston A., CORR
[9]  
Aly S., 2017, TECH REP
[10]   Security Vulnerabilities of Connected Vehicle Streams and Their Impact on Cooperative Driving [J].
Amoozadeh, Mani ;
Raghuramu, Arun ;
Chuah, Chen-Nee ;
Ghosal, Dipak ;
Zhang, H. Michael ;
Rowe, Jeff ;
Levitt, Karl .
IEEE COMMUNICATIONS MAGAZINE, 2015, 53 (06) :126-132