Attacks and defences on intelligent connected vehicles: a survey

被引:115
作者
Dibaei, Mahdi [1 ]
Zheng, Xi [1 ]
Jiang, Kun [2 ]
Abbas, Robert [3 ]
Liu, Shigang [4 ]
Zhang, Yuexin [4 ]
Xiang, Yang [4 ]
Yu, Shui [5 ]
机构
[1] Macquarie Univ, Dept Comp, Sydney, NSW, Australia
[2] Tsinghua Univ, China State Key Lab Automot Safety & Energy, Beijing, Peoples R China
[3] Macquarie Univ, Sch Engn, Sydney, NSW, Australia
[4] Swinburne Univ Technol, Sch Software & Elect Engn, Hawthorn, Vic, Australia
[5] Univ Technol Sydney, Sch Software, Sydney, NSW, Australia
关键词
Intelligent vehicles; Vehicular networks; Software vulnerabilities; Deep learning; 3GPP; Software defined; INTRUSION DETECTION SYSTEMS; OF-THE-ART; COMMUNICATIONS PROTOCOL; SECURITY CHALLENGES; STATIC ANALYSIS; PRIVACY; COMMUNICATION; ARCHITECTURE; EFFICIENT; MODEL;
D O I
10.1016/j.dcan.2020.04.007
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Intelligent vehicles are advancing at a fast speed with the improvement of automation and connectivity, which opens up new possibilities for different cyber-attacks, including in-vehicle attacks (e.g., hijacking attacks) and vehicle-to-everything communicationattacks (e.g., data theft). These problems are becoming increasingly serious with the development of 4G LTE and 5G communication technologies. Although many efforts are made to improve the resilience to cyber attacks, there are still many unsolved challenges. This paper first identifies some major security attacks on intelligent connected vehicles. Then, we investigate and summarize the available defences against these attacks and classify them into four categories: cryptography, network security, software vulnerability detection, and malware detection. Remaining challenges and future directions for preventing attacks on intelligent vehicle systems have been discussed as well.
引用
收藏
页码:399 / 421
页数:23
相关论文
共 197 条
[91]   Hybrids of support vector machine wrapper and filter based framework for malware detection [J].
Huda, Shamsul ;
Abawajy, Jemal ;
Alazab, Mamoun ;
Abdollalihian, Mali ;
Islam, Rafiqul ;
Yearwood, John .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 55 :376-390
[92]  
Ji T., 2018, 2018 IEEE 3 INT C DA
[93]   Federalism, Federalism Everywhere [J].
Johnson, Summer .
AMERICAN JOURNAL OF BIOETHICS, 2008, 8 (11) :1-2
[94]   An obstacle detection method by fusion of radar and motion stereo [J].
Kato, T ;
Ninomiya, Y ;
Masaki, I .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2002, 3 (03) :182-188
[95]  
Khurshid S, 2003, LECT NOTES COMPUT SC, V2619, P553
[96]  
Khurshid S., 2010, 11 MOST INT NECT C A, P553
[97]   Low-Latency ECDSA Signature Verification-A Road Toward Safer Traffic [J].
Knezevic, Miroslav ;
Nikov, Ventzislav ;
Rombouts, Peter .
IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2016, 24 (11) :3257-3267
[98]   Can Blockchain Strengthen the Internet of Things? [J].
Kshetri, Nir .
IT PROFESSIONAL, 2017, 19 (04) :68-72
[99]  
Kumar A.D., 2018, ARXIV181004144
[100]   Security in Internet of Things: Challenges, Solutions and Future Directions [J].
Kumar, Sathish Alampalayam ;
Vealey, Tyler ;
Srivastava, Harshit .
PROCEEDINGS OF THE 49TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS 2016), 2016, :5772-5781