TSP SECURITY IN INTELLIGENT AND CONNECTED VEHICLES: CHALLENGES AND SOLUTIONS

被引:62
作者
Li, Yansong [1 ]
Luo, Qian [1 ]
Liu, Jiajia [1 ]
Guo, Hongzhi [1 ]
Kato, Nei [2 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian, Shaanxi, Peoples R China
[2] Tohoku Univ, GSIS, Sendai, Miyagi, Japan
基金
中国国家自然科学基金;
关键词
5G mobile communication systems - Security systems - Metadata - Vehicle to vehicle communications;
D O I
10.1109/MWC.2019.1800289
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid development of IoT, cloud computing, Artificial Intelligence (AI), big data, and 5G technologies has promoted the transformation of traditional vehicles toward ICVs. Compared to traditional vehicles, ICVs face many security threats introduced by network technologies and intelligent devices, especially in the field of remote wireless communications using Telematics Service Provider (TSP). As the core communication system in ICVs, TSP integrates diverse communication systems, and thus inherits the original vulnerabilities of these systems inevitably. TSP provides various methods for the ICVs to access the Internet, which makes them vulnerable to remote attacks. However, existing auto manufacturers mostly focused on the user experiences of the ICVs, and paid little attention to these potential security risks raised by TSP. Toward this end, in this article we analyze and summarize the TSP security threats in ICVs, and present some attack methodologies. After that, we discuss a practical attack case against an ICV by leveraging the vulnerabilities of TSP, and some countermeasures are proposed to enhance ICV security against TSP attacks.
引用
收藏
页码:125 / 131
页数:7
相关论文
共 14 条
  • [1] [Anonymous], 2011, P USENIX SEC S
  • [2] Atya A.O.F., 2017, IEEE Conference on Computer Communications, INFOCOM'17, P1
  • [3] Foster I., 2015, P USENIX WORKSH OFF
  • [4] Garip M. T., 2015, P NDSS
  • [5] Georgiev Martin, 2012, Proceedings of the 2012 ACM conference on Computer and communications security - CCS'12, page, P38, DOI 10.1145/2382196.2382204
  • [6] Security Challenges in Vehicular Cloud Computing
    Yan, Gongjun
    Wen, Ding
    Olariu, Stephan
    Weigle, Michele C.
    [J]. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2013, 14 (01) : 284 - 294
  • [7] Practical Timing Side Channel Attacks Against Kernel Space ASLR
    Hund, Ralf
    Willems, Carsten
    Holz, Thorsten
    [J]. 2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2013, : 191 - 205
  • [8] A High-Resolution Side-Channel Attack on Last-Level Cache
    Kayaalp, Mehmet
    Abu-Ghazaleh, Nael
    Ponomarev, Dmitry
    Jaleel, Aamer
    [J]. 2016 ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2016,
  • [9] Man in the Cloud (MITC) Defender: SGX-based User Credential Protection for Synchronization applications in Cloud Computing Platform
    Liang, Xueping
    Shetty, Sachin
    Zhang, Lingchen
    Kamhoua, Charles
    Kwiat, Kevin
    [J]. 2017 IEEE 10TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2017, : 302 - 309
  • [10] Miller C., 2015, REMOTE EXPLOITATION