Connected Vehicles' Security from the Perspective of the In-Vehicle Network

被引:37
作者
Li, Xiangxue [1 ,2 ]
Yu, Yu [3 ]
Sun, Guannan [1 ,2 ]
Chen, Kefei [4 ,5 ]
机构
[1] East China Normal Univ, Dept Comp Sci & Technol, Shanghai, Peoples R China
[2] Xian Univ Posts & Telecommun, Xian, Shaanxi, Peoples R China
[3] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai, Peoples R China
[4] Hangzhou Normal Univ, Hangzhou, Zhejiang, Peoples R China
[5] Westone Cryptol Res Center, Beijing, Peoples R China
来源
IEEE NETWORK | 2018年 / 32卷 / 03期
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
Safety engineering - Vehicles;
D O I
10.1109/MNET.2018.1700319
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Connected vehicles are generally equipped with many (dozens of, or even hundreds of) electronic and intelligent devices so that drivers can gain a more comfortable driving experience. Despite their numerous benefits, these technological developments have also created serious safety/security concerns. This article recapitulates the diversified attack surfaces of connected vehicles related to the technological developments from the perspective of the in-vehicle network. For each of the attacks, we discuss the rationale and the concrete methods presented in the literature. In particular, we illustrate how to launch successful attacks through the controlled area network (CAN) bus, electronic control units (ECUs), and in-vehicle infotainment system. The article also suggests some feasible solutions to the attacks demonstrated by the community. Considering the fact that vehicles are safety-critical, more practical and effective steps should be taken within the connected vehicle network toward securing connected vehicles and protecting drivers and passengers.
引用
收藏
页码:58 / 63
页数:6
相关论文
共 15 条
[1]  
Checkoway D., 2011, P USENIX SEC S SAN F, P6
[2]  
Foster I., 2015, USENIX WKSP OFF TECH
[3]  
Garzon S., 2012, INT C INT ENV
[4]  
Golde N., 2012, NDSS
[5]  
Groza B., 2012, CRYPTOLOGY NETWORK S
[6]  
Kleberger P., 2011, INT VEH S IV
[7]   ENGINEERING SEARCHABLE ENCRYPTION OF MOBILE CLOUD NETWORKS: WHEN QOE MEETS QOP [J].
Li, Hongwei ;
Liu, Dongxiao ;
Dai, Yuanshun ;
Luan, Tom H. .
IEEE WIRELESS COMMUNICATIONS, 2015, 22 (04) :74-80
[8]  
Miller C., 2015, BLACKHAT US
[9]  
Miller C., 2013, DEF C 21 HACK C
[10]  
Miller Charlie, 2014, BLACK HAT US