2020
DOI: 10.1007/s12652-020-02522-w
|View full text |Cite
|
Sign up to set email alerts
|

A new methodology for analyzing vehicle network topologies for critical hacking

Abstract: This study aims to provide a new approach for describing and measuring the vulnerability of in-vehicle networks regarding cyberattacks. Cyberattacks targeting in-vehicle networks can result in a reasonable threat considering passenger safety. Unlike previous literature, the methodology focuses on a comparatively large sample of vehicle networks (114 objects) by proposing a new framework of statistical techniques for measuring, classifying, and modelling in-vehicle networks concerning the changed vulnerability,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 25 publications
(22 reference statements)
1
4
0
Order By: Relevance
“…On the other hand, the 2018 Toyota Avensis has the highest protection score, accordingly, it appears to be the least vulnerable one. Compared to other research studies [5,17,18] that have in some way ranked vulnerability levels of vehicles on the basis of in-vehicle network topology/architecture, it can be seen that similar results were obtained. A well-known remote exploitation experiment [18] has proven how vulnerable the Jeep Cherokee is, and our analytical calculation gave the same result.…”
Section: Main Findings Of the Evaluationsupporting
confidence: 75%
See 2 more Smart Citations
“…On the other hand, the 2018 Toyota Avensis has the highest protection score, accordingly, it appears to be the least vulnerable one. Compared to other research studies [5,17,18] that have in some way ranked vulnerability levels of vehicles on the basis of in-vehicle network topology/architecture, it can be seen that similar results were obtained. A well-known remote exploitation experiment [18] has proven how vulnerable the Jeep Cherokee is, and our analytical calculation gave the same result.…”
Section: Main Findings Of the Evaluationsupporting
confidence: 75%
“…The results of our previous research pointed out that relatively few security levels can be adequate for efficiently characterizing the in-vehicle network's protection level. Based on the performed regression and cluster analyses, three levels are sufficient to rank the vulnerability of the vehicular communication networks [5]. In accordance with this, the typical IVN architecture frequently consists of three or four hierarchy levels: network domains separated by gateways (first level), subdomains handled by domain controllers (second level), and the bottom of the hierarchy tree is mainly built up from subnetworks (third level) [1].…”
Section: Newly Developed Security Level Assessment Methodologymentioning
confidence: 99%
See 1 more Smart Citation
“…The methods presented in this research mainly focused on creating the adjacency matrix from the attack graphs (Ghadi et al, 2020). A similar author also gave a robust report on vulnerability assessment using attack graphs.…”
Section: Literature Reviewmentioning
confidence: 99%
“…At this stage, the connection between cars has become more convenient and fast, and the relationship between vehicles and other external facilities is becoming closer [2]. While this brings more efficiency and speed to people, the security issues of the Internet of Vehicles are also becoming increasingly prominent [3]. Smart cars' systems and terminal devices are vulnerable to attacks, and the service applications and platforms that transmit information between vehicles face different security threats [4].…”
Section: Introductionmentioning
confidence: 99%