2019
DOI: 10.1016/j.adhoc.2018.10.002
|View full text |Cite
|
Sign up to set email alerts
|

A taxonomy and survey of cyber-physical intrusion detection approaches for vehicles

Abstract: With the growing threat of cyber and cyber-physical attacks against automobiles, drones, ships, driverless pods and other vehicles, there is also a growing need for intrusion detection approaches that can facilitate defence against such threats. Vehicles tend to have limited processing resources and are energy-constrained. So, any security provision needs to abide by these limitations. At the same time, attacks against vehicles are very rare, often making knowledge-based intrusion detection systems less practi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
31
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
3
2

Relationship

1
9

Authors

Journals

citations
Cited by 98 publications
(44 citation statements)
references
References 84 publications
0
31
0
Order By: Relevance
“…In these methods, the packet transmitted through tunnels are received rather promptly or with less hop counts compared to ordinary packets, which are transmitted through a multi-hop route. Through this technique, an illusion is established that the two tunnel end points are close [5]. Therefore, the hostile nodes are established as decoys between the source and destination nodes, and are able to perform subversions such as packet droppings and manipulation.…”
Section: Cyber Security Threatsmentioning
confidence: 99%
“…In these methods, the packet transmitted through tunnels are received rather promptly or with less hop counts compared to ordinary packets, which are transmitted through a multi-hop route. Through this technique, an illusion is established that the two tunnel end points are close [5]. Therefore, the hostile nodes are established as decoys between the source and destination nodes, and are able to perform subversions such as packet droppings and manipulation.…”
Section: Cyber Security Threatsmentioning
confidence: 99%
“…The basic principle of an IDS for an in-vehicle detection system is the same as that of an IDS for general communication networks, where the research literature is already quite extensive and in many cases, research outputs have led to commercial developments. There are already surveys in the literature, which extensively identify and catalog the different IDS for in-vehicle networks [ 4 , 5 , 6 ]. One simplistic classification of the methods to design and implement the IDS divides the literature in two main categories.…”
Section: Related Workmentioning
confidence: 99%
“…Possible cyber, physical and cyber-physical attack classification is presented in [ 16 ] together with a taxonomy of intrusion detection software (IDS). Three main cyber-physical attack targets are identified: Confidentiality, integrity, and availability.…”
Section: Related Workmentioning
confidence: 99%