2019
DOI: 10.48550/arxiv.1907.07455
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

An Overview of Attacks and Defences on Intelligent Connected Vehicles

Mahdi Dibaei,
Xi Zheng,
Kun Jiang
et al.

Abstract: Cyber security is one of the most significant challenges in connected vehicular systems and connected vehicles are prone to different cybersecurity attacks that endanger passengers' safety. Cyber security in intelligent connected vehicles is composed of in-vehicle security and security of inter-vehicle communications. Security of Electronic Control Units (ECUs) and the Control Area Network (CAN) bus are the most significant parts of in-vehicle security. Besides, with the development of 4G LTE and 5G remote com… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(10 citation statements)
references
References 142 publications
0
10
0
Order By: Relevance
“…A jamming attack system is established for a type of a WNCS targeting each sensor in the system [167]. A few major security attacks on the intelligent connected vehicles is identified [168]. A comprehensive survey of available defences against these attacks is discussed on intelligent vehicle systems.…”
Section: Spoofing Attacksmentioning
confidence: 99%
“…A jamming attack system is established for a type of a WNCS targeting each sensor in the system [167]. A few major security attacks on the intelligent connected vehicles is identified [168]. A comprehensive survey of available defences against these attacks is discussed on intelligent vehicle systems.…”
Section: Spoofing Attacksmentioning
confidence: 99%
“…Wi-Fi, WiMAX, Long-Term Evolution (LTE), Near-Field Communication (NFC), and Dedicated Short-Range Communications (DSRC) are among the communication technologies available for vehicular data communications. In reviewing the literature, several attacks on the communication network involving ITS were found [2]. In terms of the privacy, there are various types of inference attacks, for instance, parameter inference, input inference, and attribute inference attacks, which can jeopardize the privacy of the vehicles.…”
Section: B Cybersecurity Of Fl In Wireless Mobile Networkmentioning
confidence: 99%
“…Recent reports identified highly practical wireless attacks on CAVs [2]. Some attacks target in-vehicle security and others target security of inter-vehicle communications [3], [4].…”
Section: Introductionmentioning
confidence: 99%
“…Most of these vulnerabilities are related to the CAN bus protocol, which lacks security protections such as encryption and authentication [2]. Additionally, expansions to vehicular communication present another avenue for compromise [11]. Arguably, the next generation of AVs is likely to be at even higher risk to these types of attacks, possibly at widescale compromise, all while more control is shifted away from drivers to automated systems on the vehicle.…”
Section: Related Workmentioning
confidence: 99%