2019 2nd International Conference on New Trends in Computing Sciences (ICTCS) 2019
DOI: 10.1109/ictcs.2019.8923077
|View full text |Cite
|
Sign up to set email alerts
|

Automotive Cybersecurity: Foundations for Next-Generation Vehicles

Abstract: The automotive industry is experiencing a serious transformation due to a digitalisation process and the transition to the new paradigm of Mobility-as-a-Service. The next-generation vehicles are going to be very complex cyber-physical systems, whose design must be reinvented to fulfil the increasing demand of smart services, both for safety and entertainment purposes, causing the manufacturers' model to converge towards that of IT companies. Connected cars and autonomous driving are the preeminent factors that… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
3
3

Relationship

0
9

Authors

Journals

citations
Cited by 25 publications
(7 citation statements)
references
References 19 publications
(21 reference statements)
0
6
0
Order By: Relevance
“…To secure the life cycle of a safety-critical and cyberphysical system, the security shall be built, baked into the system from the ground-up [21], [22] rather than an afterthought. To design such a secure-by-design system requires an engineering process that allow a capability to:…”
Section: Core Cybersecurity Principlesmentioning
confidence: 99%
“…To secure the life cycle of a safety-critical and cyberphysical system, the security shall be built, baked into the system from the ground-up [21], [22] rather than an afterthought. To design such a secure-by-design system requires an engineering process that allow a capability to:…”
Section: Core Cybersecurity Principlesmentioning
confidence: 99%
“…Some key countermeasures at the perception layer are noise detection, rejection, and the use of multiple input sources [24,28]. At the network layer, countermeasures are encryption, special devices and user authentication techniques [25,27]. At the application layer, countermeasures include anti-malware software, firewalls, access control and user authentication.…”
Section: Literature Studymentioning
confidence: 99%
“…Because an autonomous vehicle is a high-tech transportation mean, 63% of HNTB America THINKS surveyed are concerned about protecting the great amount of data they generate, both in terms of the confidentiality of the information they contain, and in terms of the ability to ensure the safe operation of these vehicles in general [4]. In this regard, to reduce the accidents' risk, research is being conducted in another direction -ensuring the cybersecurity of autonomous vehicles [21].…”
Section: Theory: the Main Directions Of Ensuring The Autonomous Vehicles' Active Safetymentioning
confidence: 99%