Proceedings of the 10th Annual Cyber and Information Security Research Conference 2015
DOI: 10.1145/2746266.2746267
|View full text |Cite
|
Sign up to set email alerts
|

In-Vehicle Networks

Abstract: Vehicles made within the past years have gradually become more and more complex. As a result, the embedded computer systems that monitor and control these systems have also grown in size and complexity. Unfortunately, the technology that protects them from external attackers has not improved at a similar rate. In this paper we discuss the vulnerabilities of modern in-vehicle networks, focusing on the Controller Area Network (CAN) communications protocol as a primary attack vector. We discuss the vulnerabilitie… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 59 publications
(22 citation statements)
references
References 10 publications
(17 reference statements)
0
10
0
Order By: Relevance
“…The type of communications in CAV are (i) within the vehicle -which is interaction between different vehicular sub systems, (ii) with infrastructure (V2I) -it is bi directional information exchange with external road systems such as traffic lights and street lights and cameras, (iii) with devices (V2D) -in this type the interaction with other road users mobile devices such as pedestrians, cyclists, drivers or passengers, (iv) with each other (V2V)wireless data transmission between vehicles about real time positions and speeds and (v) with other networks (V2N) -wireless data exchange between vehicles and networks to access cloud-based infrastructure [9,10] The most common in-vehicle network architecture and the major control parts of the vehicle under each protocol is listed [11,12,13]. a. Cyber security attacks faced by connected autonomous vehicles.…”
Section: Figure 12 the Connected Autonomous Vehicle System[8]mentioning
confidence: 99%
“…The type of communications in CAV are (i) within the vehicle -which is interaction between different vehicular sub systems, (ii) with infrastructure (V2I) -it is bi directional information exchange with external road systems such as traffic lights and street lights and cameras, (iii) with devices (V2D) -in this type the interaction with other road users mobile devices such as pedestrians, cyclists, drivers or passengers, (iv) with each other (V2V)wireless data transmission between vehicles about real time positions and speeds and (v) with other networks (V2N) -wireless data exchange between vehicles and networks to access cloud-based infrastructure [9,10] The most common in-vehicle network architecture and the major control parts of the vehicle under each protocol is listed [11,12,13]. a. Cyber security attacks faced by connected autonomous vehicles.…”
Section: Figure 12 the Connected Autonomous Vehicle System[8]mentioning
confidence: 99%
“…There are 60% carsharing businesses that are completely manual, and 40% that are somewhat automated in Canada. Operator phone networks and in-vehicle trip records are examples of manual processes in the technological study conducted by Carsten, Andel, Yampolskiy, and McDonald [4]. Reservations made by automated touch-tone telephone or the Internet, or both, are examples of a partly automated system.…”
Section: Sources Of Supportmentioning
confidence: 99%
“…We deal with AVs’ potential crash situations as an area of ethical uncertainty for which the correct ethical answer is not immediately apparent. The programmer can determine the Avs’ course of action ahead of its deployment and such a course of action can entail multiple complex options that may lead to casualties (Carsten et al , 2015).…”
Section: Trolley Dilemma and Ethical Uncertaintymentioning
confidence: 99%