2017
DOI: 10.1145/2960407
|View full text |Cite
|
Sign up to set email alerts
|

Security in Automotive Networks

Abstract: With the increasing amount of interconnections between vehicles, the attack surface of internal vehicle networks is rising steeply. Although these networks are shielded against external attacks, they often do not have any internal security to protect against malicious components or adversaries who can breach the network perimeter. To secure the in-vehicle network, all communicating components must be authenticated, and only authorized components should be allowed to send and receive messages. This is achieved … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
15
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 62 publications
(16 citation statements)
references
References 32 publications
(53 reference statements)
0
15
0
Order By: Relevance
“…The cryptography technique is used for protecting data privacy and security through encryption and decryption of sensitive data, such as vehicle ID and location information of a vehicle. For example, in symmetric key cryptography ( 29 , 30 ), the same key is used for both encryption and decryption of data, and in asymmetric cryptography ( 31 ), two different keys are used for encryption and decryption of data, which provides additional security. On the other hand, a firewall ( 32 ) technique uses multiple layers of security to control the incoming and outgoing data through the in-vehicle network.…”
Section: Resultsmentioning
confidence: 99%
“…The cryptography technique is used for protecting data privacy and security through encryption and decryption of sensitive data, such as vehicle ID and location information of a vehicle. For example, in symmetric key cryptography ( 29 , 30 ), the same key is used for both encryption and decryption of data, and in asymmetric cryptography ( 31 ), two different keys are used for encryption and decryption of data, which provides additional security. On the other hand, a firewall ( 32 ) technique uses multiple layers of security to control the incoming and outgoing data through the in-vehicle network.…”
Section: Resultsmentioning
confidence: 99%
“…Castiglione et al [ 17 ] proposed an approach utilizing lightweight block ciphers to secure in-vehicle communication with limited hardware and software resources. Mundhenk et al [ 18 ] proposed a system called a Lightweight Authentication for Secure Automotive Networks (LASAN) that secures vehicle communication with low computational resources, for instance, power and network bandwidth. These IDS may be effective only for specific threat models which have already been considered in the design stages [ 19 ].…”
Section: Introductionmentioning
confidence: 99%
“…2) The information data of invehicle network are transmitted in the form of broadcast and plaintext, such as in the CAN bus. The broadcast data frame does not cover the source address and destination address [10]. Although [11][12][13][14][15] studied the security of in-vehicle networks to address these emerging issues, these in-vehicle security schemes focus on ensuring secure communication between ECUs with little consideration for the security issues introduced by external devices connected to the vehicle.…”
Section: Introductionmentioning
confidence: 99%