2019
DOI: 10.1109/mwc.2019.1800289
|View full text |Cite
|
Sign up to set email alerts
|

TSP Security in Intelligent and Connected Vehicles: Challenges and Solutions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
17
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 71 publications
(17 citation statements)
references
References 10 publications
0
17
0
Order By: Relevance
“…This is partially due to the lack of variety and public familiarity with operating systems like Linux, Green Hills, Windows CE, and QNX, which allow hackers to transfer knowledge from computers to vehicles (Li et al 2018). Also, OEM telematics service providers allow several avenues for infotainment systems to access and interact with the internet, bringing with them interconnectivity vulnerabilities (Li et al 2019). The infotainment systems in most modern and future vehicles aggregate and display data about the current status of various functionalities and consistently update information; however, the connectivity, configuration, and custom exploits related to infotainment systems vary from manufacturer to manufacturer, model to model, and year to year (Rohde 2019).…”
Section: Remote Access Risksmentioning
confidence: 99%
See 2 more Smart Citations
“…This is partially due to the lack of variety and public familiarity with operating systems like Linux, Green Hills, Windows CE, and QNX, which allow hackers to transfer knowledge from computers to vehicles (Li et al 2018). Also, OEM telematics service providers allow several avenues for infotainment systems to access and interact with the internet, bringing with them interconnectivity vulnerabilities (Li et al 2019). The infotainment systems in most modern and future vehicles aggregate and display data about the current status of various functionalities and consistently update information; however, the connectivity, configuration, and custom exploits related to infotainment systems vary from manufacturer to manufacturer, model to model, and year to year (Rohde 2019).…”
Section: Remote Access Risksmentioning
confidence: 99%
“…Many modern vehicles house a device called a telecommunications box (T-Box) that stores information gathered from external sources and sensors generated in the vehicle. The central CAN bus of the vehicle creates an all-inclusive network environment by connecting the vehicle's OBD II port, T-Box, and infotainment system (Li et al 2019); this port has direct access to the vehicle's ECUs. Information from the T-Box is capable of being transmitted through a SIM card linked to a cellular connection capability in the vehicle for OTA update reception and diagnostics.…”
Section: Telematicsmentioning
confidence: 99%
See 1 more Smart Citation
“…A large number of user's privacy-sensitive information is included in the Internet of Vehicles. Once leaked, it may cause serious consequences [1]. With the rapid development of 5G [2] [3], big data, artificial intelligence [4], and blockchains [5], more and more attentions are paid to user's privacy and security [6] in the Internet of Vehicles.…”
Section: Introductionmentioning
confidence: 99%
“…I N FUTURE Intelligent Transportation Systems (ITSs), vehicles will be equipped with more advanced sensors to monitor surrounding driving environments, driving behaviors and vehicle status, and share the collected data through vehicular networks to facilitate traffic management and improve driving experience [1], [2]. On the other hand, passengers in vehicles also desire wireless connections to enjoy high-quality mobile services just as at home.…”
Section: Introductionmentioning
confidence: 99%