2019
DOI: 10.2172/1559930
|View full text |Cite
|
Sign up to set email alerts
|

Vehicle Cybersecurity Threats and Mitigation Approaches

Abstract: Department of Energy (DOE) reports produced after 1991 and a growing number of pre-1991 documents are available free via www.OSTI.gov.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
25
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
3
3

Relationship

2
7

Authors

Journals

citations
Cited by 42 publications
(25 citation statements)
references
References 15 publications
0
25
0
Order By: Relevance
“…Overall, up to date, little research work on power electronics security in EVs has been published. For a more detailed discussion on potential cyber-attacks on modern vehicles, please refer to surveys in [13], [34], [59].…”
Section: B Cyber-attack Modeling In Vehicle Control Systemsmentioning
confidence: 99%
“…Overall, up to date, little research work on power electronics security in EVs has been published. For a more detailed discussion on potential cyber-attacks on modern vehicles, please refer to surveys in [13], [34], [59].…”
Section: B Cyber-attack Modeling In Vehicle Control Systemsmentioning
confidence: 99%
“…In [19] authors defined in-vehicle infotainment systems as the one that presents the biggest attack potential for vehicle networks. Additionally, the mitigation techniques and procurement recommendations for infotainment systems which enables passengers' interaction with a vehicle was presented.…”
Section: Related Workmentioning
confidence: 99%
“…security risk management is omitted. Infotainment systems that give a passenger understanding of the vehicle's behaviour and surroundings is considered as the one that presents the biggest attack potential for vehicle networks [19].…”
mentioning
confidence: 99%
“…Level 2 units also provide the option for network connections, which is a feature that may increase unit costs, but also provides simpler options for reporting and transaction processing. It is important to address cybersecurity concerns associated with EVSE through the procurement process and by taking other precautions, as explained in Vehicle Cybersecurity Threats and Mitigation Approaches (Hodge, et. al.…”
Section: Unit Selectionmentioning
confidence: 99%