Skip to main content

Cybersecurity in Automotive Technology

  • Chapter
  • First Online:
Information Security of Intelligent Vehicles Communication

Part of the book series: Studies in Computational Intelligence ((SCI,volume 978))

Abstract

We’re in the twenty-first century, and we’re no longer encircled by mechanical vehicles, but instead, there’s COW (Computer on Wheels). Various security devices, gadgets and protocols for vehicles, for example, programmed emergency braking, forward-crash alarms, vehicle-to-vehicle communication, and potentially, in the coming years, completely automated vehicles, can be actualized because of the cutting-edge technologies as of now existing. Remembering that above mentioned advancements have extraordinary potential in them, vehicle producers and transportation specialists are improving the protection of technologies. This chapter will help to get a concise outline of the Importance of cybersecurity in automotive technology.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 139.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. C. Paar, Embedded IT security in automotive application—an emerging area, in Embedded Security in Cars, ed. by K. Lemke, C. Paar, M. Wolf (Springer, Berlin, Heidelberg, 2006)

    Google Scholar 

  2. M. Singh, A. Singh, An empirical study on automotive cyber attacks, in The 4th IEEE World Forum on the Internet of Things (WF-IoT 2018), Singapore, 05–08 Feb 2018

    Google Scholar 

  3. A. Palanca, E. Evenchick, F. Maggi, S. Zanero, A stealth, selective, link-layer denial-of-service attack against automotive networks, in Detection of Intrusions and Malware, and Vulnerability Assessment. DIMVA 2017, ed. by M. Polychronakis, M. Meier. Lecture Notes in Computer Science, vol. 10327 (Springer, Cham, 2017)

    Google Scholar 

  4. M. Markovitz, A. Wool, Field classification, modeling and anomaly detection in unknown CAN bus networks. Veh. Commun. 9, 43–52. ISSN 2214 - 2096 (2017). https://doi.org/10.1016/j.vehcom.2017.02.005

  5. B. Zou, M. Gao, X. Cui, Research on information security framework of intelligent connected vehicle, in ICCSP’17: Proceedings of the 2017 International Conference on Cryptography, Security, and Privacy (2017), pp. 91–95. https://doi.org/10.1145/3058060.3058064

  6. J. Pelzl, M. Wolf, T. Wollinger, Automotive embedded systems applications and platform embedded security requirements, in Secure Smart Embedded Devices, Platforms and Applications, ed. by K. Markantonakis, K. Mayes (Springer, New York, 2014)

    Google Scholar 

  7. R. Cassettari, L. Fanucci, G. Boccini, A new hardware implementation of the advanced encryption standard algorithm for automotive applications, in 2014 10th Conference on Ph.D. Research in Microelectronics and Electronics (PRIME), Grenoble (2014), pp. 1–4. https://doi.org/10.1109/PRIME.2014.6872672

  8. A. Karahasanovic, P. Kelberger, M. Almgren, Adapting threat modeling methods for the automotive industry, in 15th Embedded Symposium of CAR [ESCAR] Conference, Berlin (2017)

    Google Scholar 

  9. M. Wolf, R. Lambert, A.-D. Schmidt, T. Enderle, WANNADRIVE? Feasible attack paths and effective protection against ransomware in modern vehicles, in 15th Embedded Symposium of CAR [ESCAR] Conference, Berlin (2017)

    Google Scholar 

  10. M. Singh, D. Singh, A. Jara, Secure cloud networks for connected & automated vehicles, in 2015 International Conference on Connected Vehicles and Expo (ICCVE), pp. 330–335, Shenzhen, China, 19–23 Oct 2015. https://doi.org/10.1109/ICCVE.2015.94

  11. A. Bolovinou, A. Ugur, A.T. Sheik, O. Ur-Rehman, G. Wallraf, A. Amditis, TARA+: Controllability-aware Threat Analysis and Risk Assessment for L3 Automated Driving Systems (2019). https://doi.org/10.13140/RG.2.2.23901.67044

  12. G. Macher, E. Armengaud, E. Brenner, C. Kreiner, Threat and risk assessment methodologies in the automotive domain, Procedia Computer Science, 83, 1288–1294 (2016), ISSN 1877-0509. https://doi.org/10.1016/j.procs.2016.04.268

Download references

Acknowledgements

This research was funded by Woosong University Academic Research in 2021.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Madhusudan Singh .

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Singh, M. (2021). Cybersecurity in Automotive Technology. In: Information Security of Intelligent Vehicles Communication. Studies in Computational Intelligence, vol 978. Springer, Singapore. https://doi.org/10.1007/978-981-16-2217-5_3

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-2217-5_3

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-2216-8

  • Online ISBN: 978-981-16-2217-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics