Abstract
We’re in the twenty-first century, and we’re no longer encircled by mechanical vehicles, but instead, there’s COW (Computer on Wheels). Various security devices, gadgets and protocols for vehicles, for example, programmed emergency braking, forward-crash alarms, vehicle-to-vehicle communication, and potentially, in the coming years, completely automated vehicles, can be actualized because of the cutting-edge technologies as of now existing. Remembering that above mentioned advancements have extraordinary potential in them, vehicle producers and transportation specialists are improving the protection of technologies. This chapter will help to get a concise outline of the Importance of cybersecurity in automotive technology.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
C. Paar, Embedded IT security in automotive application—an emerging area, in Embedded Security in Cars, ed. by K. Lemke, C. Paar, M. Wolf (Springer, Berlin, Heidelberg, 2006)
M. Singh, A. Singh, An empirical study on automotive cyber attacks, in The 4th IEEE World Forum on the Internet of Things (WF-IoT 2018), Singapore, 05–08 Feb 2018
A. Palanca, E. Evenchick, F. Maggi, S. Zanero, A stealth, selective, link-layer denial-of-service attack against automotive networks, in Detection of Intrusions and Malware, and Vulnerability Assessment. DIMVA 2017, ed. by M. Polychronakis, M. Meier. Lecture Notes in Computer Science, vol. 10327 (Springer, Cham, 2017)
M. Markovitz, A. Wool, Field classification, modeling and anomaly detection in unknown CAN bus networks. Veh. Commun. 9, 43–52. ISSN 2214 - 2096 (2017). https://doi.org/10.1016/j.vehcom.2017.02.005
B. Zou, M. Gao, X. Cui, Research on information security framework of intelligent connected vehicle, in ICCSP’17: Proceedings of the 2017 International Conference on Cryptography, Security, and Privacy (2017), pp. 91–95. https://doi.org/10.1145/3058060.3058064
J. Pelzl, M. Wolf, T. Wollinger, Automotive embedded systems applications and platform embedded security requirements, in Secure Smart Embedded Devices, Platforms and Applications, ed. by K. Markantonakis, K. Mayes (Springer, New York, 2014)
R. Cassettari, L. Fanucci, G. Boccini, A new hardware implementation of the advanced encryption standard algorithm for automotive applications, in 2014 10th Conference on Ph.D. Research in Microelectronics and Electronics (PRIME), Grenoble (2014), pp. 1–4. https://doi.org/10.1109/PRIME.2014.6872672
A. Karahasanovic, P. Kelberger, M. Almgren, Adapting threat modeling methods for the automotive industry, in 15th Embedded Symposium of CAR [ESCAR] Conference, Berlin (2017)
M. Wolf, R. Lambert, A.-D. Schmidt, T. Enderle, WANNADRIVE? Feasible attack paths and effective protection against ransomware in modern vehicles, in 15th Embedded Symposium of CAR [ESCAR] Conference, Berlin (2017)
M. Singh, D. Singh, A. Jara, Secure cloud networks for connected & automated vehicles, in 2015 International Conference on Connected Vehicles and Expo (ICCVE), pp. 330–335, Shenzhen, China, 19–23 Oct 2015. https://doi.org/10.1109/ICCVE.2015.94
A. Bolovinou, A. Ugur, A.T. Sheik, O. Ur-Rehman, G. Wallraf, A. Amditis, TARA+: Controllability-aware Threat Analysis and Risk Assessment for L3 Automated Driving Systems (2019). https://doi.org/10.13140/RG.2.2.23901.67044
G. Macher, E. Armengaud, E. Brenner, C. Kreiner, Threat and risk assessment methodologies in the automotive domain, Procedia Computer Science, 83, 1288–1294 (2016), ISSN 1877-0509. https://doi.org/10.1016/j.procs.2016.04.268
Acknowledgements
This research was funded by Woosong University Academic Research in 2021.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Singh, M. (2021). Cybersecurity in Automotive Technology. In: Information Security of Intelligent Vehicles Communication. Studies in Computational Intelligence, vol 978. Springer, Singapore. https://doi.org/10.1007/978-981-16-2217-5_3
Download citation
DOI: https://doi.org/10.1007/978-981-16-2217-5_3
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-2216-8
Online ISBN: 978-981-16-2217-5
eBook Packages: EngineeringEngineering (R0)