Advertisement

A Brief Survey on Cyber Security Attack Entrances and Protection Strategies of Intelligent Connected Vehicle

  • Zhao Wang
  • Yanqi WangEmail author
  • Yanan Zhang
  • Yangyang Liu
  • Chao Ma
  • Haijun Wang
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11910)

Abstract

The Intelligent Connected Vehicle (ICV) related to the communication of the stakeholders has become a large and open ecosystem. From the automobile ecosystem, it can be found that there are many attack entrances everywhere, which will bring a lot of risks and threats. In this work, we have summarized the seven major attack entrances of automobile cyber security, and proposed the corresponding six key protection strategies of intelligent and connected vehicle.

Keywords

Intelligent Connected Vehicle Vehicle ecosystems Automobile cyber security Attack entrance Protection strategy 

References

  1. 1.
    Ashibani, Y., Mahmoud, Q.H.: Cyber physical systems security: analysis, challenges and solutions. Comput. Secur. 68, 81–97 (2017)CrossRefGoogle Scholar
  2. 2.
    Chen, L.W., Syue, K.Z., Tseng, Y.C.: A vehicular surveillance and sensing system for car security and tracking applications. In: Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN 2010), pp. 426–427 (2010)Google Scholar
  3. 3.
    Okul, Ş., Aydin, M.A., Keleş, F.: Security problems and attacks on smart cars. In: Boyaci, A., Ekti, A.R., Aydin, M.A., Yarkan, S. (eds.) International Telecommunications Conference. LNEE, vol. 504, pp. 203–213. Springer, Singapore (2019).  https://doi.org/10.1007/978-981-13-0408-8_17CrossRefGoogle Scholar
  4. 4.
    Wolf, M., Weimerskirch, A., Wollinger, T.: State of the art: embedding security in vehicles. EURSIP J. Embed. Syst. 16(1) (2007)CrossRefGoogle Scholar
  5. 5.
    Lee, C.H., Kim, K.H.: Implementation of IoT system using block chain with authentication and data protection. In: 2018 International Conference on Information Networking (ICOIN), pp. 936–940. IEEE (2018)Google Scholar
  6. 6.
    Alfred, J.R., Sidorov, S., Tsang, M.C., et al.: In-vehicle networking. U.S. Patent Application 15/270,957, 22 March 2018Google Scholar
  7. 7.
    Wroblewski, G.: General method of program code obfuscation (2002)Google Scholar
  8. 8.
    Pizzolotto, D., Fellin, R., Ceccato, M.: OBLIVE: seamless code obfuscation for Java programs and Android apps. In: 2019 IEEE 26th International Conference on Software Analysis, Evolution and Reengineering (SANER), pp. 629–633. IEEE (2019)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Zhao Wang
    • 1
  • Yanqi Wang
    • 2
    Email author
  • Yanan Zhang
    • 2
  • Yangyang Liu
    • 2
  • Chao Ma
    • 2
  • Haijun Wang
    • 2
  1. 1.Auto Standardization Research InstituteChina Automotive Technology and Research Center Co., Ltd.TianjinChina
  2. 2.Automotive Data CenterChina Automotive Technology and Research Center Co., Ltd.TianjinChina

Personalised recommendations