Skip to main content

Analysis of In-vehicle Security System of Smart Vehicles

  • Conference paper
  • First Online:
Future Network Systems and Security (FNSS 2019)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1113))

Included in the following conference series:

Abstract

Modern automobiles utilize numerous computerized systems to control and observe the state of the vehicle. These systems use in-vehicle networks to communicate with each other and make intelligent decisions. However, because of the increasing trend to offer connectivity between the in-vehicle network and external networks, automobiles are susceptible to several cyberattacks. This trend cannot continue unless the security of in-vehicle networks is enhanced to tackle all sorts of known and unknown attacks. This paper considers a multi-layered defense system for smart vehicles and models the in-vehicle security of the system. The model consists of a vehicle profile, communication profile, and considers several known defense mechanisms. The attacker profile is also captured based on its abilities and goals. We implement the proposed model in a probabilistic model checker and study the impact of a diverse attacker for a variety of defense profiles.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Aloqaily, M., Otoum, S., Al Ridhawi, I., Jararweh, Y.: An intrusion detection system for connected vehicles in smart cities. Ad Hoc Netw. 90, 101842 (2019). https://doi.org/10.1016/j.adhoc.2019.02.001

    Article  Google Scholar 

  2. Buttigieg, R., Farrugia, M., Meli, C.: Security issues in controller area networks in automobiles. In: 2017 18th International Conference on Sciences and Techniques of Automatic Control and Computer Engineering (STA), pp. 93–98. IEEE (2017). https://doi.org/10.1109/STA.2017.8314877

  3. Carsten, P., Andel, T.R., Yampolskiy, M., McDonald, J.T.: In-vehicle networks: attacks, vulnerabilities, and proposed solutions. In: Proceedings of the 10th Annual Cyber and Information Security Research Conference, p. 1. ACM (2015). https://doi.org/10.1145/2746266.2746267

  4. Cho, K.T., Shin, K.G.: Fingerprinting electronic control units for vehicle intrusion detection. In: 25th \(\{\)USENIX\(\}\) Security Symposium (\(\{\)USENIX\(\}\) Security 16), pp. 911–927 (2016). https://dl.acm.org/citation.cfm?id=3241165

  5. Costantino, G., La Marra, A., Martinelli, F., Matteucci, I.: Candy: a social engineering attack to leak information from infotainment system. In: 2018 IEEE 87th Vehicular Technology Conference (VTC Spring), pp. 1–5. IEEE (2018). https://doi.org/10.1109/VTCSpring.2018.8417879

  6. Fysarakis, K., Askoxylakis, I., Katos, V., Ioannidis, S., Marinos, L.: Security Concerns in Co-operative Intelligent Transportation Systems (2017). https://doi.org/10.1201/b21885-16

    Chapter  Google Scholar 

  7. Guo, J., Song, B., He, Y., Yu, F.R., Sookhak, M.: A survey on compressed sensing in vehicular infotainment systems. IEEE Commun. Surv. Tutorials 19(4), 2662–2680 (2017). https://doi.org/10.1109/COMST.2017.2705027

    Article  Google Scholar 

  8. Hartzell, S., Stubel, C.: Automobile CAN bus network security and vulnerabilities (2018). https://canvas.uw.edu/files/47669787/download?download_frd=1

  9. Huang, Y., He Qin, G., Liu, T., Dan Wang, X.: Strategy for ensuring in-vehicle infotainment security. Appl. Mech. Mater. 556–562, 5460–5465 (2014). https://doi.org/10.4028/www.scientific.net/AMM.556-562.5460

    Article  Google Scholar 

  10. Kang, M.J., Kang, J.W.: Intrusion detection system using deep neural network for in-vehicle network security. PloS One 11(6), e0155781 (2016). https://doi.org/10.1371/journal.pone.0155781

    Article  Google Scholar 

  11. Liu, J., Zhang, S., Sun, W., Shi, Y.: In-vehicle network attacks and countermeasures: challenges and future directions. IEEE Netw. 31(5), 50–58 (2017). https://doi.org/10.1109/MNET.2017.1600257

    Article  Google Scholar 

  12. Mazloom, S., Rezaeirad, M., Hunter, A., McCoy, D.: A security analysis of an in-vehicle infotainment and app platform. In: 10th \(\{\)USENIX\(\}\) Workshop on Offensive Technologies (\(\{\)WOOT\(\}\) 16) (2016). https://www.usenix.org/conference/woot16/workshop-program/presentation/mazloom

  13. ben Othmane, L., Dhulipala, L., Abdelkhalek, M., Govindarasu, M., Multari, N.: Detection of injection attacks in in-vehicle networks (2019). https://lib.dr.iastate.edu/ece_conf/72

  14. Wang, Q., Sawhney, S.: Vecure: a practical security framework to protect the CAN bus of vehicles. In: 2014 International Conference on the Internet of Things (IoT), pp. 13–18 (2014). https://doi.org/10.1109/IOT.2014.7030108

  15. Willke, T.L., Tientrakool, P., Maxemchuk, N.F.: A survey of inter-vehicle communication protocols and their applications. IEEE Commun. Surv. Tutorials 11(2), 3–20 (2009). https://doi.org/10.1109/SURV.2009.090202

    Article  Google Scholar 

  16. Wu, Y., Kim, Y.-J., Piao, Z., Chung, J., Kim, Y.-E.: Security protocol for controller area network using ECANDC compression algorithm. In: 2016 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC), pp. 1–4 (2016). https://doi.org/10.1109/ICSPCC.2016.7753631

  17. Zhang, T., Antunes, H., Aggarwal, S.: Defending connected vehicles against malware: challenges and a solution framework. IEEE Internet Things J. 1(1), 10–21 (2014). https://doi.org/10.1109/JIOT.2014.2302386

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nazeeruddin Mohammad .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mohammad, N., Muhammad, S., Shaikh, E. (2019). Analysis of In-vehicle Security System of Smart Vehicles. In: Doss, R., Piramuthu, S., Zhou, W. (eds) Future Network Systems and Security. FNSS 2019. Communications in Computer and Information Science, vol 1113. Springer, Cham. https://doi.org/10.1007/978-3-030-34353-8_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-34353-8_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-34352-1

  • Online ISBN: 978-3-030-34353-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics