Abstract
Modern automobiles utilize numerous computerized systems to control and observe the state of the vehicle. These systems use in-vehicle networks to communicate with each other and make intelligent decisions. However, because of the increasing trend to offer connectivity between the in-vehicle network and external networks, automobiles are susceptible to several cyberattacks. This trend cannot continue unless the security of in-vehicle networks is enhanced to tackle all sorts of known and unknown attacks. This paper considers a multi-layered defense system for smart vehicles and models the in-vehicle security of the system. The model consists of a vehicle profile, communication profile, and considers several known defense mechanisms. The attacker profile is also captured based on its abilities and goals. We implement the proposed model in a probabilistic model checker and study the impact of a diverse attacker for a variety of defense profiles.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Aloqaily, M., Otoum, S., Al Ridhawi, I., Jararweh, Y.: An intrusion detection system for connected vehicles in smart cities. Ad Hoc Netw. 90, 101842 (2019). https://doi.org/10.1016/j.adhoc.2019.02.001
Buttigieg, R., Farrugia, M., Meli, C.: Security issues in controller area networks in automobiles. In: 2017 18th International Conference on Sciences and Techniques of Automatic Control and Computer Engineering (STA), pp. 93–98. IEEE (2017). https://doi.org/10.1109/STA.2017.8314877
Carsten, P., Andel, T.R., Yampolskiy, M., McDonald, J.T.: In-vehicle networks: attacks, vulnerabilities, and proposed solutions. In: Proceedings of the 10th Annual Cyber and Information Security Research Conference, p. 1. ACM (2015). https://doi.org/10.1145/2746266.2746267
Cho, K.T., Shin, K.G.: Fingerprinting electronic control units for vehicle intrusion detection. In: 25th \(\{\)USENIX\(\}\) Security Symposium (\(\{\)USENIX\(\}\) Security 16), pp. 911–927 (2016). https://dl.acm.org/citation.cfm?id=3241165
Costantino, G., La Marra, A., Martinelli, F., Matteucci, I.: Candy: a social engineering attack to leak information from infotainment system. In: 2018 IEEE 87th Vehicular Technology Conference (VTC Spring), pp. 1–5. IEEE (2018). https://doi.org/10.1109/VTCSpring.2018.8417879
Fysarakis, K., Askoxylakis, I., Katos, V., Ioannidis, S., Marinos, L.: Security Concerns in Co-operative Intelligent Transportation Systems (2017). https://doi.org/10.1201/b21885-16
Guo, J., Song, B., He, Y., Yu, F.R., Sookhak, M.: A survey on compressed sensing in vehicular infotainment systems. IEEE Commun. Surv. Tutorials 19(4), 2662–2680 (2017). https://doi.org/10.1109/COMST.2017.2705027
Hartzell, S., Stubel, C.: Automobile CAN bus network security and vulnerabilities (2018). https://canvas.uw.edu/files/47669787/download?download_frd=1
Huang, Y., He Qin, G., Liu, T., Dan Wang, X.: Strategy for ensuring in-vehicle infotainment security. Appl. Mech. Mater. 556–562, 5460–5465 (2014). https://doi.org/10.4028/www.scientific.net/AMM.556-562.5460
Kang, M.J., Kang, J.W.: Intrusion detection system using deep neural network for in-vehicle network security. PloS One 11(6), e0155781 (2016). https://doi.org/10.1371/journal.pone.0155781
Liu, J., Zhang, S., Sun, W., Shi, Y.: In-vehicle network attacks and countermeasures: challenges and future directions. IEEE Netw. 31(5), 50–58 (2017). https://doi.org/10.1109/MNET.2017.1600257
Mazloom, S., Rezaeirad, M., Hunter, A., McCoy, D.: A security analysis of an in-vehicle infotainment and app platform. In: 10th \(\{\)USENIX\(\}\) Workshop on Offensive Technologies (\(\{\)WOOT\(\}\) 16) (2016). https://www.usenix.org/conference/woot16/workshop-program/presentation/mazloom
ben Othmane, L., Dhulipala, L., Abdelkhalek, M., Govindarasu, M., Multari, N.: Detection of injection attacks in in-vehicle networks (2019). https://lib.dr.iastate.edu/ece_conf/72
Wang, Q., Sawhney, S.: Vecure: a practical security framework to protect the CAN bus of vehicles. In: 2014 International Conference on the Internet of Things (IoT), pp. 13–18 (2014). https://doi.org/10.1109/IOT.2014.7030108
Willke, T.L., Tientrakool, P., Maxemchuk, N.F.: A survey of inter-vehicle communication protocols and their applications. IEEE Commun. Surv. Tutorials 11(2), 3–20 (2009). https://doi.org/10.1109/SURV.2009.090202
Wu, Y., Kim, Y.-J., Piao, Z., Chung, J., Kim, Y.-E.: Security protocol for controller area network using ECANDC compression algorithm. In: 2016 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC), pp. 1–4 (2016). https://doi.org/10.1109/ICSPCC.2016.7753631
Zhang, T., Antunes, H., Aggarwal, S.: Defending connected vehicles against malware: challenges and a solution framework. IEEE Internet Things J. 1(1), 10–21 (2014). https://doi.org/10.1109/JIOT.2014.2302386
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Mohammad, N., Muhammad, S., Shaikh, E. (2019). Analysis of In-vehicle Security System of Smart Vehicles. In: Doss, R., Piramuthu, S., Zhou, W. (eds) Future Network Systems and Security. FNSS 2019. Communications in Computer and Information Science, vol 1113. Springer, Cham. https://doi.org/10.1007/978-3-030-34353-8_15
Download citation
DOI: https://doi.org/10.1007/978-3-030-34353-8_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-34352-1
Online ISBN: 978-3-030-34353-8
eBook Packages: Computer ScienceComputer Science (R0)