Tools and Practices

Chapter
Part of the SpringerBriefs in Computer Science book series (BRIEFSCOMPUTER)

Abstract

In recent years, along with the rapid development of the GNSS (global navigation satellite system), cellular network, and IoT (Internet of things), vehicle networking has entered into a wireless interconnected and intelligent era that makes remote-operating vehicles or sharing information convenient. However, the vehicle wireless networks connected to physical components of vehicles make it possible for hackers to engage in wireless sabotage. This chapter presents various vulnerable physical components, reactions from government and industry against the cyber-attacks, attacking tools, attacking practices, and some mitigation strategies.

Keywords

Vehicle networking Cyber-attack tools Cyber-attack practices 

References

  1. 1.
    Gartner Says By 2020. A quarter billion connected vehicles will enable new in-vehicle services and automated driving capabilities, 2016-10-25. http://www.gartner.com/newsroom/id/2970017.
  2. 2.
    IEEE 802.11p-2010 (2010). IEEE standard for information technology—Local and metropolitan area networks—Specific requirements—Part 11: Wireless LAN medium access control (MAC) and physical layer (PHY) specifications amendment 6: Wireless access in vehicular environments.Google Scholar
  3. 3.
    Intel launches automotive security review board to ensure cybersecurity of cars, 17 Sept 2015.Google Scholar
  4. 4.
  5. 5.
  6. 6.
    Automotive security review board. https://asrb.org/.
  7. 7.
    Automotive cybersecurity best practices white paper. http://www.mcafee.com/us/resources/white-papers/wp-automotive-security.pdf.
  8. 8.
    McCarthy, C., Harnett, K., Carter, A., Hatipoglu, C. Assessment of the information sharing and analysis center model. https://www.nhtsa.gov/DOT/NHTSA/NVS/Crash%20Avoidance/Technical%20Publications/2014/812076-AssessInfoSharingModel.pdf.
  9. 9.
    McCarthy, C., Harnett, K., Carter, A. A summary of cybersecurity best practices. https://www.nhtsa.gov/DOT/NHTSA/NVS/Crash%20Avoidance/Technical%20Publications/2014/812075_CybersecurityBestPractices.pdf.
  10. 10.
    McCarthy, C., Harnett, K., Carter, A. Characterization of potential security threats in modern automobiles: A composite modeling approach. https://www.nhtsa.gov/DOT/NHTSA/NVS/Crash%20Avoidance/Technical%20Publications/2014/812074_Characterization_PotentialThreatsAutos(1).pdf.
  11. 11.
    National Institute of Standards and Technology Cybersecurity Risk Management Framework Applied to Modern Vehicles.Google Scholar
  12. 12.
  13. 13.
    A BILL To protect consumers from security and privacy threats to their motor vehicles, and for other purposes. http://www.markey.senate.gov/imo/media/doc/SPY%20Car%20legislation.pdf.
  14. 14.
    Carwall—Autonomous security for autonomous and connected cars. https://www.karambasecurity.com/product.
  15. 15.
    Vector solutions for CAN and CAN FD. http://vector.com/vi_can_solutions_en.html.
  16. 16.
    PRODUCTS: 3 + 1 cyber security protection framework—FUSE. http://www.visualthreat.com/UIproducts.action.
  17. 17.
  18. 18.
  19. 19.
  20. 20.
    OwnStar—Hacking cars with OnStar to locate, unlock and remote start vehicles. https://www.youtube.com/watch?v=3olXUbS-prU.
  21. 21.
  22. 22.
    Hackers remotely kill a jeep on the highway—With me in it. https://www.youtube.com/watch?v=MK0SrxBC1xs.
  23. 23.

Copyright information

© The Author(s) 2017

Authors and Affiliations

  1. 1.Department of Computer and Communication EngineeringChina University of Petroleum (East China)QingdaoChina

Personalised recommendations