2020
DOI: 10.1109/tits.2019.2908074
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of Intrusion Detection for In-Vehicle Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
100
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 263 publications
(134 citation statements)
references
References 52 publications
0
100
0
Order By: Relevance
“…However, due to the low computing power of the ECU, solving the problems of vehicle network information security is still a huge challenge [1]. In order to resist forgery attacks, tampering attacks, replay attacks, and privacy leak attacks, researchers have studied many authentication schemes in the IoV or in-vehicle network [3,12]. Research on authentication protocols based on privacy protection policies is the main method to ensure the integrity, reliability, and identity privacy of message transmission.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…However, due to the low computing power of the ECU, solving the problems of vehicle network information security is still a huge challenge [1]. In order to resist forgery attacks, tampering attacks, replay attacks, and privacy leak attacks, researchers have studied many authentication schemes in the IoV or in-vehicle network [3,12]. Research on authentication protocols based on privacy protection policies is the main method to ensure the integrity, reliability, and identity privacy of message transmission.…”
Section: Related Workmentioning
confidence: 99%
“…The rise of IoV technology has not only changed the way people travel, but also made people's driving environment more and more comfortable [1]. However, the interconnection of networks between vehicles brings various information security, which makes the attack surface of the internal vehicle networks rise sharply, especially for remote attacks [2,3]. In 2013, Toyota Prius cars were attacked by a hacker through the On-Board Diagnostic (OBD) interface and the braking systems were illegally manipulated, which caused traffic accidents [2].…”
Section: Introductionmentioning
confidence: 99%
“…In the last few years, with the increase of security threats and the huge enormous volume of traffic, several approaches have been proposed to detect anomalies [17]- [19]. Network anomaly detection consists of two main approaches: Signature-based and Profile-based.…”
Section: Introductionmentioning
confidence: 99%
“…Since 2010, many instances of car hacking through the on-board diagnostics II (OBD-II) port for in-vehicle diagnosis and the infotainment system have been reported [ 1 , 2 , 3 , 4 , 5 , 6 , 7 , 8 ]. Thus, security measures for modern cars against hacking threats also have been actively researched [ 7 , 9 , 10 ]. Because vehicular security is an important issue today, we need a reliable solution to protect vehicles in motion.…”
Section: Introductionmentioning
confidence: 99%