2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA) 2018
DOI: 10.1109/iccubea.2018.8697772
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Security in Automotive Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 27 publications
(6 citation statements)
references
References 13 publications
0
6
0
Order By: Relevance
“…Methodologically, this paper employs STRIDE-DREAD modeling and a comprehensive literature review to analyze security threats in vehicular systems, a technique not commonly employed in studies in [ 60 , 61 ]. This paper’s rigorous evaluation of existing literature, assessing both the strengths and limitations of prior research, aligns with but extends beyond the analyses in works like [ 63 , 64 ].…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Methodologically, this paper employs STRIDE-DREAD modeling and a comprehensive literature review to analyze security threats in vehicular systems, a technique not commonly employed in studies in [ 60 , 61 ]. This paper’s rigorous evaluation of existing literature, assessing both the strengths and limitations of prior research, aligns with but extends beyond the analyses in works like [ 63 , 64 ].…”
Section: Discussionmentioning
confidence: 99%
“…
Figure A2 Detailed defense taxonomy for CCAV attack mechanisms.
Figure A3 Number of identified threats from the taxonomy against other papers in the literature [ 3 , 23 , 25 , 27 , 29 , 34 , 39 , 40 , 50 , 51 , 52 , 53 , 54 , 55 , 56 , 57 , 58 , 59 , 60 , 61 , 62 , 63 , 64 ], adapted from [ 8 ].
…”
Section: Table A1mentioning
confidence: 99%
“…As shown in Table 1, the threats to CCAVs were classified in [28,36] and V2V/V2I communications were classified in [15][16][17][18][19][20][21][22][23][24][25][26][27][29][30][31][32][33][35][36][37]. Its impacts are highlighted in [31,32,34,36,37]; however, none have mapped and illustrated the threats with the trust domains. Common attack vectors were only discussed in [31,32,37], although an in-depth analysis of the vectors with taxonomy is not discussed.…”
Section: Related Workmentioning
confidence: 99%
“…Potential attackers could exploit vulnerabilities within the V2X network through various connection points, including links within the controller network connecting the CAN bus with ECUs, interconnections among ECUs, connections from ECUs to actuators, and even targeting internal sensors and actuators themselves, highlighting the vulnerabilities in in-vehicle communication. In contemporary vehicles, the proliferation of ECUs, ranging from 70 to 100 [29], in contrast to only two ECUs in the 1980s [30], has significantly escalated the attack surface. Furthermore, CAVs are exposed to heightened risk due to their diverse onboard computer connections, encompassing both wireless interfaces like WiFi for external devices and physical connections like Ethernet and USB, extending to sensors, dashboards, and externally introduced devices.…”
Section: B Attack Surfacesmentioning
confidence: 99%