2017
DOI: 10.1016/j.procs.2017.09.021
|View full text |Cite
|
Sign up to set email alerts
|

A Threat to Vehicular Cyber Security and the Urgency for Correction

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
30
0
1

Year Published

2019
2019
2021
2021

Publication Types

Select...
5
5

Relationship

0
10

Authors

Journals

citations
Cited by 35 publications
(31 citation statements)
references
References 5 publications
0
30
0
1
Order By: Relevance
“…Companies should control products from their suppliers (Parkinson et al, 2017). Different types of communication (Messnarz et al, 2017) and layers of intrusion detection system (Straub et al, 2017) should be mutually independent and each component should have its own firewall (Rizvi et al, 2017). Security system should be often actualized and CAN protected from scanning (Lim et al, 2017).…”
Section: Cybersecurity Issues In Autonomous Vehiclesmentioning
confidence: 99%
“…Companies should control products from their suppliers (Parkinson et al, 2017). Different types of communication (Messnarz et al, 2017) and layers of intrusion detection system (Straub et al, 2017) should be mutually independent and each component should have its own firewall (Rizvi et al, 2017). Security system should be often actualized and CAN protected from scanning (Lim et al, 2017).…”
Section: Cybersecurity Issues In Autonomous Vehiclesmentioning
confidence: 99%
“…If this is broken, the attacker has full access to the network. To address this disadvantage, a good solution is the HSS (Hybrid Security System (Rizvi et al, 2017)), which consists of multiple protection layers. HSS consists of three layers, a layer similar to firewall, and the HSP (hybrid security program) layer, which communicates with the HSS resource layer.…”
Section: Intrusion Detection On Can Busmentioning
confidence: 99%
“…Rizvi et al analyze the denial of service attack and replay attacks within a car network. The study proposes a hybrid security system that consists of multiple security layers [12]. The structure of the study is acceptable, but the general framework of the article is not complete, especially focusing on the partly automated and autonomous vehicles, dispensing with the discussion of the production phase, malicious bug generation, or the importance of sensor disturbance.…”
Section: Introduction and Related Workmentioning
confidence: 99%