2017
DOI: 10.1109/mnet.2017.1600257
|View full text |Cite
|
Sign up to set email alerts
|

In-Vehicle Network Attacks and Countermeasures: Challenges and Future Directions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
101
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 215 publications
(101 citation statements)
references
References 10 publications
0
101
0
Order By: Relevance
“…In this Section, an overview of attack techniques and examples is provided. Following the work by Liu et al [12], the typical attack scheme includes an initial phase in which a physical (e.g., OBD) or wireless (e.g., Bluetooth) car interface is exploited in order to access the in-vehicle network. The most common interface to access it is OBD, but several works leverage different entry points: Checkoway et al [2] succeeded in sending arbitrary CAN frames through a modified WMA audio file burned onto a CD.…”
Section: Attack Scenariosmentioning
confidence: 99%
“…In this Section, an overview of attack techniques and examples is provided. Following the work by Liu et al [12], the typical attack scheme includes an initial phase in which a physical (e.g., OBD) or wireless (e.g., Bluetooth) car interface is exploited in order to access the in-vehicle network. The most common interface to access it is OBD, but several works leverage different entry points: Checkoway et al [2] succeeded in sending arbitrary CAN frames through a modified WMA audio file burned onto a CD.…”
Section: Attack Scenariosmentioning
confidence: 99%
“…To enhance In-Vehicle Network Security [8], authentication and encryption is one of the most effective way to provide secureness to a controller are network (CAN) frame. Before that, there is four important issues that needs to be considered.…”
Section: Related Workmentioning
confidence: 99%
“…According to the 2019 industry survey [6], safety and security are the highest short-term and mid-term challenges for the automotive industry. Therefore, extensive studies have been carried out to find possible solutions [7,8] to the vulnerabilities of CAN. Some of these studies have performed successful experimental attacks on passenger cars [9][10][11][12][13][14] and heavy-duty vehicles [15,16].…”
Section: Introductionmentioning
confidence: 99%