2021
DOI: 10.1016/j.comcom.2021.08.027
|View full text |Cite
|
Sign up to set email alerts
|

Security on in-vehicle communication protocols: Issues, challenges, and future research directions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 35 publications
(6 citation statements)
references
References 35 publications
0
6
0
Order By: Relevance
“…Frequency-based attacks generally aim to compromise the operation of the entire bus, effectively causing it to stop functioning. The most obvious type of frequency-based attack is DoS (denial of service) [12]. This technique consists in sending messages with the highest priority and zero content in rapid succession.…”
Section: Main Cyberattack Techniquesmentioning
confidence: 99%
“…Frequency-based attacks generally aim to compromise the operation of the entire bus, effectively causing it to stop functioning. The most obvious type of frequency-based attack is DoS (denial of service) [12]. This technique consists in sending messages with the highest priority and zero content in rapid succession.…”
Section: Main Cyberattack Techniquesmentioning
confidence: 99%
“…Usually, the master LIN nodes are connected to the CAN bus [16]. An attacker can reach the LIN bus through the CAN On-Board Diagnostic (OBD) port mounted in a vehicle cabin, using recent hacking techniques [15], [17].…”
Section: Lin Attack Vector Analysismentioning
confidence: 99%
“…Despite being of age, the LIN protocol is being spread in automotive applications following a positive trend of growth: starting from 200 million nodes in 2010 to reaching 700 million in 2020. Despite several studies confirming critical vulnerabilities associated with this protocol, [14]- [17], the research community has been scarcely active in proposing efficient countermeasures.…”
Section: Introductionmentioning
confidence: 99%
“…The motivation for this work is given as “How to design a mutual authentication protocol for the autonomous devices in the edge network?” [ 5 , 6 , 7 , 8 ]. Considering the independence feature of the autonomous devices for mutual authentication, they must not be restricted to a particular area network after the registration phase [ 9 , 10 ].…”
Section: Introductionmentioning
confidence: 99%