2009 9th International Conference on Intelligent Transport Systems Telecommunications, (ITST) 2009
DOI: 10.1109/itst.2009.5399279
|View full text |Cite
|
Sign up to set email alerts
|

Security requirements for automotive on-board networks

Abstract: This paper considers security requirements for automotive on-board networks and describes the processes used for identifying and prioritizing such requirements. The security engineering process starts from use cases for automotive on-board networks that require wireless communication interfaces and involves an investigation of security threat scenarios and the assessment of the relative risks associated with the threats

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
62
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 80 publications
(62 citation statements)
references
References 3 publications
0
62
0
Order By: Relevance
“…Another way is to exploit the wireless communication interfaces such as Bluetooth and keyless entry system (e.g., the work in [4] shows unlocking a car without a car key is possible). Once the attackers have gained access to in-vehicle architecture platform, they can then exploit the vulnerabilities of aforementioned bus systems to deploy sensor spoofing attacks [12], replay attacks, masquerade attacks, DoS attacks, etc.…”
Section: Intra-vehicle Securitymentioning
confidence: 99%
“…Another way is to exploit the wireless communication interfaces such as Bluetooth and keyless entry system (e.g., the work in [4] shows unlocking a car without a car key is possible). Once the attackers have gained access to in-vehicle architecture platform, they can then exploit the vulnerabilities of aforementioned bus systems to deploy sensor spoofing attacks [12], replay attacks, masquerade attacks, DoS attacks, etc.…”
Section: Intra-vehicle Securitymentioning
confidence: 99%
“…Edge et al [Edge et al, 2006] introduce protection costs; Byres et al [Byres et al, 2004] use detectability which illustrates how easily a defender can discover an attack and difficulty which specifies the needed skill of the attacker. As suggested by Henniger et al [Henniger et al, 2009], attack time -which models an amount of time needed to perform an attack -may be considered independent of an attacker's skill, costs or resources. Attacks that a defender cannot really protect himself against can be annotated as unmitigatable.…”
Section: Attribute Overviewmentioning
confidence: 99%
“…A similar approach has been used in [Jürgenson and Willemson, 2008], where the costs, success probability, gain and penalty attributes have been combined in order to define a new attribute called the exact expected outcome of the attacker. Henniger et al [Henniger et al, 2009] combine the attributes elapsed time, expertise, knowledge of system, window of opportunity and required equipment, in order to deduce the required attack potential. Finally, Fung et al [Fung et al, 2005] show how the difficulty level associated to the non-refined nodes can be used to estimate the survivability in the root node.…”
Section: General Calculation With Attributesmentioning
confidence: 99%
See 2 more Smart Citations