2019
DOI: 10.4271/11-02-01-0002
|View full text |Cite
|
Sign up to set email alerts
|

Vulnerability of FlexRay and Countermeasures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 0 publications
0
4
0
Order By: Relevance
“…FlexRay is more expensive compared to the CAN network. However, it is more vulnerable to DoS and spoofing attacks [79].…”
Section: In-vehicle Networkmentioning
confidence: 99%
“…FlexRay is more expensive compared to the CAN network. However, it is more vulnerable to DoS and spoofing attacks [79].…”
Section: In-vehicle Networkmentioning
confidence: 99%
“…Attack-specific solutions do also exist: for instance, in [14] the authors attempt to address the message flooding attacks over the CAN bus. Flexray security is also a hot research topic, both in terms of security issues and countermeasures [15,16] and in security solutions [17,18], including those relying on cryptographybased services, e.g., authentication [19].…”
Section: Intra-vehicle Communication Bus Securitymentioning
confidence: 99%
“…Various attacks that can be mounted against this protocol were explained by Shrestha and Kim [19]. Spoofing attacks against this protocol were experimented with by Kishikawa et al [81]. Similarly, various types of attacks on this protocol were explained by Nilsson et al [26].…”
Section: Security Issues and Countermeasures For Flexray 431 Security...mentioning
confidence: 99%