An Extended Survey on Vehicle Security

10/09/2019
by   Chandra Sharma, et al.
0

The advanced electronic units with wireless capabilities inside modern vehicles have, enhanced the driving experience, but also introduced a myriad of security problems due to the inherent limitations of the internal communication protocol. In the last two decades, a number of security threats have been identified and accordingly, security measures have been proposed. In this paper, we provide a comprehensive review of security threats and countermeasures for the ubiquitous CAN bus communication protocol. Our review of the existing literature leads us to a observation of an overlooked simple, cost-effective, and incrementally deployable solution. Essentially, a reverse firewall, referred to in this paper as an icewall, can be an effective defense against a major class of packet-injection attacks and many denial of service attacks. We cover the fundamentals of the icewall in this paper. Further, by introducing the notion of human-in-the-loop, we discuss the subtle implications to its security when a human driver is accounted for.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/16/2022

A systematic literature review on Internet of Vehicles Security

The Internet of Vehicles IoV commonly referred to as connected automobil...
research
06/25/2023

A Survey of Security in UAVs and FANETs: Issues, Threats, Analysis of Attacks, and Solutions

Thanks to the rapidly developing technology, unmanned aerial vehicles (U...
research
03/12/2020

Securing Vehicle-to-Everything (V2X) Communication Platforms

Modern vehicular wireless technology enables vehicles to exchange inform...
research
06/11/2020

Threats and Countermeasures of Cyber Security in Direct and Remote Vehicle Communication Systems

Traffic management, road safety, and environmental impact are important ...
research
04/30/2022

Effective Security by Obscurity

"Security by obscurity" is a bromide which is frequently applied to unde...
research
09/12/2023

Behind The Wings: The Case of Reverse Engineering and Drone Hijacking in DJI Enhanced Wi-Fi Protocol

This research paper entails an examination of the Enhanced Wi-Fi protoco...
research
09/04/2020

Authentication and authorization in microservice-based systems: survey of architecture patterns

Context. Service-oriented architecture and its microservice-based approa...

Please sign up or login with your details

Forgot password? Click here to reset