Skip to main content

In-Vehicle Networks and Security

  • Chapter
  • First Online:
Automotive Systems and Software Engineering

Abstract

Vehicles are experiencing a rapid evolution: mechanical systems are rapidly extended, or even replaced, with electrical systems, leading to highly computerized vehicles. Wireless connectivity, such as telematics and vehicle to everything (V2X), is being introduced to help connect vehicles with the world around them. The information exchanged via these interfaces is used to improve, among others, safety, convenience, comfort, and efficiency.

However, adding connectivity is at the same time opening the Connected Car to a multitude of security problems. Modern vehicles are highly complex cyber-physical systems with a high degree of automation and loads of (valuable) data. As such, they are an attractive target for hackers. But until recently, it was not possible for hackers to attack vehicles remotely, at large scale. The wireless connections are changing the gameā€”as they form new entry points for hackers into the vehicle networks and systems. Most vehicles that are currently on the road were not designed with security in mind. And consequently, there were a few big-impact vehicle hacks last year that made headlines in the mainstream media.

To properly prepare vehicles for their connected future, concepts such as security by design, privacy by design, defense in depth, and life-cycle management must be applied. In this chapter, we will present a structural approach to applying these principles to in-vehicle networks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 109.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 149.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 139.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Comprehensive experimental analyses of automotive attack surfaces. CAESS, August 2011. http://www.autosec.org/publications.html

  2. Hackers remotely kill a jeep on the highway ā€“ with me in it. WIRED. http://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/

  3. Remote exploitation of an unaltered passenger vehicle. Dr. Charlie Miller and Chris Valasek. http://illmatics.com/Remote%20Car%20Hacking.pdf

  4. Sens. Markey, blumenthal introduce legislation to protect drivers from auto security, privacy risks with standards & ā€œcyber dashboardā€ rating system. http://www.markey.senate.gov/news/press-releases/sens-markey-blumenthal-introduce-legislation-to-protect-drivers-from-auto-security-privacy-risks-with-standards-and-cyber-dashboard-rating-system

  5. Tracking & hacking: security & privacy gaps put American drivers at risk. Ed Markey, United States Senator for Massachusetts; February 2015. http://www.markey.senate.gov/imo/media/doc/2015-02-06_MarkeyReport-Tracking_Hacking_CarSecurity%202.pdf

  6. The STRIDE threat model. https://msdn.microsoft.com/en-us/library/ee823878(v=cs.20).aspx

  7. Hacking a Tesla model S: what we found and what we learned. Lookout Blog. https://blog.lookout.com/blog/2015/08/07/hacking-a-tesla/

  8. Consolidation in vehicle electronic architectures. Roland Berger Strategy Consultants. http://www.rolandberger.com/media/publications/2015-07-23-rbsc-pub-consolidation_in_vehicle_electronics_architecture.html

  9. The ā€˜Heartbleedā€™ security flaw that affects most of the Internet. CNN.com. http://edition.cnn.com/2014/04/08/tech/web/heartbleed-openssl/

  10. How the poodle computer bug impacts business. Fortune.com. http://fortune.com/2014/11/12/poodle-bug/

  11. FREAKing hell: all windows versions vulnerable to SSL snoop. The Register. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0204

  12. Vehicle electrical system security committee. http://www.sae.org/works/committeeHome. do?comtID=TEVEES18

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Timo van Roermund .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

Ā© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

van Roermund, T. (2019). In-Vehicle Networks and Security. In: Dajsuren, Y., van den Brand, M. (eds) Automotive Systems and Software Engineering. Springer, Cham. https://doi.org/10.1007/978-3-030-12157-0_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-12157-0_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-12156-3

  • Online ISBN: 978-3-030-12157-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics