Abstract
Cybersecurity is the body of technologies, processes, and practices designed to protect computers, data, networks, and programs against intrusion, damage, or unauthorized access by cyberattacks. Therefore, this chapter begins, in Sect. 6.1, with an overview of automotive cybersecurity issues subdivided into ten subsections. It focuses on the scale and complexity of vehicles cyber and physical components’ vulnerability to a variety of security challenges, intrusions, threats, and malicious cyberattacks whose intent is to disrupt communication, steal sensitive information or records, and impair the functioning of the system, identifying the risk level as a function of likelihood and consequences. Hence, a solid theoretical foundation for cybersecurity of vehicle cyber-physical systems is introduced too, based on concepts of artificial intelligence, deep neural networks (DNN), and deep learning (DL), control theory, epidemic theory, game theory, graph theory, and the importance of cybersecurity w.r.t. different kinds of attack scenarios, for example, the spear phishing attack. Section 6.2 introduces information technology security in automotive cyber-physical systems (CPSs) and the measures taken to ensure that automotive cyber-physical systems remain secure while interacting with other digital systems connected to a controller area network (CAN) system bus. It also describes the characteristics of today’s attack taxonomies. As a logical next step, Sect. 6.3 focuses on hacking, automotive attack surfaces, and vulnerabilities and summarizes the anatomy of attack surface intrusion points in vehicles and the associated risks. Therefore, vehicle security depends on a variety of different methods and tools that systematically perform security testing, such as functional security testing, fuzzing, penetration testing, and others. Section 6.4 discusses intrusion detection, described as the detection of any set of actions that attempts to compromise the integrity, confidentiality, or availability of a system, as well as intrusion prevention, actions which attempt to prevent a detected intrusion from succeeding. Different detection methods for different kinds of intrusion types are described, including numerous static, dynamic, and hybrid methods for prevention. Section 6.5 discusses security and functional safety with regard to wireless mobile and sensor networks, platform security, cloud computing, and data security, as well as functional safety. Section 6.6 includes several examples of car hacking. Section 6.7 contains a comprehensive set of questions on automotive cybersecurity topics, and and finally followed by references and suggestions for further reading.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References and Further Reading
(Akella et al. 2010) Akella, R., Tang, H., McMillin, B.: Analysis of Information Flow Security in Cyber-Physical Systems. In: Internat. Journal of Critical Infrastructure Protection, Vol. 3, pp. 157–173, 2010
(Akyildiz et al. 2002) Akyildiz, I. E., Su, W., Sankkarasubramaniam, Y., Cayirci, E.: Wireless Sensor Networks: A Survey. In: Comput. News, Vol. 16, No. 4, pp 393–402, 2002
(Avancha 2005) Avancha, S.: A Holistic Approach to Secure Sensor Networks. Ph. D. thesis, 2005
(Barika, et al. 2010) Barika, F., Hadjar, K., El-Kadhi, N.: Artificial neural network for mobile IDS solution, In: Security and Management, pp. 271–277, 2010
(Bitter et al. 2010) Bitter, C., Elizondo, D. A., Watson, T.: Application of Artificial Neural Networks and Related Techniques to Intrusion Detection. In: IEEE World Congress on Computational Intelligence, pp. 949–954, IEEE Press 2010.
(Bittersohl and Thoppill 2015) Bittersohl, C., Thoppil, T. G.: Automotive Cyber Security, P3 Inc., 2015
(Brown 1985) Broqn, J.: An Introduction to the Use of Facet Theory. In: Facet Theory, pp. 17–57, Springer Publ. 1985
(Bruton 2014) Bruton, J. A.: Securing CAN Bus Communication: An Analysis of Cryptographic Approaches. Master Thesis National University of Ireland, Galway, 2014
(Butayán and Hubaux 2007) Butayán, L., Hubaux, J.-P.: Security and Cooperation in Wireless Networks. Cambridge University Press, 2007
(CAMP05 2005) CAMP05 Vehicle Safety Communications Consortium. Vehicle Safety Communications Project Task 3 Final Report 2005. http://www.intellidriveusa.org/documents/vehicle-safety.pdf
(CAMP09 2008) CAMP09 Vehicle Safety Communications Consortium. Vehicle Safety Communications – Applications 1st Annual Report, Sept. 2008. http://www.intellidriveusa.org/documents/09042008-vsc-a-report.pdf
(CAMP10 2008) CAMP10 Vehicle Safety Communications Consortium. Cooperative Intersection Collision Avoidance System Limited to Stop Sign and Traffic Signal Violations Midterm Phase I Report, Oct. 2008. http://www.nhtsa.dot.gov/staticfiles/DOT/NHTSA/NRD/Multimedia/PDFs/Crash%20Avoidance/2008/811048.pdf
(Cárdenas et al. 2008) Cárdenas, A., Amin, S., Sastry, S.: Secure Control - Towards Survivable Cyber-Physical Systems. Proceed. 28th IEEE International Conference on Distributed Computing Systems Workshops, pp. 495–500, 2008
(Cárdenas et al. 2011) Cárdenas, A., Amin, S., Lin, Z., Huang, Y., Huan, C., Sastry, S.: Attacks against Process Control Systems: Risk Assessment, Detection, and Response. Proceed. 6th ACM Symposium on Information, Computer and Communications Security, pp. 355–366, 2011
(Cebula and Young 2010) Cebula, J., Young, L. R.: A Taxonomy of Operational Cyber Security Risks. Software Engineering Institute Technical Note CMU/SEI-2010-TN-028, 2010
(Chakrabarti et al. 2007) Chakrabarti, D., Leskovec, J., Faloutsos, C., Madden, S., Guestin, C., Faloutsos, M.: Information Survival Threshold in Sensor and P2P Networks. In: INFOCOMM, IEEE, pp. 1316–1324, 2007
(Chalkias et al. 2009) Chalkias, K., Baldimtsi, F., Hristu-Varsakelis, D., Etephanides, G.: Two Types of Key-Compromise Impersonation Attacks against One-Pass Key Establishment Protocols. In: Communications in Computer and Information Science, Vol. 23, Part 3, pp. 227–238, 2009
(Chatterjee 2012) Chatterjee, P.: The Connected Car as a Platform. In: EDN Nertwork, December 2012
(Checkoway et al. 2011) Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S., Koscher, K., Czeskis, A., Roesner, F., Kohno, T.: Comprehensive Experimental Analysis of Automotive Attack Surfaces. http://www.autose.org/pubs/cars-usenixsec2011.pdf
(Cichonsky et al. 2012) Cichonsky, P., Millar, T., Grance, T., Scarfone, K.: Computer Security Incident Handling Guide. National Institute of Standards and Technology (NIST) Special Publication 800-61, Revision 2, 2012
(Cobb 2015) Cobb, S.: Cybersecurity and Manufacturers: What the Costly Chrysler Jeep Hack Reveals. http://www.welivesecurity.com/2015/07/29/cybersecurity-manufacturing-chrysler-jeep-hack/
(Currie 2015) Currie, R.: Developments in Car Hacking. SANS Institute 2015. https://www.sans.org/reading-room/whitepapers/ICS/developments-car-hacking-36607
(Daley and Gani 1999) Daley, D. J., Gani, J.: Epidemic Modelling: An Introduction. Cambridge University Press, 1999
(Das et al. 2012) Das, S. K., Kant, K., Zhang, N.: Handbook on Securing Cyber-Physical Critical Infrastructure. Elsevier Publ. 2012
(De Capitani di Vimercati 2007) De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Over Encryption: Management of Access Control Evolution on Outsourced Data. In: Proc. of VLDB, pp. 123–134. 2007
(Denning 1987) Denning, D. E.: An Intrusion Detection Model. In: IEEE Transactions on Software, Vol: SE-13 Issue: 2, pp. 222–232, 1987
(Dilek et al. 2015) Dilek, S., Caku, H., Aydin, M.: Applications of Artificial Intelligence Techniques to Combating Cyber Crimes - A Review. Internat. J. of Artificial Intelligence and Applications (IJAIA), Vol. 6, No. 11, pp. 21–39, 2015
(Dolev 1982) Dolev, D.: The Byzantine Generals Strike Again. Journal of Algorithms, Vol. 3(1), pp.14–30, 1982
(Eisenhauer et al. 2006) Eisenhauer, J., Donelly, P., Ellis, M., O’Brien, M.: Roadmap to Secure Control Systems in the Energy Sector. Energetics Inc. Columbia, MD, 2006
(Eugster et al. 2004) Eugster, P. T., Guerraoui, R., Kermarrec, A., Massouli, L.: From Epidemics to Distributed Computing. In: IEEE Computer, Vol. 37, pp. 60–76, 2004
(Eyal 2007) Eyal, N.: Vehicle Lab – Engine Control Unit, 2007. http://www.vehicle-lab.net/ecu.html
(Falliere et al. 2011) Falliere, N., O’Murchu, L., Chien, E.: W32. Stuxnet Dossier. Symantec Corporation, 2011
(Finke et al. 2015) Finke, T., Schoop, D., Melcher, H.: Extension of Security AUTOSAR architecture to recognition and Countermeasures in terms of relevant attack scenarios Automotive Ethernet. Thesis Work in German; University of Applied Sciences Esslingen, 2015
(Fleury et al. 2009) Fleury, T., Khurana, H., Welch, V.: Towards Taxonomy of Attacks against Energy Control Systems. Proceed. 2nd Annual IFIP Working Group. Internat. Conference on Critical Infrastructure Protection, pp. 71–85, 2009
(Gamage and McMillian 2009) Gamage, T., McMillin, B.: Enforcing Information Flow Properties using Compensating Events. In: Proceed. 42nd Hawaii Internat. Conference on System Sciences, pp. 1–7, 2009
(Goh et al. 2003) Goh, E., Shacham, H., Modadugu, N., Boneh, D.: SiRiUS: Securing Remote Untrusted Storage. In: Proc. of NDSS, pp. 131–145, 2003
(Goodfellow et al. 2016) Goodfellow, I., Bengio, Y., Courville, A.: Deep Learning. MIT Press, 2016. www.deeplearningbook.org
(Goodwin 2009) Goodwin, A.: Ford Unveils Open-Source Developer Platform. 2009. http://reviews.cnet.com/8301-13746_7-10385619-48.html, Oct. 2009
(Gordon and Ford 2006) Gordon, S., Ford, R.: On the Definition of Classification of Cybercrime. Journal in Computer Virology, Vol.2, No. 1, pp. 13–20, 2006
(Greenberg 2013) Greenberg, A.: Hackers Reveal Nasty New Car Attacks-With me Behind the Wheel. http://www.forbes.com/sites/andygreenberg/2013/07/24/hackers-reveal-nasty-new-car-attacks-with-mebehind-the-wheel-video/
(Greenberg 2015) Greenberg, A.: Hackers Remotely Kill a Jeep on the Highway-With me in it. http://www.wired.com/2015/07/hackersremotely-kill-jeep-highway/
(Gupta 2016) Gupta, V.: Control of Cyber-Physical Systems: Recent Results and New Challenges, 2016; http://www.ieeecss-oll.org/sites/default/files/final_gupta_acc.pdf
(Guttmann and Roback 1995) Guttman, B., Roback, E. A.: An Introduction to Computer Security: The NIST Handbook. DIANE Publ. 1995
(Hamlen et al. 2006) Hamlen, K., Morrisett, G., Schneider, F.: Computability classes for enforcement mechanisms. In: ACM Transactions on Programming Languages and Systems, Vol. 28, No. 1, pp. 175–205; 2006
(Hansman and Hunt 2005) Huntsman, S., Hunt, R.: A Taxonomy of Network and Computer Attacks. In: Computers and Security, Vol. 24, Issue 1, pp. 31–43, 2005
(Heady et al. 1990) Heady, R., Luger, G., Maccabe, A., Servilla, M.: The Architecture of a Network Level Intrusion Detection System. Technical Report University of New Mexico, Department of Computer Science, 1990
(Housley and Arbaugh 2003) Housley, R., Arbaugh, W.: Security Problems in 802.11-based Networks. In: Commun. ACM Vol. 46, No. 5, pp. 21–34, 2003
(Hubaux et al. 2004) Hubaux, J. P., Chapkun, S., Luo, J., Raya, M.: The Security and Privacy of Smart Vehicles. In: Journal IEEE Security and Privacy, Vol. 2, No. 3, pp. 49–55, 2004
(Intel Security 2015) Intel Security White Paper Automotive Security Best Practice. 2015; http://www.mcafee.com/de/resources/white-papers/wp-automotive-security.pdf
(IXIA 2014) IXIA Securing the Connected Car, Whitepaper 915–3513-01 Rev. A, 2014: www.ixiacom.com
(Jin et al. 2012) Jin, X., Dan, M., Zhang, N., Yu, W., Fu, X., Das, S. K.: Game Theory for Infrastructure Security: The Power of Intent-Based Adversary Models. In: Das, S. K., Kant, K., Zhang, N.: Handbook on Securing Cyber-Physical Critical Infrastructure, pp. 31–53. Morgan Kaufmann Publ., 2012
(Johnson 2010) Johnson, T.: Fault-Tolerant Distributed Cyber-Physical Systems: Two Case Studies. Master Thesis University of Illinois, ECE Dept., 2010
(Johnson 2016) Johnson, M.: Cyber Crime, Security and Data Intelligence. Routledge Publ. 2016
(Kallahalla et al. 2003) Kallahalla, M., Riedel, E., Waminadham, R., Wang, Q., Fu, K.: Scalable Secure File Sharing on Untrusted Storage. In: Proc. of 2nd USENIX Conference of File and Storage Technologies, pp. 29–42. 2003
(Kao and Marculescu 2006) Kao, J. C., Marculescu, R.: Eavesdropping Minimization via Transmission Power Control in Ad-Hoc Wireless Networks. In: 3rd Annual IEEE Communications Society on Sensor and Ad-Hoc Communications and Networks, pp. 707–714, 2006
(Karim and Proha 2014) Karim, E., Proha, V. V.: Cyber-Physical Systems Security. In: Applied Cyber-Physical Systems, pp. 75–84. Eds.: Shuh, S. S., Tanik, U., J., Carbone, J. N., Rogglu, A.; Springer Publ., 2014
(Kephart and White 1993) Kephardt, J. O., White, S. R.: Measuring and Modeling Computer Virus Prevalence. In: Proceed. IEEE Symposium on Security and Privacy, pp. 2–15, 1993
(Kermack and McKendrick 1927) Kermach, W. O., McKendrick, A.: A Contribution to the Mathematical Theory of Epidemics. Proceed. Royal Society of London, Vol. A, No. 1, pp. 700–721, 1927
(Kjaerland 2005) Kjaerland, M.: A Taxonomy and Comparison of Computer Security Incidents for the Commercial and Government Sectors. In: Computers and Security, Vol. 25, pp. 522–538, 2005.
(Koscher et al. 2010) Koscher, K., Czeskis, A., Roesner, F., Patel, S., Kohno, T., Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S.: Experimental Security Analysis of a Modern Automobile. In: IEEE Symposium on Security and Privacy, pp. 448–461, 2010
(Kumar and Spafford 1994) Kumar, S., Spafford, E. H.: An Application of Pattern Matching in Intrusion Detection. Computer Science Technical Reports, Paper 1116, Purdue University, 1994
(Landrum et al. 2014) Landrum, R., Pace, S., Hu, F.: Cyber-Physical Systems Security–Smart Grid Example, pp. 135–154. In: Cyber-Physical Systems. Ed.: F. Hu. CRC Press 2014
(Lamport 1997) Lamport, L.: Proving the Correctness of Multiprocessing Programs. In: IEEE Transactions on Software Engineering, Vol. 3(2), pp. 125–143, 1997
(Lamport 1998) Lamport, L.: Proving Possibility Properties. In: Theoretical Computer Science, Vol. 206(1–2), pp. 341–352, 1998
(Lamport 2005) Lamport L.: Real-Time Model Checking is Really Simple. Proceed. 13th Advanced Research Working Conference on Correct Hardware Design and Verification Methods, pp. 162–175, 2005
(Landram et al. 2014) Landram, R., Pace, S., Hu, F.: Cyber-Physical System Security - Smart Grid Example. In: F. Hu: Cyber-Physical Systems - Integrated Computing and Engineering Design. pp. 145–154, CRC Press 2014
(Lin and Sangiovanni-Vincentelli 2012) Lin, C. W., Sangiovanni-Vincentelli, A.: Cyber-Security for the Controller Area Network (CAN) Communication Protocol. In: IEEE Proceed. Internat. Conference on Cyber Security, pp. 1–7, 2012
(Lin et al. 2013) Lin, C. W., Zhu, Q., Phung, C., Sangiovanni-Vincentelli, A.: Security-aware mapping for CAN-based real-time distributed automotive systems. In: IEEE Proceed. Internat. Conference on Cyber Security, pp. 115–121, 2013
(Lough 2001) Lough, G. L.: A Taxonomy of Computer Attacks with Applications to Wireless Networks. Dissertation submitted to the Faculty of the Virginia Polytechnic Institute, 2001
(Lunt et al. 1992) Lunt, T. F., Tamaru, A., Gilham, F., Jagannathan, R., Neumann, P. G., Javitz, H. S., Valdes, A., Garvey, T. D.: A Real-Time Intrusion Detection Expert System (IDES) – Final technical Report, SRI Computer Science Laboratory, SRI International, Menlo Park, CA, 1992
(Luo et al. 2010) Luo, Y., Szidarovsky, F., Al-Nashif, Y., Hariti, S.: Game Theory Based Network Security. In. Journal of Information Security, pp. 41–44, 2010
(Miller and Valasek 2014) Miller C., Valasek C.: A Survey of Remote Automotive Attack Surfaces. IOActive 2014. Available from: https://www.ioactive.com/pdfs/IOActive_Remote_Attack_ Surfaces.pdf
(Miller and Valasek 2015) Miller, C., Valasek, C.: Remote Exploitation of an Unaltered Passenger Vehicle. http://illmatics.com/Remote%20Car%20Hacking.pdf
(Mo and Sinopoli 2009) Mo, Y., Sinopoli, B.: Secure Control against Replay Attacks. Proceed. 47th Conf. on Communication, Control, and Computing, pp. 911–918, 2009
(Mollman 2009) Mollmann S.: From Cars to TVs, Apps are Spreading to the Real World. http://edition.cnn.com/2009/TECH/10/08/apps.realworld/
(Möller 2016) Möller, D. P. F.: Guide to Computing Fundamentals in Cyber-Physical Systems – Concepts, Design Methods, and Applications, Springer Publ., 2016
(ni-com 2009) ECU Designing and Testing Using National Instruments Products. White Paper, National Instruments 2009
(Nurse et al. 2014) Nurse, J. R. C., Buckley, O., Legg, P. A., Goldsmith, M., Cresse, S., Wright, G. R., Whitey, M.: Understanding Insider Threat: A Framework for Characterizing Attacks. IEEE Security and Privacy Workshops, pp. 214–222, IEEE 2014
(Patel et al. 2010) Patel, A., Qassim, Q., Shukor, Z., Nogueira, J., Junior, J., Wills, C.: Autonomic Agent-Based Self-Managed Intrusion Detection and Prevention System, In: Proceed. South African Information Security Multi-Conference, pp. 223–234, 2010
(Pathan et al. 2006) Pathan, Al-S. K., Lee, H.-W., Hong, C. S.: Security in Wireless Sensor Networks: Issues and Challenges. In: Proceed. Internat. Confer. Advanced Technology, pp. 1043–1048, 2006
(Payteck 2003) How PayTeck Works. www.payteck.cc/aboutpayteck.html
(Pfleeger et al. 2015) Pfleeger, C. P., Pfleeger, S. L., Margulies, J.: Security in Computing. Prentice Hall 2015
(Pelechrinis et al. 2011) Pelechrinis, K., Iliofotou, M., Krishnanurthy, S. V.: Denial of Service Attacks in Wireless Networks: The Case of Jammers. In: IEEE Communications Surveys and Tutorial, Vol. 13, No. 2, pp. 245–257, 2011
(Poulsen 2010) Poulsen, K.: Hacker disables more than 100 cars remotely. Wired online. March 17th 2010. Available from: www.wired.com/threatlevel/2010/03/hacker-bricks-cars
(Salahuddin and Al-Fuqaha 2013) Salahuddin M. A. B., Al-Fuqaha, A.: AGORA: A Versatile Framework for the Development of Intelligent Transportation System Applications. In: Wireless Sensor and Mobile Ad-Hoc Networks: Vehicular and Space Applications, pp. 163–184, Eds.: B. Benhaddou, A. Al-Fuqaha, Springer Publ. 2013
(Saleh and Khatib 2005). Saleh, M., Khatib, I. A.: Throughput Analysis of WEP Security in Ad Hoc Sensor Networks. In: Proc. 2nd International Conference on Innovations in Information Technology, 2005
(Saltzman and Sharabani 2009) Saltzman, R., Sharabani, A.: Active Man in the Middle Attacks – A Security Advisory. Whitepaper IBM Rational Application Security Group. IBM Corporation 2009
(Satyanarayanan et al. 2009) Satyanarayan, M., Bahl, P., Caceres, R., Davies, N.: The Case for VM-based Cloudlets in Mobile Computing. IEEE Pervasive Compt. Vol. 8 No. 4, 14–23, 2009
(Sastry et al. 1994) Sastry, P. S., Phansalpar, V. V., Thathachar, M. A. L: Decentralized Learning of Nash Equilibria in Multi-Person Stochastic Games with Incomplete Information. In: IEEE Transct. On Systems, Man, and Cybernetics, Vol. 24, No. 5, pp. 769–777, 1994
(Scarfone and Mell 2007) Scarfone K., Mell, P.: Guide to Intrusion Detection and Prevention Systems. National Institute of Standards and Technology (NIST) Special Publication 800–94, 2007
(Shieh and Gligor 1991) Shiva, S. W., Gligor, V. D.: A Pattern Oriented Intrusion Model and its Applications. In: Proceed. IEEE Computer Society Symposium on Research in Security and Privacy, pp. 327–342, 1991
(Shimeall and Spring 2014) Shimeall, T., Spring, J.: Introduction to Information Security: A Strategic-Based Approach. Elsevier Publ. 2014
(Shiva et al. 2010) Shiva, S., Roy, S., Dasgupta, D.: Game Theory for Cyber Security. In: CSIIRW Conf. Proceed., ACM Press 2010
(Simmons et al. 2014) Simmons, C., Ellis, C., Shiva, S., Dasgupta, D., Wu, Q.: AVOIDIT : A cyberattack Taxonomy. In: 9th Annual Symposium on Information Assurance (ASIA), pp. 14-1-14-, 2014
(Smaha 1988) Smaha S. E.: Haytack: An Intrusion Detection System. In: Proceed. 4th Aerospace Computer Security Applications Conference, pp. 37–44, 1988
(Tang and McMillin 2008) Tang, H., McMillian, B.: Security Property Violation in CPS through Timing. In: Proceed. 28th Internat. Conference on Distributed Computing Systems Workshops, pp. 519–524, 2008
(Valasek and Miller 2014) Valasek, C., Miller, C.: A Survey of Remote Automotive Attack Surfaces. Technical White Paper, IOActive Inc., 2014
(VTTI 2007) VTTI - Virginia Tech Transportation Institute. Intersection Collision Avoidance - Violation Task 5 Final Report, 2007. http://www.intellidriveusa.org/documents/final-report-04-2007.pdf
(Wang et al. 2010) Wang, E. K., Ye, Y., Xu, X., Yiu, S. M., Hui, L. C. K., Chow, K. P.: Security Issues and Challenges for Cyber Physical Systems. IEEE/ACM Conference on Green Computing and Communications and IEEE/ACM Intern. Conference on Cyber, Physical and Social Computing, pp.733–738, IEEE Publ., 2010
(Xiao 2006) Xiao, Y.: Security in Sensor Networks. Auerbach Publ., 2006
(Xiao et al. 2008) Xiao, K., Ren, S., Kwiat, K.: Retrofitting Cyber-Physical Systems for Survivability through External Coordination. In: Proceed. 41st Internat. Conference on Systems Science, pp. 454–466, 2008
(Yuzhe et al. 2013) Yuzhe, L., Ling, S., Peng, D., Quecedo, E.: Jamming Attack on Cyber-Physical Systems : A Game Theoretic Approach. In: IEEE 3rd Annual Conference on Cyber Technology in Automation, pp. 252–257, 2013
(Zeltser 2015) Zeltser, L.: Antivirus Software uses Several Different Virus Detection Techniques. TechTarget Network, 2015
(Zimmer et al. 2010) Zimmer, C., Bhat, B., Mueller, F., Mohan, S.: Time-Based Intrusion Detection in Cyber-Physical Systems. In: Proceed. 1st ACM/IEEE International Conference on Cyber-Physical Systems, pp. 109–118, 2010
Links
(URL1 2016) www.dhs.gov/science-and-technology/cyber-security-division
(URL2 2016) https://autoalliance.org/connected-cars/cybersecurity/
(URL3 2016) http://www.icao.int/APAC/Documents/edocs/cns/mlat_concept.pdf
(URL4 2016) https://www.autosar.org/fileadmin/user_upload/standards/classic/3-0/AUTOSAR_TechnicalOverview.pdf
(URL5 2016) https://en.wikipedia.org/wiki/Secure_Neighbor_Discovery
(URL6 2016) https://www.genivi.org/challenges
(URL7 2016) http://searchcontentmanagement.techtarget.com/definition/taxonomy
(URL8 2016) https://ldra.com/automotive/
(URL9 2016) http://www.openvas.org/about.html
(URL10 2016) https://www.automotiveisac.com/best-practices/
(URL11 2016) https://en.wikipedia.org/wiki/Functional_safety
(URL12 2016) http://www.exida.com/Resources/Term/Automotive-Safety-Integrity-Level-ASIL
(URL13 2016) https://en.wikipedia.org/wiki/Failure_mode_and_effects_analysis
(URL1 2017) https://www.techopedia.com/definition/24841/denial-of-service-attack-dos
(URL1 2018) https://www.plattform-i40.de/I40/Navigation/DE/Industrie40/Handlungsfelder/Sicherheit/sicherheit.html (in German)
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer International Publishing AG, part of Springer Nature
About this chapter
Cite this chapter
Möller, D.P.F., Haas, R.E. (2019). Automotive Cybersecurity. In: Guide to Automotive Connectivity and Cybersecurity. Computer Communications and Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-73512-2_6
Download citation
DOI: https://doi.org/10.1007/978-3-319-73512-2_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-73511-5
Online ISBN: 978-3-319-73512-2
eBook Packages: Computer ScienceComputer Science (R0)