Definitions
Automotive Security is the field of assessing cyber-threats against automotive systems and developing security countermeasures for detecting, preventing the corresponding attacks, and reacting to a security breach. As modern vehicles become connected, the threat of attack becomes increasingly real. Coupled with advances in driver assistance and autonomous solutions, the impact on security is further expanded. Thus, automotive security aims at ensuring automotive systems can achieve their intended function without the danger of being maliciously manipulated by an attacker. A few definitions used in vehicle security are provided below:
Cyber-physical system: A system of collaborating computational elements controlling physical entities
Cybersecurity: An attribute of a cyber-physical system that relates to avoiding unreasonable risk due to an attack (Committee SVESS et al. 2016)
Attack: Exploitation...
References
Alberts C, Dorofee A, Stevens J, Woody C (2003) Introduction to the octave approach. Technical report. Carnegie-Mellon University
Auto ISAC (2017) Automotive information sharing and analysis center. https://www.automotiveisac.com/. Accessed 6 May 2018
Biham E, Dunkelman O, Indesteege S, Keller N and Preneel B (2007) How to steal cars – A practical attack on keeLoq. In: Crypto 2007, Santa Barbara, California
Checkoway S, McCoy D, Kantor B, Anderson D, Shacham H, Savage S, Koscher K, Czeskis A, Roesner F, Kohno T et al (2011) Comprehensive experimental analyses of automotive attack surfaces. In: USENIX security symposium, San Francisco
Committee SVESS et al (2016) SAE j3061-cybersecurity guidebook for cyber-physical automotive systems. SAE-Society of Automotive Engineers
Heary J (2010) Defcon: Hacking tire pressure monitors remotely. https://www.networkworld.com/article/2231495/cisco-subnet/defcon---hacking-tire-pressure-monitors-remotely.html
Henniger O, Ruddle A, Seudié H, Weyl B, Wolf M, Wollinger T (2009) Securing vehicular onboard IT systems: the EVITA project. In: VDI/VW automotive security conference, Ingolstadt
IMS (2008) Final draft etsi es 282 007 v2. 0.0 (2008-03)
Islam M, Sandberg C, Bokesand A, Olovsson T, Broberg H, Kleberger P, Lautenbach A, Hansson A, Söderberg-Rivkin A, Kadhirvelan S (2014) Deliverable d2-security models. HEAVENS Project, Version 1
ISO (2011) 26262: road vehicles-functional safety. International Standard ISO/FDIS 26262
Kaja N, Shaout A, Ma D (2017) A two stage intrusion detection intelligent system. In: The International Arab Conference on Information Technology, Tunisia
McCarthy C, Harnett K, Carter A (2014) Characterization of potential security threats in modern automobiles: a composite modeling approach. Technical report
Miller C, Valasek C (2015) Remote exploitation of an unaltered passenger vehicle. Black Hat USA 2015
Nasser AM, Ma D, Muralidharan P (2017) An approach for building security resilience in AUTOSAR based safety critical systems. J Cyber Secur Mobil 6(3):271–304
Zhang L, Shi L, Kaja N, Ma D (2018) A two-stage deep learning approach for CAN intrusion detection. NDIA ground vehicle systems engineering and technology symposium, Michigan
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Section Editor information
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this entry
Cite this entry
Kaja, N., Nasser, A., Ma, D., Shaout, A. (2019). Automotive Security. In: Shen, X., Lin, X., Zhang, K. (eds) Encyclopedia of Wireless Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-32903-1_177-1
Download citation
DOI: https://doi.org/10.1007/978-3-319-32903-1_177-1
Received:
Accepted:
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-32903-1
Online ISBN: 978-3-319-32903-1
eBook Packages: Springer Reference Computer SciencesReference Module Computer Science and Engineering