Encyclopedia of Wireless Networks

Living Edition
| Editors: Xuemin (Sherman) Shen, Xiaodong Lin, Kuan Zhang

Automotive Security

Living reference work entry
DOI: https://doi.org/10.1007/978-3-319-32903-1_177-1



Automotive Security is the field of assessing cyber-threats against automotive systems and developing security countermeasures for detecting, preventing the corresponding attacks, and reacting to a security breach. As modern vehicles become connected, the threat of attack becomes increasingly real. Coupled with advances in driver assistance and autonomous solutions, the impact on security is further expanded. Thus, automotive security aims at ensuring automotive systems can achieve their intended function without the danger of being maliciously manipulated by an attacker. A few definitions used in vehicle security are provided below:
  • Cyber-physical system: A system of collaborating computational elements controlling physical entities

  • Cybersecurity: An attribute of a cyber-physical system that relates to avoiding unreasonable risk due to an attack (Committee SVESS et al. 2016)

  • Attack: Exploitation...

This is a preview of subscription content, log in to check access.


  1. Alberts C, Dorofee A, Stevens J, Woody C (2003) Introduction to the octave approach. Technical report. Carnegie-Mellon UniversityGoogle Scholar
  2. Auto ISAC (2017) Automotive information sharing and analysis center. https://www.automotiveisac.com/. Accessed 6 May 2018
  3. Biham E, Dunkelman O, Indesteege S, Keller N and Preneel B (2007) How to steal cars – A practical attack on keeLoq. In: Crypto 2007, Santa Barbara, CaliforniaGoogle Scholar
  4. Checkoway S, McCoy D, Kantor B, Anderson D, Shacham H, Savage S, Koscher K, Czeskis A, Roesner F, Kohno T et al (2011) Comprehensive experimental analyses of automotive attack surfaces. In: USENIX security symposium, San FranciscoGoogle Scholar
  5. Committee SVESS et al (2016) SAE j3061-cybersecurity guidebook for cyber-physical automotive systems. SAE-Society of Automotive EngineersGoogle Scholar
  6. Henniger O, Ruddle A, Seudié H, Weyl B, Wolf M, Wollinger T (2009) Securing vehicular onboard IT systems: the EVITA project. In: VDI/VW automotive security conference, IngolstadtGoogle Scholar
  7. IMS (2008) Final draft etsi es 282 007 v2. 0.0 (2008-03)Google Scholar
  8. Islam M, Sandberg C, Bokesand A, Olovsson T, Broberg H, Kleberger P, Lautenbach A, Hansson A, Söderberg-Rivkin A, Kadhirvelan S (2014) Deliverable d2-security models. HEAVENS Project, Version 1Google Scholar
  9. ISO (2011) 26262: road vehicles-functional safety. International Standard ISO/FDIS 26262Google Scholar
  10. Kaja N, Shaout A, Ma D (2017) A two stage intrusion detection intelligent system. In: The International Arab Conference on Information Technology, TunisiaGoogle Scholar
  11. McCarthy C, Harnett K, Carter A (2014) Characterization of potential security threats in modern automobiles: a composite modeling approach. Technical reportGoogle Scholar
  12. Miller C, Valasek C (2015) Remote exploitation of an unaltered passenger vehicle. Black Hat USA 2015Google Scholar
  13. Nasser AM, Ma D, Muralidharan P (2017) An approach for building security resilience in AUTOSAR based safety critical systems. J Cyber Secur Mobil 6(3):271–304CrossRefGoogle Scholar
  14. Zhang L, Shi L, Kaja N, Ma D (2018) A two-stage deep learning approach for CAN intrusion detection. NDIA ground vehicle systems engineering and technology symposium, MichiganGoogle Scholar

Authors and Affiliations

  1. 1.University of MichiganDearbornUSA

Section editors and affiliations

  • Haojin Zhu
    • 1
  • Jian Shen
    • 2
  1. 1.Shanghai Jiaotong University, ChinaShanghaiChina
  2. 2.Nanjing University of Information Science & Technology, ChinaNanjingChina