Cybersecurity for autonomous vehicles: Review of attacks and defense
Tóm tắt
Từ khóa
Tài liệu tham khảo
Al-Kahtani, 2012, Survey on security attacks in Vehicular Ad hoc Networks (VANETs)
al-Khateeb, 2018, Proactive threat detection for connected cars using recursive bayesian estimation, IEEE Sens J, 18, 4822, 10.1109/JSEN.2017.2782751
Agrawal, 2019, CAN-FD-Sec: Improving Security of CAN-FD Protocol, 11552
Ahmad, 2019, Securing smart vehicles from relay attacks using machine learning, J Supercomput, 1
Alcaraz, 2012, Analysis of requirements for critical control systems, International journal of critical infrastructure protection, 5, 137, 10.1016/j.ijcip.2012.08.003
Alcaraz, 2017, OCPP protocol: security threats and challenges, IEEE Trans Smart Grid, 8, 2452, 10.1109/TSG.2017.2669647
Amoozadeh, 2015, Security vulnerabilities of connected vehicle streams and their impact on cooperative driving, IEEE Communications Magazine, 53, 126, 10.1109/MCOM.2015.7120028
Andel, 2019, Towards Protection Mechanisms for Secure and Efficient CAN Operation
Bacchus, Mark, Coronado, Alexander, Gutierrez, Maria A. 2017. The insights into car hacking.
Bariah, 2015, Recent Advances in VANET Security: A Survey
Bayer, 2015, Security crash test-practical security evaluations of automotive onboard it components, Automotive-Safety & Security, 2014
Bécsi, 2015, Security issues and vulnerabilities in connected car systems
Berlin, 2016, Poster: anomaly-based misbehaviour detection in connected car backends
Bolovinou, 2019, TARA+: controllability-aware Threat Analysis and Risk Assessment for L3 Automated Driving Systems
Boudguiga, 2016, A simple intrusion detection method for controller area network
Brooks, 2009, Automobile security concerns, IEEE Vehicular Technology Magazine, 4, 52, 10.1109/MVT.2009.932539
Burakova, 2016, Truck Hacking: an Experimental Analysis of the SAE J1939 Standard
Cai, 2019, 0-days & Mitigations: Roadways to Exploit and Secure Connected BMW Cars, Black Hat USA, 2019, 39
Cheah, 2016, Combining Third Party Components Securely in Automotive Systems
Cheah, 2017, Towards a systematic security evaluation of the automotive Bluetooth interface, Vehicular Communications, 9, 8, 10.1016/j.vehcom.2017.02.008
Cheah, 2018, Building an automotive security assurance case using systematic security evaluations, Computers & Security, 77, 360, 10.1016/j.cose.2018.04.008
Checkoway, 2011, Comprehensive Experimental Analyses of Automotive Attack Surfaces
Cho, 2016, Fingerprinting Electronic Control Units for Vehicle Intrusion Detection
Choi, 2018, VoltageIDS: Low-Level Communication Characteristics for Automotive Intrusion Detection System, IEEE Transactions on Information Forensics and Security, 13, 2114, 10.1109/TIFS.2018.2812149
Dardanelli, 2013, A Security Layer for Smartphone-to-Vehicle Communication Over Bluetooth, IEEE Embed Syst Lett, 5, 34, 10.1109/LES.2013.2264594
Dürrwang, 2018, Enhancement of Automotive Penetration Testing with Threat Analyses Results, SAE International Journal of Transportation Cybersecurity and Privacy, 1, 91, 10.4271/11-01-02-0005
Eiza, 2017, Driving with Sharks: Rethinking Connected Vehicles with Vehicle Cybersecurity, IEEE Vehicular Technology Magazine, 12, 45, 10.1109/MVT.2017.2669348
El-Rewini, 2019, Cybersecurity challenges in vehicular communications, Vehicular Communications
Eriksson, 2019, On the road with third-party apps: security analysis of an in-vehicle app platform
Foster, 2015, Fast and Vulnerable: a Story of Telematic Failures
Fowler, 2017, Towards a Testbed for Automotive Cybersecurity
Fowler, 2019, A Method for Constructing Automotive Cybersecurity Tests, a CAN Fuzz Testing Example
Francillon, 2011, Relay attacks on passive keyless entry and start systems in modern cars
Fröschle, 2017, Analyzing the capabilities of the CAN attacker
Garcia, 2016, Lock It and Still Lose It-on the (In) Security of Automotive Remote Keyless Entry Systems
Gmiden, 2016, An intrusion detection method for securing in-vehicle CAN bus
Groll, 2009, Secure and authentic communication on existing in-vehicle networks
Groza, 2013, Efficient protocols for secure broadcast in controller area networks, IEEE Transactions on Industrial Informatics, 9, 2034, 10.1109/TII.2013.2239301
Groza, 2017, LiBrA-CAN: A Lightweight Broadcast Authentication Protocol for Controller Area Networks, ACM Transactions on Embedded Computing Systems (TECS), 16, 90, 10.1145/3056506
Gupta, 2018, Authorization Framework for Secure Cloud Assisted Connected Cars and Vehicular Internet of Things
Halahan, 2017, Wireless Security Within New Model Vehicles, Journal of Information Warfare, 16, 51
Hamad, 2019, Red-Zone: towards an Intrusion Response Framework for Intra-Vehicle System
Han, 2015, A statistical-based anomaly detection method for connected cars in internet of things environment
Han, 2018, Anomaly intrusion detection method for vehicular networks based on survival analysis, Vehicular communications, 14, 52, 10.1016/j.vehcom.2018.09.004
Hasrouny, 2017, VANet security challenges and solutions: a survey, Vehicular Communications, 7, 7, 10.1016/j.vehcom.2017.01.002
Hazem, 2012, LCAP - A Lightweight CAN Authentication Protocol for Securing In-Vehicle Networks, 6
Henniger, 2009, Security requirements for automotive on-board networks
Herrewege, 2011, CANAuth-a simple, backward compatible broadcast authentication protocol for CAN bus, 2011
Hoppe, 2007, Sniffing/Replay Attacks on CAN Buses: a simulated attack on the electric window lift classified using an adapted CERT taxonomy
Hoppe, 2008, Security threats to automotive CAN networks–practical examples and selected short-term countermeasures
Hoppe, 2009, Applying intrusion detection to automotive IT-early insights and remaining challenges, Journal of Information Assurance and Security (JIAS), 4, 226
Roufa, 2010, Security and privacy vulnerabilities of in-car wireless networks: a tire pressure monitoring system case study, 19th USENIX Security Symposium
Islam, 2016, A risk assessment framework for automotive embedded systems
Islam, 2018, A robust and efficient password-based conditional privacy preserving authentication and group-key agreement protocol for VANETs, Future Generation Computer Systems, 84, 216, 10.1016/j.future.2017.07.002
ISO. 2015 (November). ISO 11898-1:2015, Road vehicles – Controller area network (CAN). online, accessed 4/11/19. https://www.iso.org/standard/63648.html.
Jafarnejad, 2015, A car hacking experiment: when connectivity meets vulnerability
Kang, 2016, Intrusion detection system using deep neural network for in-vehicle network security, PLoS ONE, 11, 10.1371/journal.pone.0155781
Karray, 2018, Attack Tree Construction and Its Application to the Connected Vehicle
Keen Security Lab of Tencent. 2017 (July). New Car Hacking Research: 2017, Remote Attack Tesla Motors Again. online, accessed 7/27/17. https://keenlab.tencent.com/en/2017/07/27/New-Car-Hacking-Research-2017-Remote-Attack-Tesla-Motors-Again/.
Khatoun, 2016, Smart cities: concepts, architectures, research opportunities, Commun ACM, 59, 46, 10.1145/2858789
Khurram, 2016, Enhancing connected car adoption: security framework
Kim, 2008, A gateway system for an automotive system: LIN, CAN, and FlexRay
Kleberger, 2011, Security aspects of the in-vehicle network in the connected car
Kneib, 2018, Scission: signal Characteristic-Based Sender Identification and Intrusion Detection in Automotive Networks
Kong, 2017, Millimeter-wave wireless communications for IoT-cloud supported autonomous vehicles: overview, design, and challenges, IEEE Communications Magazine, 55, 62, 10.1109/MCOM.2017.1600422CM
Kornaros, 2019, TrustNet: ensuring Normal-world and Trusted-world CAN-bus Networking
Koscher, 2010, Experimental security analysis of a modern automobile
Kukkala, 2017, JAMS: jitter-Aware Message Scheduling for FlexRay Automotive Networks
Larson, 2008, Securing vehicles against cyber attacks
Larson, 2008, An approach to specification-based attack detection for in-vehicle networks
Lee, 2014, Message Propagation based on Three Types of Density Classification for Smooth and Secure Vehicular Traffic Flow, International Journal of Multimedia and Ubiquitous Engineering, 9, 383, 10.14257/ijmue.2014.9.12.34
Li, 2017, Poster: intrusion detection system for in-vehicle networks using sensor correlation and integration
Lee, 2017, OTIDS: A Novel Intrusion Detection System for In-vehicle Network by Using Remote Frame
Li, 2018, Connected Vehicles’ Security from the Perspective of the In-Vehicle Network, IEEE Netw, 32, 58, 10.1109/MNET.2018.1700319
Lim, 2018, Autonomous vehicle ultrasonic sensor vulnerability and impact assessment
Lim, 2016, Analysis on Attack Scenarios and Countermeasures for Self-driving Car and Its Infrastructures
Lin, 2012, Cyber-security for the Controller Area Network (CAN) communication protocol
Ling, 2012, An algorithm for detection of malicious messages on CAN buses
Liu, 2017, In-vehicle network attacks and countermeasures: challenges and future directions, IEEE Netw, 31, 50, 10.1109/MNET.2017.1600257
Lokman, 2019, Intrusion detection system for automotive Controller Area Network (CAN) bus system: a review, EURASIP J Wirel Commun Netw, 2019, 184, 10.1186/s13638-019-1484-3
Longari, 2019, CopyCAN: an Error-Handling Protocol based Intrusion Detection System for Controller Area Network
Lu, 2018, A survey on recent advances in vehicular network security, trust, and privacy, IEEE Transactions on Intelligent Transportation Systems, 1
Luo, 2019
Macher, 2016, Threat and risk assessment methodologies in the automotive domain, Procedia Comput Sci, 83, 1288, 10.1016/j.procs.2016.04.268
Maglaras, 2015, A novel distributed intrusion detection system for vehicular ad hoc networks, International Journal of Advanced Computer Science and Applications (IJACSA), 6, 101
Makowitz, 2006, FlexRay-A communication network for automotive control systems
Malhi, 2020, Security of vehicular ad-hoc networks: a comprehensive survey, Computers & Security, 89, 10.1016/j.cose.2019.101664
Maple, 2019, A Connected and Autonomous Vehicle Reference Architecture for Attack Surface Analysis, Applied Sciences, 9, 5101, 10.3390/app9235101
Marchetti, 2017, Anomaly detection of CAN bus messages through analysis of ID sequences
Marchetti, 2016, Evaluation of anomaly detection for in-vehicle networks through information-theoretic algorithms
Martinelli, 2017, Car hacking identification through fuzzy logic algorithms
Mawonde, 2018, A Survey on Vehicle Security Systems: approaches and Technologies
Mazloom, 2016, A security analysis of an in-vehicle infotainment and app platform
Miller, 2019, Lessons learned from hacking a car, IEEE Design & Test, 36, 7, 10.1109/MDAT.2018.2863106
Miller, 2013, Adventures in automotive networks and control units, Def Con, 21, 260
Miller, 2014, A survey of remote automotive attack surfaces, black hat USA, 2014, 94
Miller, 2015, Remote exploitation of an unaltered passenger vehicle, Black Hat USA, 2015, 91
Moore, 2017, Modeling inter-signal arrival times for accurate detection of CAN bus signal injection attacks: a data-driven approach to in-vehicle intrusion detection
Morris, 2018, Cybersecurity and the auto industry: the growing challenges presented by connected cars, International journal of automotive technology and management, 18, 105, 10.1504/IJATM.2018.092187
Müter, 2011, Entropy-based anomaly detection for in-vehicle networks
Müter, 2010, A structured approach to anomaly detection for in-vehicle networks
Narayanan, 2016, OBD_SecureAlert: an anomaly detection system for vehicles
Nasser, 2019, Defending AUTOSAR Safety Critical Systems Against Code Reuse Attacks
Nie, 2017, Free-Fall: hacking Tesla from Wireless to Can Bus, Briefing, Black Hat USA
Nilsson, 2008, Efficient in-vehicle delayed data authentication based on compound message authentication codes
Nilsson, 2009, A first simulation of attacks in the automotive network communications protocol flexray
Nolte, 2005, Automotive communications-past, current and future, 1
Oguma, 2008, New attestation based security architecture for in-vehicle communication
Olufowobi, 2019, Controller Area Network Intrusion Prevention System Leveraging Fault Recovery
Othmane, 2014, Likelihood of threats to connected vehicles, International Journal of Next-Generation Computing (IJNGC), 5, 1
Palanca, 2017, A stealth, selective, link-layer denial-of-service attack against automotive networks
Pan, 2017, Cyber security attacks to modern vehicular systems, Journal of information security and applications, 36, 90, 10.1016/j.jisa.2017.08.005
Parkinson, 2017, Cyber threats facing autonomous and connected vehicles: future challenges, IEEE transactions on intelligent transportation systems, 18, 2898, 10.1109/TITS.2017.2665968
Tyagi, 2014, Investigating the security threats in vehicular ad hoc networks (VANETs): towards security engineering for safer on-road transportation
Payne, 2019, Car Hacking: Accessing and Exploiting the CAN Bus Protocol, Journal of Cybersecurity Education, Research and Practice, 2019, 5, 10.62915/2472-2707.1045
Pekaric, 2019, Applying Security Testing Techniques to Automotive Engineering
Petit, 2015, Potential cyberattacks on automated vehicles, IEEE Transactions on Intelligent Transportation Systems, 16, 546
Reger, 2016, 1.4 The road ahead for securely-connected cars
Rizvi, 2017, A threat to vehicular cyber security and the urgency for correction, Procedia Comput Sci, 114, 100, 10.1016/j.procs.2017.09.021
Rubio, 2018, Addressing Security in OCPP: protection Against Man-in-the-Middle Attacks
Salfer, 2015, Attack surface and vulnerability assessment of automotive Electronic Control Units, 4
Salfer, 2014, Efficient attack forest construction for automotive on-board networks
Schulze, 2009, On the Need of Data Management in Automotive Systems, 144
Seo, 2018, GIDS: GAN based Intrusion Detection System for In-Vehicle Network
Sharma, 2018, A survey on Intrusion Detection Systems and Honeypot based proactive security mechanisms in VANETs and VANET Cloud, Vehicular Communications, 12, 138, 10.1016/j.vehcom.2018.04.005
Sheehan, 2018, Connected and autonomous vehicles: a cyber-risk classification framework, Transportation Research Part A: Policy and Practice
Shrestha, 2019, Regional blockchain for vehicular networks to prevent 51% attacks, IEEE Access, 7, 95021, 10.1109/ACCESS.2019.2928753
Shukla, 2016
Smith, 2016
Song, 2016, Intrusion detection system based on the analysis of time intervals of CAN messages for in-vehicle network
Song, 2019, In-vehicle network intrusion detection using deep convolutional neural network, Vehicular Communications, 21
Strandberg, 2018, Securing the connected car: a security-enhancement methodology, IEEE vehicular technology magazine, 13, 56, 10.1109/MVT.2017.2758179
Straub, 2017, CyberSecurity considerations for an interconnected self-driving car system of systems
Studnia, 2013, Security of embedded automotive networks: state of the art and a research proposal
Studnia, 2018, A language-based intrusion detection approach for automotive embedded networks, International Journal of Embedded Systems, 10, 10.1504/IJES.2018.089430
Takefuji, 2018, Connected Vehicle Security Vulnerabilities [Commentary], IEEE Technology and Society Magazine, 37, 15, 10.1109/MTS.2018.2795093
Talib, 2018, Systematic literature review on Internet-of-Vehicles communication security, International Journal of Distributed Sensor Networks, 14
Tang, 2019, Future Intelligent and Secure Vehicular Network Toward 6G: machine-Learning Approaches, Proceedings of the IEEE
Taylor, 2015, Frequency-based anomaly detection for the automotive CAN bus
Taylor, 2016, Anomaly detection in automobile control network data with long short-term memory networks
Tettamanti, 2016, Impacts of autonomous cars from a traffic engineering perspective, Periodica Polytechnica. Transportation Engineering, 44, 244, 10.3311/PPtr.9464
The Economist. 2013 (April). How does a self-driving car work?online, accessed 12/05/15. https://www.economist.com/blogs/economistexplains/2013/04/economist-explains-how-self-driving-car-works-driverless.
Thing, 2016, Autonomous vehicle security: a taxonomy of attacks and defences
Tod Beardsley. 2017 (April). R7-2017-02: hyundai Blue Link Potential Info Disclosure (FIXED). online, accessed 25/04/17. https://blog.rapid7.com/2017/04/25/r7-2017-02-hyundai-blue-link-potential-info-disclosure-fixed/.
Tomlinson, 2018, Detection of Automotive CAN Cyber-Attacks by Identifying Packet Timing Anomalies in Time Windows
Tomlinson, 2018, Towards Viable Intrusion Detection Methods For The Automotive Controller Area Network
Verdult, 2012, Gone in 360 s: hijacking with Hitag2
Verdult, 2013, Dismantling Megamos Crypto: Wirelessly Lockpicking a Vehicle Immobilizer
Voss, 2008
Wang, 2018, Networking and Communications in Autonomous Driving: a Survey, IEEE Communications Surveys & Tutorials
Wang, 2014, VeCure: a practical security framework to protect the CAN bus of vehicles
Ward, 2013, Threat analysis and risk assessment in automotive cyber security, SAE International Journal of Passenger Cars-Electronic and Electrical Systems, 6, 507, 10.4271/2013-01-1415
Woo, 2015, A practical wireless attack on the connected car and security protocol for in-vehicle CAN, IEEE Transactions on Intelligent Transportation Systems, 16, 993
Woo, 2019, CAN ID Shuffling Technique (CIST): Moving Target Defense Strategy for Protecting In-Vehicle CAN, IEEE Access, 7, 15521, 10.1109/ACCESS.2019.2892961
Wyglinski, 2013, Security of autonomous systems employing embedded computing and sensors, IEEE micro, 33, 80, 10.1109/MM.2013.18
Xiong, 2019, Threat Modeling of Connected Vehicles: a privacy analysis and extension of vehicleLang
Yadav, 2016, Security, vulnerability and protection of vehicular on-board diagnostics, International Journal of Security and Its Applications, 10, 405, 10.14257/ijsia.2016.10.4.36
Yadereli, 2015, A study on cyber-security of autonomous and unmanned vehicles, The Journal of Defense Modeling and Simulation, 12, 369, 10.1177/1548512915575803
Yan, 2016, Can you trust autonomous vehicles: contactless attacks against sensors of self-driving vehicle, 24
Yan, 2015, A two-year survey on security challenges in automotive threat landscape
Yeh, 2018
Zhang, 2018, Test and Evaluation System for Automotive Cybersecurity
Zheng, 2016, CONVINCE: a cross-layer modeling, exploration and validation framework for next-generation connected vehicles
Zhou, 2019, BTMonitor: bit-time-based Intrusion Detection and Attacker Identification in Controller Area Network, ACM Transactions on Embedded Computing Systems (TECS), 18, 1, 10.1145/3362034
Zoppelt, Markus, & Kolagari, Ramin Tavakoli. 2019. UnCle SAM: modeling Cloud Attacks with the Automotive Security Abstraction Model.