Cybersecurity for autonomous vehicles: Review of attacks and defense

Computers & Security - Tập 103 - Trang 102150 - 2021
Kyounggon Kim1,2, Jun Seok Kim2, Seong Hoon Jeong2, Jo-Hee Park3, Huy Kang Kim2
1Department of Forensics Science, Naif Arab University for Security Sciences, Riyadh, Kingdom of Saudi Arabia
2School of Cybersecurity, Korea University, Seoul, Republic of Korea
3TMS security TFT, Hyundai Motor Company, Republic of Korea

Tóm tắt

Từ khóa


Tài liệu tham khảo

Al-Kahtani, 2012, Survey on security attacks in Vehicular Ad hoc Networks (VANETs)

al-Khateeb, 2018, Proactive threat detection for connected cars using recursive bayesian estimation, IEEE Sens J, 18, 4822, 10.1109/JSEN.2017.2782751

Agrawal, 2019, CAN-FD-Sec: Improving Security of CAN-FD Protocol, 11552

Ahmad, 2019, Securing smart vehicles from relay attacks using machine learning, J Supercomput, 1

Alcaraz, 2012, Analysis of requirements for critical control systems, International journal of critical infrastructure protection, 5, 137, 10.1016/j.ijcip.2012.08.003

Alcaraz, 2017, OCPP protocol: security threats and challenges, IEEE Trans Smart Grid, 8, 2452, 10.1109/TSG.2017.2669647

Amoozadeh, 2015, Security vulnerabilities of connected vehicle streams and their impact on cooperative driving, IEEE Communications Magazine, 53, 126, 10.1109/MCOM.2015.7120028

Andel, 2019, Towards Protection Mechanisms for Secure and Efficient CAN Operation

Bacchus, Mark, Coronado, Alexander, Gutierrez, Maria A. 2017. The insights into car hacking.

Bariah, 2015, Recent Advances in VANET Security: A Survey

Bayer, 2015, Security crash test-practical security evaluations of automotive onboard it components, Automotive-Safety & Security, 2014

Bécsi, 2015, Security issues and vulnerabilities in connected car systems

Berlin, 2016, Poster: anomaly-based misbehaviour detection in connected car backends

Bolovinou, 2019, TARA+: controllability-aware Threat Analysis and Risk Assessment for L3 Automated Driving Systems

Boudguiga, 2016, A simple intrusion detection method for controller area network

Brooks, 2009, Automobile security concerns, IEEE Vehicular Technology Magazine, 4, 52, 10.1109/MVT.2009.932539

Burakova, 2016, Truck Hacking: an Experimental Analysis of the SAE J1939 Standard

Cai, 2019, 0-days & Mitigations: Roadways to Exploit and Secure Connected BMW Cars, Black Hat USA, 2019, 39

Cheah, 2016, Combining Third Party Components Securely in Automotive Systems

Cheah, 2017, Towards a systematic security evaluation of the automotive Bluetooth interface, Vehicular Communications, 9, 8, 10.1016/j.vehcom.2017.02.008

Cheah, 2018, Building an automotive security assurance case using systematic security evaluations, Computers & Security, 77, 360, 10.1016/j.cose.2018.04.008

Checkoway, 2011, Comprehensive Experimental Analyses of Automotive Attack Surfaces

Cho, 2016, Fingerprinting Electronic Control Units for Vehicle Intrusion Detection

Choi, 2018, VoltageIDS: Low-Level Communication Characteristics for Automotive Intrusion Detection System, IEEE Transactions on Information Forensics and Security, 13, 2114, 10.1109/TIFS.2018.2812149

Dardanelli, 2013, A Security Layer for Smartphone-to-Vehicle Communication Over Bluetooth, IEEE Embed Syst Lett, 5, 34, 10.1109/LES.2013.2264594

Dürrwang, 2018, Enhancement of Automotive Penetration Testing with Threat Analyses Results, SAE International Journal of Transportation Cybersecurity and Privacy, 1, 91, 10.4271/11-01-02-0005

Eiza, 2017, Driving with Sharks: Rethinking Connected Vehicles with Vehicle Cybersecurity, IEEE Vehicular Technology Magazine, 12, 45, 10.1109/MVT.2017.2669348

El-Rewini, 2019, Cybersecurity challenges in vehicular communications, Vehicular Communications

Engoulou, 2014, VANET security surveys, Comput Commun, 44, 1, 10.1016/j.comcom.2014.02.020

Eriksson, 2019, On the road with third-party apps: security analysis of an in-vehicle app platform

Foster, 2015, Fast and Vulnerable: a Story of Telematic Failures

Fowler, 2017, Towards a Testbed for Automotive Cybersecurity

Fowler, 2019, A Method for Constructing Automotive Cybersecurity Tests, a CAN Fuzz Testing Example

Francillon, 2011, Relay attacks on passive keyless entry and start systems in modern cars

Fröschle, 2017, Analyzing the capabilities of the CAN attacker

Garcia, 2016, Lock It and Still Lose It-on the (In) Security of Automotive Remote Keyless Entry Systems

Gmiden, 2016, An intrusion detection method for securing in-vehicle CAN bus

Groll, 2009, Secure and authentic communication on existing in-vehicle networks

Groza, 2013, Efficient protocols for secure broadcast in controller area networks, IEEE Transactions on Industrial Informatics, 9, 2034, 10.1109/TII.2013.2239301

Groza, 2017, LiBrA-CAN: A Lightweight Broadcast Authentication Protocol for Controller Area Networks, ACM Transactions on Embedded Computing Systems (TECS), 16, 90, 10.1145/3056506

Gupta, 2018, Authorization Framework for Secure Cloud Assisted Connected Cars and Vehicular Internet of Things

Halahan, 2017, Wireless Security Within New Model Vehicles, Journal of Information Warfare, 16, 51

Hamad, 2019, Red-Zone: towards an Intrusion Response Framework for Intra-Vehicle System

Han, 2015, A statistical-based anomaly detection method for connected cars in internet of things environment

Han, 2018, Anomaly intrusion detection method for vehicular networks based on survival analysis, Vehicular communications, 14, 52, 10.1016/j.vehcom.2018.09.004

Hasrouny, 2017, VANet security challenges and solutions: a survey, Vehicular Communications, 7, 7, 10.1016/j.vehcom.2017.01.002

Hazem, 2012, LCAP - A Lightweight CAN Authentication Protocol for Securing In-Vehicle Networks, 6

Henniger, 2009, Security requirements for automotive on-board networks

Herrewege, 2011, CANAuth-a simple, backward compatible broadcast authentication protocol for CAN bus, 2011

Hoppe, 2007, Sniffing/Replay Attacks on CAN Buses: a simulated attack on the electric window lift classified using an adapted CERT taxonomy

Hoppe, 2008, Security threats to automotive CAN networks–practical examples and selected short-term countermeasures

Hoppe, 2009, Applying intrusion detection to automotive IT-early insights and remaining challenges, Journal of Information Assurance and Security (JIAS), 4, 226

Roufa, 2010, Security and privacy vulnerabilities of in-car wireless networks: a tire pressure monitoring system case study, 19th USENIX Security Symposium

Islam, 2016, A risk assessment framework for automotive embedded systems

Islam, 2018, A robust and efficient password-based conditional privacy preserving authentication and group-key agreement protocol for VANETs, Future Generation Computer Systems, 84, 216, 10.1016/j.future.2017.07.002

ISO. 2015 (November). ISO 11898-1:2015, Road vehicles – Controller area network (CAN). online, accessed 4/11/19. https://www.iso.org/standard/63648.html.

Jafarnejad, 2015, A car hacking experiment: when connectivity meets vulnerability

Kang, 2016, Intrusion detection system using deep neural network for in-vehicle network security, PLoS ONE, 11, 10.1371/journal.pone.0155781

Karray, 2018, Attack Tree Construction and Its Application to the Connected Vehicle

Keen Security Lab of Tencent. 2017 (July). New Car Hacking Research: 2017, Remote Attack Tesla Motors Again. online, accessed 7/27/17. https://keenlab.tencent.com/en/2017/07/27/New-Car-Hacking-Research-2017-Remote-Attack-Tesla-Motors-Again/.

Khatoun, 2016, Smart cities: concepts, architectures, research opportunities, Commun ACM, 59, 46, 10.1145/2858789

Khurram, 2016, Enhancing connected car adoption: security framework

Kim, 2008, A gateway system for an automotive system: LIN, CAN, and FlexRay

Kleberger, 2011, Security aspects of the in-vehicle network in the connected car

Kneib, 2018, Scission: signal Characteristic-Based Sender Identification and Intrusion Detection in Automotive Networks

Kong, 2017, Millimeter-wave wireless communications for IoT-cloud supported autonomous vehicles: overview, design, and challenges, IEEE Communications Magazine, 55, 62, 10.1109/MCOM.2017.1600422CM

Kornaros, 2019, TrustNet: ensuring Normal-world and Trusted-world CAN-bus Networking

Koscher, 2010, Experimental security analysis of a modern automobile

Kukkala, 2017, JAMS: jitter-Aware Message Scheduling for FlexRay Automotive Networks

Larson, 2008, Securing vehicles against cyber attacks

Larson, 2008, An approach to specification-based attack detection for in-vehicle networks

Learning About Electronics. 2018

Lee, 2014, Message Propagation based on Three Types of Density Classification for Smooth and Secure Vehicular Traffic Flow, International Journal of Multimedia and Ubiquitous Engineering, 9, 383, 10.14257/ijmue.2014.9.12.34

Li, 2017, Poster: intrusion detection system for in-vehicle networks using sensor correlation and integration

Lee, 2017, OTIDS: A Novel Intrusion Detection System for In-vehicle Network by Using Remote Frame

Li, 2018, Connected Vehicles’ Security from the Perspective of the In-Vehicle Network, IEEE Netw, 32, 58, 10.1109/MNET.2018.1700319

Lim, 2018, Autonomous vehicle ultrasonic sensor vulnerability and impact assessment

Lim, 2016, Analysis on Attack Scenarios and Countermeasures for Self-driving Car and Its Infrastructures

Lin, 2012, Cyber-security for the Controller Area Network (CAN) communication protocol

Ling, 2012, An algorithm for detection of malicious messages on CAN buses

Liu, 2017, In-vehicle network attacks and countermeasures: challenges and future directions, IEEE Netw, 31, 50, 10.1109/MNET.2017.1600257

Lokman, 2019, Intrusion detection system for automotive Controller Area Network (CAN) bus system: a review, EURASIP J Wirel Commun Netw, 2019, 184, 10.1186/s13638-019-1484-3

Longari, 2019, CopyCAN: an Error-Handling Protocol based Intrusion Detection System for Controller Area Network

Lu, 2018, A survey on recent advances in vehicular network security, trust, and privacy, IEEE Transactions on Intelligent Transportation Systems, 1

Luo, 2019

Macher, 2016, Threat and risk assessment methodologies in the automotive domain, Procedia Comput Sci, 83, 1288, 10.1016/j.procs.2016.04.268

Maglaras, 2015, A novel distributed intrusion detection system for vehicular ad hoc networks, International Journal of Advanced Computer Science and Applications (IJACSA), 6, 101

Makowitz, 2006, FlexRay-A communication network for automotive control systems

Malhi, 2020, Security of vehicular ad-hoc networks: a comprehensive survey, Computers & Security, 89, 10.1016/j.cose.2019.101664

Maple, 2019, A Connected and Autonomous Vehicle Reference Architecture for Attack Surface Analysis, Applied Sciences, 9, 5101, 10.3390/app9235101

Marchetti, 2017, Anomaly detection of CAN bus messages through analysis of ID sequences

Marchetti, 2016, Evaluation of anomaly detection for in-vehicle networks through information-theoretic algorithms

Martinelli, 2017, Car hacking identification through fuzzy logic algorithms

Mawonde, 2018, A Survey on Vehicle Security Systems: approaches and Technologies

Mazloom, 2016, A security analysis of an in-vehicle infotainment and app platform

Miller, 2019, Lessons learned from hacking a car, IEEE Design & Test, 36, 7, 10.1109/MDAT.2018.2863106

Miller, 2013, Adventures in automotive networks and control units, Def Con, 21, 260

Miller, 2014, A survey of remote automotive attack surfaces, black hat USA, 2014, 94

Miller, 2015, Remote exploitation of an unaltered passenger vehicle, Black Hat USA, 2015, 91

Moore, 2017, Modeling inter-signal arrival times for accurate detection of CAN bus signal injection attacks: a data-driven approach to in-vehicle intrusion detection

Morris, 2018, Cybersecurity and the auto industry: the growing challenges presented by connected cars, International journal of automotive technology and management, 18, 105, 10.1504/IJATM.2018.092187

Müter, 2011, Entropy-based anomaly detection for in-vehicle networks

Müter, 2010, A structured approach to anomaly detection for in-vehicle networks

Narayanan, 2016, OBD_SecureAlert: an anomaly detection system for vehicles

Nasser, 2019, Defending AUTOSAR Safety Critical Systems Against Code Reuse Attacks

Nie, 2017, Free-Fall: hacking Tesla from Wireless to Can Bus, Briefing, Black Hat USA

Nilsson, 2008, Efficient in-vehicle delayed data authentication based on compound message authentication codes

Nilsson, 2009, A first simulation of attacks in the automotive network communications protocol flexray

Nolte, 2005, Automotive communications-past, current and future, 1

Oguma, 2008, New attestation based security architecture for in-vehicle communication

Olufowobi, 2019, Controller Area Network Intrusion Prevention System Leveraging Fault Recovery

Othmane, 2014, Likelihood of threats to connected vehicles, International Journal of Next-Generation Computing (IJNGC), 5, 1

Palanca, 2017, A stealth, selective, link-layer denial-of-service attack against automotive networks

Pan, 2017, Cyber security attacks to modern vehicular systems, Journal of information security and applications, 36, 90, 10.1016/j.jisa.2017.08.005

Parkinson, 2017, Cyber threats facing autonomous and connected vehicles: future challenges, IEEE transactions on intelligent transportation systems, 18, 2898, 10.1109/TITS.2017.2665968

Tyagi, 2014, Investigating the security threats in vehicular ad hoc networks (VANETs): towards security engineering for safer on-road transportation

Payne, 2019, Car Hacking: Accessing and Exploiting the CAN Bus Protocol, Journal of Cybersecurity Education, Research and Practice, 2019, 5, 10.62915/2472-2707.1045

Pekaric, 2019, Applying Security Testing Techniques to Automotive Engineering

Petit, 2015, Potential cyberattacks on automated vehicles, IEEE Transactions on Intelligent Transportation Systems, 16, 546

Reger, 2016, 1.4 The road ahead for securely-connected cars

Rizvi, 2017, A threat to vehicular cyber security and the urgency for correction, Procedia Comput Sci, 114, 100, 10.1016/j.procs.2017.09.021

Rubio, 2018, Addressing Security in OCPP: protection Against Man-in-the-Middle Attacks

Salfer, 2015, Attack surface and vulnerability assessment of automotive Electronic Control Units, 4

Salfer, 2014, Efficient attack forest construction for automotive on-board networks

Schulze, 2009, On the Need of Data Management in Automotive Systems, 144

Seo, 2018, GIDS: GAN based Intrusion Detection System for In-Vehicle Network

Sharma, 2018, A survey on Intrusion Detection Systems and Honeypot based proactive security mechanisms in VANETs and VANET Cloud, Vehicular Communications, 12, 138, 10.1016/j.vehcom.2018.04.005

Sheehan, 2018, Connected and autonomous vehicles: a cyber-risk classification framework, Transportation Research Part A: Policy and Practice

Shrestha, 2019, Regional blockchain for vehicular networks to prevent 51% attacks, IEEE Access, 7, 95021, 10.1109/ACCESS.2019.2928753

Shukla, 2016

Smith, 2016

Song, 2016, Intrusion detection system based on the analysis of time intervals of CAN messages for in-vehicle network

Song, 2019, In-vehicle network intrusion detection using deep convolutional neural network, Vehicular Communications, 21

Strandberg, 2018, Securing the connected car: a security-enhancement methodology, IEEE vehicular technology magazine, 13, 56, 10.1109/MVT.2017.2758179

Straub, 2017, CyberSecurity considerations for an interconnected self-driving car system of systems

Studnia, 2013, Security of embedded automotive networks: state of the art and a research proposal

Studnia, 2018, A language-based intrusion detection approach for automotive embedded networks, International Journal of Embedded Systems, 10, 10.1504/IJES.2018.089430

Takefuji, 2018, Connected Vehicle Security Vulnerabilities [Commentary], IEEE Technology and Society Magazine, 37, 15, 10.1109/MTS.2018.2795093

Talib, 2018, Systematic literature review on Internet-of-Vehicles communication security, International Journal of Distributed Sensor Networks, 14

Tang, 2019, Future Intelligent and Secure Vehicular Network Toward 6G: machine-Learning Approaches, Proceedings of the IEEE

Taylor, 2015, Frequency-based anomaly detection for the automotive CAN bus

Taylor, 2016, Anomaly detection in automobile control network data with long short-term memory networks

Tettamanti, 2016, Impacts of autonomous cars from a traffic engineering perspective, Periodica Polytechnica. Transportation Engineering, 44, 244, 10.3311/PPtr.9464

The Economist. 2013 (April). How does a self-driving car work?online, accessed 12/05/15. https://www.economist.com/blogs/economistexplains/2013/04/economist-explains-how-self-driving-car-works-driverless.

Thing, 2016, Autonomous vehicle security: a taxonomy of attacks and defences

Tod Beardsley. 2017 (April). R7-2017-02: hyundai Blue Link Potential Info Disclosure (FIXED). online, accessed 25/04/17. https://blog.rapid7.com/2017/04/25/r7-2017-02-hyundai-blue-link-potential-info-disclosure-fixed/.

Tomlinson, 2018, Detection of Automotive CAN Cyber-Attacks by Identifying Packet Timing Anomalies in Time Windows

Tomlinson, 2018, Towards Viable Intrusion Detection Methods For The Automotive Controller Area Network

Verdult, 2012, Gone in 360 s: hijacking with Hitag2

Verdult, 2013, Dismantling Megamos Crypto: Wirelessly Lockpicking a Vehicle Immobilizer

Voss, 2008

Wang, 2018, Networking and Communications in Autonomous Driving: a Survey, IEEE Communications Surveys & Tutorials

Wang, 2014, VeCure: a practical security framework to protect the CAN bus of vehicles

Ward, 2013, Threat analysis and risk assessment in automotive cyber security, SAE International Journal of Passenger Cars-Electronic and Electrical Systems, 6, 507, 10.4271/2013-01-1415

Woo, 2015, A practical wireless attack on the connected car and security protocol for in-vehicle CAN, IEEE Transactions on Intelligent Transportation Systems, 16, 993

Woo, 2019, CAN ID Shuffling Technique (CIST): Moving Target Defense Strategy for Protecting In-Vehicle CAN, IEEE Access, 7, 15521, 10.1109/ACCESS.2019.2892961

Wyglinski, 2013, Security of autonomous systems employing embedded computing and sensors, IEEE micro, 33, 80, 10.1109/MM.2013.18

Xiong, 2019, Threat Modeling of Connected Vehicles: a privacy analysis and extension of vehicleLang

Yadav, 2016, Security, vulnerability and protection of vehicular on-board diagnostics, International Journal of Security and Its Applications, 10, 405, 10.14257/ijsia.2016.10.4.36

Yadereli, 2015, A study on cyber-security of autonomous and unmanned vehicles, The Journal of Defense Modeling and Simulation, 12, 369, 10.1177/1548512915575803

Yan, 2016, Can you trust autonomous vehicles: contactless attacks against sensors of self-driving vehicle, 24

Yan, 2015, A two-year survey on security challenges in automotive threat landscape

Yeh, 2018

Zhang, 2018, Test and Evaluation System for Automotive Cybersecurity

Zheng, 2016, CONVINCE: a cross-layer modeling, exploration and validation framework for next-generation connected vehicles

Zhou, 2019, BTMonitor: bit-time-based Intrusion Detection and Attacker Identification in Controller Area Network, ACM Transactions on Embedded Computing Systems (TECS), 18, 1, 10.1145/3362034

Zoppelt, Markus, & Kolagari, Ramin Tavakoli. 2019. UnCle SAM: modeling Cloud Attacks with the Automotive Security Abstraction Model.