Abstract
The Intelligent Connected Vehicle (ICV) related to the communication of the stakeholders has become a large and open ecosystem. From the automobile ecosystem, it can be found that there are many attack entrances everywhere, which will bring a lot of risks and threats. In this work, we have summarized the seven major attack entrances of automobile cyber security, and proposed the corresponding six key protection strategies of intelligent and connected vehicle.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Ashibani, Y., Mahmoud, Q.H.: Cyber physical systems security: analysis, challenges and solutions. Comput. Secur. 68, 81–97 (2017)
Chen, L.W., Syue, K.Z., Tseng, Y.C.: A vehicular surveillance and sensing system for car security and tracking applications. In: Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN 2010), pp. 426–427 (2010)
Okul, Ş., Aydin, M.A., Keleş, F.: Security problems and attacks on smart cars. In: Boyaci, A., Ekti, A.R., Aydin, M.A., Yarkan, S. (eds.) International Telecommunications Conference. LNEE, vol. 504, pp. 203–213. Springer, Singapore (2019). https://doi.org/10.1007/978-981-13-0408-8_17
Wolf, M., Weimerskirch, A., Wollinger, T.: State of the art: embedding security in vehicles. EURSIP J. Embed. Syst. 16(1) (2007)
Lee, C.H., Kim, K.H.: Implementation of IoT system using block chain with authentication and data protection. In: 2018 International Conference on Information Networking (ICOIN), pp. 936–940. IEEE (2018)
Alfred, J.R., Sidorov, S., Tsang, M.C., et al.: In-vehicle networking. U.S. Patent Application 15/270,957, 22 March 2018
Wroblewski, G.: General method of program code obfuscation (2002)
Pizzolotto, D., Fellin, R., Ceccato, M.: OBLIVE: seamless code obfuscation for Java programs and Android apps. In: 2019 IEEE 26th International Conference on Software Analysis, Evolution and Reengineering (SANER), pp. 629–633. IEEE (2019)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Wang, Z., Wang, Y., Zhang, Y., Liu, Y., Ma, C., Wang, H. (2019). A Brief Survey on Cyber Security Attack Entrances and Protection Strategies of Intelligent Connected Vehicle. In: Qiu, M. (eds) Smart Computing and Communication. SmartCom 2019. Lecture Notes in Computer Science(), vol 11910. Springer, Cham. https://doi.org/10.1007/978-3-030-34139-8_8
Download citation
DOI: https://doi.org/10.1007/978-3-030-34139-8_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-34138-1
Online ISBN: 978-3-030-34139-8
eBook Packages: Computer ScienceComputer Science (R0)