Abstract
Modern automobiles utilize numerous computerized systems to control and observe the state of the vehicle. These systems use in-vehicle networks to communicate with each other and make intelligent decisions. However, because of the increasing trend to offer connectivity between the in-vehicle network and external networks, automobiles are susceptible to several cyberattacks. This trend cannot continue unless the security of in-vehicle networks is enhanced to tackle all sorts of known and unknown attacks. This paper considers a multi-layered defense system for smart vehicles and models the in-vehicle security of the system. The model consists of a vehicle profile, communication profile, and considers several known defense mechanisms. The attacker profile is also captured based on its abilities and goals. We implement the proposed model in a probabilistic model checker and study the impact of a diverse attacker for a variety of defense profiles.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Aloqaily, M., Otoum, S., Al Ridhawi, I., Jararweh, Y.: An intrusion detection system for connected vehicles in smart cities. Ad Hoc Netw. 90, 101842 (2019). https://doi.org/10.1016/j.adhoc.2019.02.001
Buttigieg, R., Farrugia, M., Meli, C.: Security issues in controller area networks in automobiles. In: 2017 18th International Conference on Sciences and Techniques of Automatic Control and Computer Engineering (STA), pp. 93–98. IEEE (2017). https://doi.org/10.1109/STA.2017.8314877
Carsten, P., Andel, T.R., Yampolskiy, M., McDonald, J.T.: In-vehicle networks: attacks, vulnerabilities, and proposed solutions. In: Proceedings of the 10th Annual Cyber and Information Security Research Conference, p. 1. ACM (2015). https://doi.org/10.1145/2746266.2746267
Cho, K.T., Shin, K.G.: Fingerprinting electronic control units for vehicle intrusion detection. In: 25th \(\{\)USENIX\(\}\) Security Symposium (\(\{\)USENIX\(\}\) Security 16), pp. 911–927 (2016). https://dl.acm.org/citation.cfm?id=3241165
Costantino, G., La Marra, A., Martinelli, F., Matteucci, I.: Candy: a social engineering attack to leak information from infotainment system. In: 2018 IEEE 87th Vehicular Technology Conference (VTC Spring), pp. 1–5. IEEE (2018). https://doi.org/10.1109/VTCSpring.2018.8417879
Fysarakis, K., Askoxylakis, I., Katos, V., Ioannidis, S., Marinos, L.: Security Concerns in Co-operative Intelligent Transportation Systems (2017). https://doi.org/10.1201/b21885-16
Guo, J., Song, B., He, Y., Yu, F.R., Sookhak, M.: A survey on compressed sensing in vehicular infotainment systems. IEEE Commun. Surv. Tutorials 19(4), 2662–2680 (2017). https://doi.org/10.1109/COMST.2017.2705027
Hartzell, S., Stubel, C.: Automobile CAN bus network security and vulnerabilities (2018). https://canvas.uw.edu/files/47669787/download?download_frd=1
Huang, Y., He Qin, G., Liu, T., Dan Wang, X.: Strategy for ensuring in-vehicle infotainment security. Appl. Mech. Mater. 556–562, 5460–5465 (2014). https://doi.org/10.4028/www.scientific.net/AMM.556-562.5460
Kang, M.J., Kang, J.W.: Intrusion detection system using deep neural network for in-vehicle network security. PloS One 11(6), e0155781 (2016). https://doi.org/10.1371/journal.pone.0155781
Liu, J., Zhang, S., Sun, W., Shi, Y.: In-vehicle network attacks and countermeasures: challenges and future directions. IEEE Netw. 31(5), 50–58 (2017). https://doi.org/10.1109/MNET.2017.1600257
Mazloom, S., Rezaeirad, M., Hunter, A., McCoy, D.: A security analysis of an in-vehicle infotainment and app platform. In: 10th \(\{\)USENIX\(\}\) Workshop on Offensive Technologies (\(\{\)WOOT\(\}\) 16) (2016). https://www.usenix.org/conference/woot16/workshop-program/presentation/mazloom
ben Othmane, L., Dhulipala, L., Abdelkhalek, M., Govindarasu, M., Multari, N.: Detection of injection attacks in in-vehicle networks (2019). https://lib.dr.iastate.edu/ece_conf/72
Wang, Q., Sawhney, S.: Vecure: a practical security framework to protect the CAN bus of vehicles. In: 2014 International Conference on the Internet of Things (IoT), pp. 13–18 (2014). https://doi.org/10.1109/IOT.2014.7030108
Willke, T.L., Tientrakool, P., Maxemchuk, N.F.: A survey of inter-vehicle communication protocols and their applications. IEEE Commun. Surv. Tutorials 11(2), 3–20 (2009). https://doi.org/10.1109/SURV.2009.090202
Wu, Y., Kim, Y.-J., Piao, Z., Chung, J., Kim, Y.-E.: Security protocol for controller area network using ECANDC compression algorithm. In: 2016 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC), pp. 1–4 (2016). https://doi.org/10.1109/ICSPCC.2016.7753631
Zhang, T., Antunes, H., Aggarwal, S.: Defending connected vehicles against malware: challenges and a solution framework. IEEE Internet Things J. 1(1), 10–21 (2014). https://doi.org/10.1109/JIOT.2014.2302386
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Mohammad, N., Muhammad, S., Shaikh, E. (2019). Analysis of In-vehicle Security System of Smart Vehicles. In: Doss, R., Piramuthu, S., Zhou, W. (eds) Future Network Systems and Security. FNSS 2019. Communications in Computer and Information Science, vol 1113. Springer, Cham. https://doi.org/10.1007/978-3-030-34353-8_15
Download citation
DOI: https://doi.org/10.1007/978-3-030-34353-8_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-34352-1
Online ISBN: 978-3-030-34353-8
eBook Packages: Computer ScienceComputer Science (R0)