Skip to main content

Assessing Security of Internal Vehicle Networks

  • Conference paper
  • First Online:
Software Architecture. ECSA 2022 Tracks and Workshops (ECSA 2022)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13928))

Included in the following conference series:

  • 292 Accesses

Abstract

Automotive software grows exponentially in size. In premium vehicles, the size can reach over 100 million lines of code. One of the challenges in such a large software is how it is architecturally designed and whether this design leads to security vulnerabilities. In this paper, we report on a design science research study aimed at understanding the vulnerabilities of modern premium vehicles. We used machine learning to identify and reconstruct signals within the vehicle’s communication networks. The results show that the distributed software architectures can have security vulnerabilities due to the high connectivity of modern vehicles; and that the security needs to be seen holistically – both when constructing the vehicle’s software and when designing communication channels with cloud services. The paper proposed a number of measures that can help to address the identified vulnerabilities.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 89.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    For ethical reasons and the safety of passengers, we do not provide any details about the used hardware or software. Details can be obtained upon request (and approval by the industrial partner) by contacting the authors.

  2. 2.

    For ethical reasons, and the safety of passengers, we do not provide details about the equipment used to make intrusions.

References

  1. Staron, M.: Automotive Software Architectures. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-65939-4

    Book  Google Scholar 

  2. Sagstetter, F., et al.: Security challenges in automotive hardware/software architecture design. In: 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE), pp. 458–463. IEEE (2013)

    Google Scholar 

  3. Bayer, S., Enderle, T., Oka, D.-K., Wolf, M.: Automotive security testing—the digital crash test. In: Langheim, J. (ed.) Energy Consumption and Autonomous Driving. LNM, pp. 13–22. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-19818-7_2

    Chapter  Google Scholar 

  4. Rana, R., et al.: Evaluation of standard reliability growth models in the context of automotive software systems. In: Heidrich, J., Oivo, M., Jedlitschka, A., Baldassarre, M.T. (eds.) PROFES 2013. LNCS, vol. 7983, pp. 324–329. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-39259-7_26

    Chapter  Google Scholar 

  5. Sommer, F., Dürrwang, J., Kriesten, R.: Survey and classification of automotive security attacks. Information 10(4), 148 (2019)

    Article  Google Scholar 

  6. Koscher, K., et al.: Experimental security analysis of a modern automobile. In: 2010 IEEE Symposium on Security and Privacy, July 2010. https://doi.org/10.1109/sp.2010.34

  7. Buttigieg, R., Farrugia, M., Meli, C.: Security issues in controller area networks in automobiles. In: 2017 18th International Conference on Sciences and Techniques of Automatic Control and Computer Engineering (STA), pp. 93–98, 2017. https://doi.org/10.1109/STA.2017.8314877

  8. Nowdehi, N., Lautenbach, A., Olovsson, T.: In-vehicle can message authentication: an evaluation based on industrial criteria. In: 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall), pp. 1–7 (2017). https://doi.org/10.1109/VTCFall.2017.8288327

  9. Kiravuo, T., Sarela, M., Manner, J.: A survey of ethernet LAN security. IEEE Commun. Surv. Tutor. 15(3), 1477–1491 (2013). https://doi.org/10.1109/SURV.2012.121112.00190

    Article  Google Scholar 

  10. Corbett, C., Schoch, E., Kargl, F., Preussner, F.: Automotive ethernet: Security opportunity or challenge? Sicherheit 2016 - Sicherheit, Schutz und Zuverlässigkeit (2016)

    Google Scholar 

  11. Staron, M.: Action Research in Software Engineering. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-32610-4

  12. Hevner, A., March, S., Park, J., Ram, S.: Design science in information systems research. Manag. Inf. Syst. Q. 28(1), 75–105 (2004)

    Article  Google Scholar 

  13. Staron, M., Meding, W.: Software Development Measurement Programs. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-91836-5

  14. INTERNET PROTOCOL. RFC 791, University of Southern California, September 1981. https://tools.ietf.org/html/rfc791.html

  15. Popescu-Zeletin, R.: Implementing the ISO-OSI reference model. ACM SIGCOMM Comput. Commun. Rev. 13(4), 56–66 (1983)

    Article  Google Scholar 

  16. Use private wi-fi addresses in ios 14, ipados 14 and watchos 7. https://web.archive.org/web/20210424120018/support.apple.com/en-gb/HT211227

  17. Differences between tls 1.2 and tls 1.3. https://web.archive.org/web/20190919000200/www.wolfssl.com/differences-between-tls-12-and-tls-13-9/

Download references

Acknowledgment

The authors would like to thank our industrial partner for their ability to do the study and for their help and support. We would like to thank the engineers from the company for their dedication in helping us conduct the study.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Miroslaw Staron .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Alkoutli, A. et al. (2023). Assessing Security of Internal Vehicle Networks. In: Batista, T., Bureš, T., Raibulet, C., Muccini, H. (eds) Software Architecture. ECSA 2022 Tracks and Workshops. ECSA 2022. Lecture Notes in Computer Science, vol 13928. Springer, Cham. https://doi.org/10.1007/978-3-031-36889-9_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-36889-9_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-36888-2

  • Online ISBN: 978-3-031-36889-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics