Skip to main content

Design and Implementation of Security Threat Detection and Access Control System for Connected Car

  • Chapter
  • First Online:
Computational Science/Intelligence & Applied Informatics (CSII 2018)

Part of the book series: Studies in Computational Intelligence ((SCI,volume 787))

  • 689 Accesses

Abstract

Security vulnerabilities are also increasing as connectivity increases to provide driving stability and convenience for automobiles. In this paper, we design a white list-based access control system to detect and block malicious attempts to access an in-vehicle network through an infotainment device in a connected car environment, and present the implementation results.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kwon, H.: Security trends for autonomous driving vehicle. Electron. Telecommun. Trends 33(1), 78–88 (2018)

    MathSciNet  Google Scholar 

  2. Siemens: Vehicle-to-X (V2X) communication technology (2015)

    Google Scholar 

  3. WIKIPEDIA: Vehicle-to-everything. https://en.wikipedia.org/wiki/Vehicle-to-everything/

  4. Lee, H., Jeong, S.H., Kim, H.K.: OTIDS: A Novel Intrusion Detection System for In-vehicle Network by using Remote Frame. PST (2017)

    Google Scholar 

  5. Wolf, M., Weimerskirch, A., Paar, C.: Security in automotive bus system. In: ESCAR (2004)

    Google Scholar 

  6. Koscher, K., Czeskis, A., Roesner, F.: Experimental security analysis of a modern automobile. SP (2010)

    Google Scholar 

  7. Hoppe, T., Kiltz, S., Dittmann, J.: Security Threats to Automotive CAN Networks—Practical Examples and selected Short-Term Countermeasures, pp. 235–248 (2008)

    Google Scholar 

  8. Wright, A.: Hacking cars. Commun. ACM 54(11), 18 (2011)

    Article  Google Scholar 

  9. Miller, C., Valasek, C.: Adventures in Automotive Networks and Control Units (2013). http://illmatics.com/

  10. Coppola, R., Morisio, M.: Connected car: technologies, issues, future trends. ACM Comput. Surv. 49(3) (2016)

    Article  Google Scholar 

  11. Checkoway, S., McCoy, D., Kantor, B.: Comprehensive Experimental Analyses of Automotive Attack Surfaces. USENIX Security (2011)

    Google Scholar 

  12. Miller, C., Valasek, C.: A Survey of Remote Automotive Attack Surfaces. Black Hat USA (2014)

    Google Scholar 

Download references

Acknowledgments

This work was supported by Institute for Information and communications Technology Promotion (IITP) grant funded by the Korea government (MSIT) (No. B0717-16-0097, Development of V2X Service Integrated Security Technology for Autonomous Driving Vehicle).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Joongyong Choi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer International Publishing AG, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Choi, J., Kwon, H., Lee, S., Chung, B., Jin, Si. (2019). Design and Implementation of Security Threat Detection and Access Control System for Connected Car. In: Lee, R. (eds) Computational Science/Intelligence & Applied Informatics. CSII 2018. Studies in Computational Intelligence, vol 787. Springer, Cham. https://doi.org/10.1007/978-3-319-96806-3_13

Download citation

Publish with us

Policies and ethics