当前位置: X-MOL 学术Veh. Commun. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
A classification of attacks to In-Vehicle Components (IVCs)
Vehicular Communications ( IF 5.8 ) Pub Date : 2020-03-06 , DOI: 10.1016/j.vehcom.2020.100253
Joey Sun , Shahrear Iqbal , Najmeh Seifollahpour Arabi , Mohammad Zulkernine

The rapid adoption of technology for the purpose of connecting all things to a global network can be witnessed in those ranging from simple applications, such as toasters, to more complex ones, such as vehicles. In particular, the connected vehicles which have emerged from this adoption utilize various sensors and external connections to either better allow its user to make a more informed decision, or make that decision autonomously. As a majority of the population relies on some sort of vehicular transportation, this means connected vehicles have access to an unprecedented amount of data, some of which is private, and some of which is critical in allowing the vehicle to perform as expected. Although we agree that this data-driven approach can allow for better decisions to be made, the fact remains that the connection between the In-Vehicle Networks (IVNs) and the Internet increases the number of ways the IVNs can now be targeted. In this paper, we focus on the security of common In-Vehicle Components (IVCs); that is, IVNs and the interfaces that interact in some way with such networks. Possible attacks to IVNs and their interfaces are identified and classified in a novel way, along with potential causes for each attack. The novel attack classification scheme can influence the development of new types of countermeasures to attacks, or the adoption of new and existing countermeasures to attacks that fall under the same classification.



中文翻译:

车载组件(IVC)的攻击类别

从将简单的应用程序(例如烤面包机)到更复杂的应用程序(例如车辆),可以见证为将所有事物连接到全球网络而迅速采用技术。特别地,从这种采用中出现的联网车辆利用各种传感器和外部连接来更好地允许其用户做出更明智的决定,或者自主做出决定。由于大多数人口依赖某种车辆运输,这意味着联网的车辆可以访问前所未有的数据量,其中一些是私人数据,而其中一些对于允许车辆按预期运行至关重要。尽管我们同意这种以数据为依据的方法可以做出更好的决策,事实仍然是,车载网络(IVN)与Internet之间的连接增加了现在可以定位IVN的方式。在本文中,我们将重点放在通用车载部件(IVC)的安全性上。也就是说,IVN和以某种方式与此类网络交互的接口。对IVN及其接口的可能攻击以新颖的方式进行了识别和分类,以及每次攻击的潜在原因。新颖的攻击分类方案可以影响针对攻击的新型对策的发展,或者影响属于同一分类的攻击的新的和现有的对策的采用。IVN和以某种方式与此类网络交互的接口。对IVN及其接口的可能攻击以新颖的方式进行了识别和分类,以及每次攻击的潜在原因。新颖的攻击分类方案可以影响针对攻击的新型对策的发展,或者影响属于相同分类的攻击的新的和现有的对策的采用。IVN和以某种方式与此类网络交互的接口。对IVN及其接口的可能攻击以新颖的方式进行了识别和分类,以及每次攻击的潜在原因。新颖的攻击分类方案可以影响针对攻击的新型对策的发展,或者影响属于相同分类的攻击的新的和现有的对策的采用。

更新日期:2020-03-06
down
wechat
bug