当前位置: X-MOL 学术J. Electron. Test. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Analysis of Security Vulnerability Levels of In-Vehicle Network Topologies Applying Graph Representations
Journal of Electronic Testing ( IF 0.9 ) Pub Date : 2022-01-10 , DOI: 10.1007/s10836-021-05973-x
Zsombor Petho 1 , Intiyaz Khan 1 , Árpád Torok 1
Affiliation  

This article investigates cybersecurity issues related to in-vehicle communication networks. In-vehicle communication network security is evaluated based on the protection characteristics of the network components and the topology of the network. The automotive communication network topologies are represented as undirected weighted graphs, and their vulnerability is estimated based on the specific characteristics of the generated graph. Thirteen different vehicle models have been investigated to compare the vulnerability levels of the in-vehicle network using the Dijkstra's shortest route algorithm. An important advantage of the proposed method is that it is in accordance with the most relevant security evaluation models. On the other hand, the newly introduced approach considers the Secure-by-Design concept principles.



中文翻译:

应用图表示的车载网络拓扑安全漏洞等级分析

本文调查与车载通信网络相关的网络安全问题。车载通信网络安全性是根据网络组件的保护特性和网络的拓扑结构来评估的。汽车通信网络拓扑表示为无向加权图,并根据生成图的具体特征估计其脆弱性。已经研究了 13 种不同的车辆模型,以使用 Dijkstra 的最短路径算法比较车载网络的漏洞级别。该方法的一个重要优点是它符合最相关的安全评估模型。另一方面,新引入的方法考虑了 Secure-by-Design 概念原则。

更新日期:2022-01-11
down
wechat
bug