Skip to main content

Security Problems and Attacks on Smart Cars

  • Conference paper
  • First Online:
International Telecommunications Conference

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 504))

Abstract

This study provides information about smart cars and some of the technologies and researches on smart cars. It then describes the modeling of security attacks in smart cars in terms of aggressive profile, attackable objects, attack requirements and security requirements. It also discusses the attack pattern and risk analysis related to vehicle speed ups and the stealing of personal information.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. http://www.forbes.com/sites/leoking/2015/02/23/14-year-old-hacks-connected-cars-with-pocket-money/. Accessed 19 July 2017

  2. Anthony Foxx, Secretary, U S Department of Transportation and Mary Barra, the chairwomen and CEO of General Motors Company, stress the importance of these issues in a keynote talk at the Billington Cyber summit 2016

    Google Scholar 

  3. http://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/, 19.07.2017

  4. http://www.heise.de/ct/artikel/Beemer-Open-Thyself-Security-vulnerabilities-in-BMW-s-ConnectedDrive-2540957.html. Accessed 19 July 2017

  5. http://arstechnica.com/cars/2016/08/hackers-use-arduino-to-unlock-100-million-volkswagens/. Accessed 19 July 2017

  6. Woodyard C, O’Donnell J (2013) Your car may be invading your privacy. USA Today. www.usatoday.com. Accessed 25 March 2013

  7. http://www.businessinsider.com/smart-car-hacking-major-problem-for-iot-internet-of-things-2016-3. Accessed 19 July 2017

  8. FAQs, Open Automotive Alliance. www.openautoalliance.net. Accessed 19 July 2017

  9. Hands-Free Infotainment Isn’t The Solution To Distracted Driving, Researchers Warn Webcast News Room (Feb 5, 2014) www.webcastnewsroom.com

  10. Poulsen K (2010) Hacker disables more than 100 cars remotely. https://www.wired.com/2010/03/hacker-bricks-cars/

  11. Bogage J (2016) Scary glitch affects luxury cars. https://www.bostonglobe.com/lifestyle/2016/06/09/scary-glitch-affects-luxury-cars/kj4wg2lhphlJDC3gATGuPM/story.html

  12. Camek AG, Buckl C, Knoll A (2013) Future cars: Necessity for an adaptive and distributed multiple independent levels of security architecture. In: Proceedings of the 2Nd ACM international conference on high confidence networked systems, ser. HiCoNS ’13

    Google Scholar 

  13. Rouf I, Miller R, Mustafa H, Taylor T, Oh S, Xu W, Gruteser M, Trappe W, Seskar I (2010) Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study. In Proceedings of the 19th USENIX conference on security, ser. USENIX Security’10. USENIX Association, Berkeley, CA, USA

    Google Scholar 

  14. Izosimov V, Asvestopoulos A, Blomkvist O, Torngren M (2016) Security-aware development of cyber-physical systems illustrated with automotive case study. In: 2016 Design, automation & Test in Europe conference & exhibition, DATE 2016, Dresden, Germany

    Google Scholar 

  15. Guilbert G, Jack E, Karl R, Deerek W (2016) Explaining volkswagens emissions scandal. http://www.nytimes.com/interactive/2015/business/international/vw-diesel-emissions-scandal-explained.html

  16. Olofsson J (2014) zombies ahead!a study of how hacked digital road signs destabilize the physical space of roadways. Vis Commun 13(1):75–93

    Article  Google Scholar 

  17. Wasicek A, Andre W (2015) Recognizing manipulated electronic control units. In: SAE 2015 World congress & exhibition, April 2015

    Google Scholar 

  18. Verdult R, Garcia FD, Ege B (2015) Dismantling megamos crypto: Wirelessly lockpicking a vehicle immobilizer. In: Supplement to the 22nd USENIX security symposium (USENIX Security 13), 2015

    Google Scholar 

  19. Koscher K, Czeskis A, Roesner F, Patel S, Kohno T (2010) Experimental security analysis of a modern automobile. 2010 IEEE Symposium on Security and Privacy; 16–19 May. IEEE, Oakland, pp 447–462

    Chapter  Google Scholar 

  20. EVITA (2009) Security Requirements for Automotive on-board Networks based on Dark-side Scenarios EVITA Deliverable D2. 3. EVIPA Project

    Google Scholar 

  21. Cho AR, Cho HJ, Son YD, Lee DH (2012) A message authentication and key distribution mechanism secure against CAN bus attack. J Korea Inst Info Sec Cryptol 22(5):1057–1068 (in Korean)

    Google Scholar 

  22. Miller C, Valasek C (2013) Adventures in automotive networks and control units.. http://illmatics.com/car_hacking.pdf. Accessed 13 Dec 2016

  23. Kong H, Hong M, Kim T (2017) Security risk assessment framework for smart car using the attack tree analysis

    Article  Google Scholar 

Download references

Acknowledgements

This work is also a part of the M.Sc. thesis titled Security Attacks Analysis For Smart Cars at Istanbul University, Institute of Physical Sciences.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Muhammed Ali Aydin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Okul, Ş., Aydin, M.A., Keleş, F. (2019). Security Problems and Attacks on Smart Cars. In: Boyaci, A., Ekti, A., Aydin, M., Yarkan, S. (eds) International Telecommunications Conference. Lecture Notes in Electrical Engineering, vol 504. Springer, Singapore. https://doi.org/10.1007/978-981-13-0408-8_17

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-0408-8_17

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-0407-1

  • Online ISBN: 978-981-13-0408-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics