Abstract
This study provides information about smart cars and some of the technologies and researches on smart cars. It then describes the modeling of security attacks in smart cars in terms of aggressive profile, attackable objects, attack requirements and security requirements. It also discusses the attack pattern and risk analysis related to vehicle speed ups and the stealing of personal information.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
http://www.forbes.com/sites/leoking/2015/02/23/14-year-old-hacks-connected-cars-with-pocket-money/. Accessed 19 July 2017
Anthony Foxx, Secretary, U S Department of Transportation and Mary Barra, the chairwomen and CEO of General Motors Company, stress the importance of these issues in a keynote talk at the Billington Cyber summit 2016
http://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/, 19.07.2017
http://www.heise.de/ct/artikel/Beemer-Open-Thyself-Security-vulnerabilities-in-BMW-s-ConnectedDrive-2540957.html. Accessed 19 July 2017
http://arstechnica.com/cars/2016/08/hackers-use-arduino-to-unlock-100-million-volkswagens/. Accessed 19 July 2017
Woodyard C, O’Donnell J (2013) Your car may be invading your privacy. USA Today. www.usatoday.com. Accessed 25 March 2013
http://www.businessinsider.com/smart-car-hacking-major-problem-for-iot-internet-of-things-2016-3. Accessed 19 July 2017
FAQs, Open Automotive Alliance. www.openautoalliance.net. Accessed 19 July 2017
Hands-Free Infotainment Isn’t The Solution To Distracted Driving, Researchers Warn Webcast News Room (Feb 5, 2014) www.webcastnewsroom.com
Poulsen K (2010) Hacker disables more than 100 cars remotely. https://www.wired.com/2010/03/hacker-bricks-cars/
Bogage J (2016) Scary glitch affects luxury cars. https://www.bostonglobe.com/lifestyle/2016/06/09/scary-glitch-affects-luxury-cars/kj4wg2lhphlJDC3gATGuPM/story.html
Camek AG, Buckl C, Knoll A (2013) Future cars: Necessity for an adaptive and distributed multiple independent levels of security architecture. In: Proceedings of the 2Nd ACM international conference on high confidence networked systems, ser. HiCoNS ’13
Rouf I, Miller R, Mustafa H, Taylor T, Oh S, Xu W, Gruteser M, Trappe W, Seskar I (2010) Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study. In Proceedings of the 19th USENIX conference on security, ser. USENIX Security’10. USENIX Association, Berkeley, CA, USA
Izosimov V, Asvestopoulos A, Blomkvist O, Torngren M (2016) Security-aware development of cyber-physical systems illustrated with automotive case study. In: 2016 Design, automation & Test in Europe conference & exhibition, DATE 2016, Dresden, Germany
Guilbert G, Jack E, Karl R, Deerek W (2016) Explaining volkswagens emissions scandal. http://www.nytimes.com/interactive/2015/business/international/vw-diesel-emissions-scandal-explained.html
Olofsson J (2014) zombies ahead!a study of how hacked digital road signs destabilize the physical space of roadways. Vis Commun 13(1):75–93
Wasicek A, Andre W (2015) Recognizing manipulated electronic control units. In: SAE 2015 World congress & exhibition, April 2015
Verdult R, Garcia FD, Ege B (2015) Dismantling megamos crypto: Wirelessly lockpicking a vehicle immobilizer. In: Supplement to the 22nd USENIX security symposium (USENIX Security 13), 2015
Koscher K, Czeskis A, Roesner F, Patel S, Kohno T (2010) Experimental security analysis of a modern automobile. 2010 IEEE Symposium on Security and Privacy; 16–19 May. IEEE, Oakland, pp 447–462
EVITA (2009) Security Requirements for Automotive on-board Networks based on Dark-side Scenarios EVITA Deliverable D2. 3. EVIPA Project
Cho AR, Cho HJ, Son YD, Lee DH (2012) A message authentication and key distribution mechanism secure against CAN bus attack. J Korea Inst Info Sec Cryptol 22(5):1057–1068 (in Korean)
Miller C, Valasek C (2013) Adventures in automotive networks and control units.. http://illmatics.com/car_hacking.pdf. Accessed 13 Dec 2016
Kong H, Hong M, Kim T (2017) Security risk assessment framework for smart car using the attack tree analysis
Acknowledgements
This work is also a part of the M.Sc. thesis titled Security Attacks Analysis For Smart Cars at Istanbul University, Institute of Physical Sciences.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Okul, Ş., Aydin, M.A., Keleş, F. (2019). Security Problems and Attacks on Smart Cars. In: Boyaci, A., Ekti, A., Aydin, M., Yarkan, S. (eds) International Telecommunications Conference. Lecture Notes in Electrical Engineering, vol 504. Springer, Singapore. https://doi.org/10.1007/978-981-13-0408-8_17
Download citation
DOI: https://doi.org/10.1007/978-981-13-0408-8_17
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-0407-1
Online ISBN: 978-981-13-0408-8
eBook Packages: EngineeringEngineering (R0)