4.7 Article

Cyberattacks and Countermeasures for In-Vehicle Networks

期刊

ACM COMPUTING SURVEYS
卷 54, 期 1, 页码 -

出版社

ASSOC COMPUTING MACHINERY
DOI: 10.1145/3431233

关键词

CAN bus; cybersecurity; intrusion detection systems

资金

  1. EPSRC [EP/S035362/1] Funding Source: UKRI

向作者/读者索取更多资源

The increasing connectivity within vehicles has raised concerns about safety and security, especially regarding automotive serial protocols like CAN Bus. Current security mechanisms focus on encryption, authentication, and IDS, but face limitations due to constraints like low bandwidth and real-time sensitivity. Future research needs to address these limitations and challenges in order to improve the security of connected vehicles.
As connectivity between and within vehicles increases, so does concern about safety and security. Various automotive serial protocols are used inside vehicles such as Controller Area Network (CAN), Local Interconnect Network (LIN), and FlexRay. CAN Bus is the most used in-vehicle network protocol to support exchange of vehicle parameters between Electronic Control Units (ECUs). This protocol lacks security mechanisms by design and is therefore vulnerable to various attacks. Furthermore, connectivity of vehicles has made the CAN Bus vulnerable not only from within the vehicle but also from outside. With the rise of connected cars, more entry points and interfaces have been introduced on board vehicles, thereby also leading to a wider potential attack surface. Existing security mechanisms focus on the use of encryption, authentication, and vehicle Intrusion Detection Systems (IDS), which operate under various constraints such as low bandwidth, small frame size (e.g., in the CAN protocol), limited availability of computational resources, and real-time sensitivity. We survey and classify current cryptographic and IDS approaches and compare these approaches based on criteria such as real-time constraints, types of hardware used, changes in CAN Bus behaviour, types of attack mitigation, and software/ hardware used to validate these approaches. We conclude with mitigation strategies limitations and research challenges for the future.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据