1,661 research outputs found

    A Structured Approach to Securing the Connected Car

    Get PDF
    <p>Vehicles of today have become increasingly dependent on software to handle their functionalities. Updating and maintaining the software in vehicles has therefore become a costly process for the automotive industry. By introducing wireless communications to vehicles, vehicular maintenance can greatly be improved and many other new applications can also be brought to the vehicles. However, the vehicle was not designed with security in mind. Since the vehicle is safety-critical, it is vital that such new remote services do not violate the safety and security requirements of the vehicle. Thus, this thesis presents a general approach to securing the connected car and the usefulness of the approach is demonstrated in a vehicular diagnostics scenario.</p> <p>The thesis comes in two main parts. In the first part, we address security mechanisms for the connected car. First, a survey of current mechanisms to secure the in-vehicle networks is made. Then, a description of possible communication methods with vehicles is given and a taxonomy of current entities involved in such communication is presented. The taxonomy is organised in actors, vehicle-to-X communications, network paths, and dependability and security attributes. The usefulness of the taxonomy is demonstrated by two examples.</p> <p>In the second part, we address security with respect to vehicular diagnostics. First, an overall security analysis of the interaction between the connected car and the repair shop is conducted. We find that the most imminent risk in the repair shop is the loss of authentication keys. The loss of such keys allows masquerading attacks against vehicles. To address this problem, we propose a Kerberos-inspired protocol for authentication and authorisation of the diagnostics equipment and a trusted third party is introduced.</p> <p>To conclude, this thesis shows the value of adopting a structured approach to securing the connected car. The approach has been shown to be useful for identifying threats and countermeasures and thus help improving security.</p

    Novel Approaches to Evaluate the Ability of Vehicles for Secured Transportation

    Get PDF
    The assurance of process safety plays an important role in the field of information technology. Securing the information has become one of the biggest challenges in the present day. Whenever we think about the protected systems the first thing that comes to our&nbsp;mind can be malicious interventions which are increasing immensely day by day. Nowadays we live the world of huge automotive developments with the appearance of the demand for autonomous vehicles. On the other hand, technological developments also provide a lot of advantages for the society. The benefits of autonomous cars include reduced mobility costs, increased safety, increased mobility, significant reduction of traffic collisions. However, it cannot be forgotten that the extension of cyberspace affects the transportation increasingly. Accordingly, cars are produced with high level of connectivity and automation. Therefore, the risks arriving from the cyberspace can now endanger the safe and secured transportation. These tendencies shall motivate manufacturers and developers to permanently improve the ability of vehicles to protect themselves and their passengers
    corecore