519 research outputs found

    As Society Strives for Reduced Contact During the Pandemic, How Can Human Microchipping Help?

    Get PDF

    External attacks on automotive system through wireless communication channels

    Get PDF
    The reliance of today’s automotive system on electronics control system is expected to make the cars to be state-of-the-art vehicle. However, this technology dependency results in the cars to be exposed to attacks by the hacker through the manipulation of electronics system. Previously, for the attacker to compromise car’s system, he/she must access the car directly and internally. However, with the incorporation of wireless technologies such as Bluetooth and cellular into automotive system for example in its telematic units, the attacks are evolved from internal attacks into remote attack where the adversary does not have to internally access the car’s system. This paper analyses the vulnerabilities of the automotive system by the remote attacks performed through Bluetooth and cellular. Once the vulnerabilities were analyzed, the threats imposed by these vulnerabilities are accessed. Two scenarios namely theft and surveillance are used to exemplify the threats that are carried by the vulnerability of the automotive system to the remote attacks. From the vulnerability analysis and threat assessment, it can be deduced that the automotive system is vulnerable to attacks and proper countermeasure must be taken to curb the implication from the attacks.Keywords: Hardware Trojan, Insertion, Third-part IP, Trus

    Towards Cyber Security for Low-Carbon Transportation: Overview, Challenges and Future Directions

    Full text link
    In recent years, low-carbon transportation has become an indispensable part as sustainable development strategies of various countries, and plays a very important responsibility in promoting low-carbon cities. However, the security of low-carbon transportation has been threatened from various ways. For example, denial of service attacks pose a great threat to the electric vehicles and vehicle-to-grid networks. To minimize these threats, several methods have been proposed to defense against them. Yet, these methods are only for certain types of scenarios or attacks. Therefore, this review addresses security aspect from holistic view, provides the overview, challenges and future directions of cyber security technologies in low-carbon transportation. Firstly, based on the concept and importance of low-carbon transportation, this review positions the low-carbon transportation services. Then, with the perspective of network architecture and communication mode, this review classifies its typical attack risks. The corresponding defense technologies and relevant security suggestions are further reviewed from perspective of data security, network management security and network application security. Finally, in view of the long term development of low-carbon transportation, future research directions have been concerned.Comment: 34 pages, 6 figures, accepted by journal Renewable and Sustainable Energy Review

    Towards Automotive Embedded Systems with Self-X Properties

    Get PDF
    With self-adaptation and self-organization new paradigms for the management of distributed systems have been introduced. By enhancing the automotive software system with self-X capabilities, e.g. self-healing, self-configuration and self-optimization, the complexity is handled while increasing the flexibility, scalability and dependability of these systems. In this chapter we present an approach for enhancing automotive systems with self-X properties. At first, we discuss the benefits of providing automotive software systems with self-management capabilities and outline concrete use cases. Afterwards, we will discuss requirements and challenges for realizing adaptive automotive embedded systems
    • …
    corecore