Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Services in Connected Vehicles: Security Risks and Countermeasures

Services in Connected Vehicles: Security Risks and Countermeasures
View Sample PDF
Author(s): Marcus Bertilsson (Chalmers University of Technology, Sweden), Michel Folkemark (Chalmers University of Technology, Sweden), Qingyun Gu (Chalmers University of Technology, Sweden), Viktor Rydberg (Chalmers University of Technology, Sweden) and Abdullah Yazar (Marmara University, Turkey)
Copyright: 2021
Pages: 22
Source title: Decision Support Systems and Industrial IoT in Smart Grid, Factories, and Cities
Source Author(s)/Editor(s): Ismail Butun (Chalmers University of Technology, Sweden & Konya Food and Agriculture University, Turkey & Royal University of Technology, Sweden)
DOI: 10.4018/978-1-7998-7468-3.ch007


View Services in Connected Vehicles: Security Risks and Countermeasures on the publisher's website for pricing and purchasing information.


Smart vehicles have introduced many services which can be categorized by their functionality (infotainment, comfort, ADAS, OEM services). Introducing new services increases the risk of compromising security. A mobile app used by drivers to connect the vehicle could be infected with malware and spread to the vehicle. Forging remote starting signals enables an attacker to start the vehicle without a key. Security implications of these services should be investigated and addressed thoroughly. This chapter investigates such problems and provides an overview of vulnerabilities, attacks, and mitigations related to these services along with findings including software bugs and insecure protocols. The mitigations for these attacks include strengthening the security protocol of the vehicle CAN bus and incorporating security protocols such as TLS and IPsec. It is hard to say that all connected vehicles are secured. In conclusion, security cannot be neglected, and best practices like sufficient logging (e.g., IDS), reviewing, security testing, and updating of software and hardware should be used.

Related Content

Åke Axeland, Henrik Hagfeldt, Magnus Carlsson, Lina Lagerquist Sergel, Ismail Butun. © 2021. 18 pages.
Olof Magnusson, Rikard Teodorsson, Joakim Wennerberg, Stig Arne Knoph. © 2021. 20 pages.
Joar Blom Rydell, Oliver Otterlind, Amanda Sjöö. © 2021. 23 pages.
Suresh P., Keerthika P., Sathiyamoorthi V., Logeswaran K., Manjula Devi R., Sentamilselvan K., Sangeetha M., Sagana C.. © 2021. 28 pages.
Ismail Butun, Alparslan Sari. © 2021. 20 pages.
Alparslan Sari, Ismail Butun. © 2021. 28 pages.
Marcus Bertilsson, Michel Folkemark, Qingyun Gu, Viktor Rydberg, Abdullah Yazar. © 2021. 22 pages.
Body Bottom