IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Services in Connected Vehicles: Security Risks and Countermeasures

Services in Connected Vehicles: Security Risks and Countermeasures
View Sample PDF
Author(s): Marcus Bertilsson (Chalmers University of Technology, Sweden), Michel Folkemark (Chalmers University of Technology, Sweden), Qingyun Gu (Chalmers University of Technology, Sweden), Viktor Rydberg (Chalmers University of Technology, Sweden)and Abdullah Yazar (Marmara University, Turkey)
Copyright: 2021
Pages: 22
Source title: Decision Support Systems and Industrial IoT in Smart Grid, Factories, and Cities
Source Author(s)/Editor(s): Ismail Butun (Chalmers University of Technology, Sweden & Konya Food and Agriculture University, Turkey & Royal University of Technology, Sweden)
DOI: 10.4018/978-1-7998-7468-3.ch007

Purchase

View Services in Connected Vehicles: Security Risks and Countermeasures on the publisher's website for pricing and purchasing information.

Abstract

Smart vehicles have introduced many services which can be categorized by their functionality (infotainment, comfort, ADAS, OEM services). Introducing new services increases the risk of compromising security. A mobile app used by drivers to connect the vehicle could be infected with malware and spread to the vehicle. Forging remote starting signals enables an attacker to start the vehicle without a key. Security implications of these services should be investigated and addressed thoroughly. This chapter investigates such problems and provides an overview of vulnerabilities, attacks, and mitigations related to these services along with findings including software bugs and insecure protocols. The mitigations for these attacks include strengthening the security protocol of the vehicle CAN bus and incorporating security protocols such as TLS and IPsec. It is hard to say that all connected vehicles are secured. In conclusion, security cannot be neglected, and best practices like sufficient logging (e.g., IDS), reviewing, security testing, and updating of software and hardware should be used.

Related Content

Yu Bin, Xiao Zeyu, Dai Yinglong. © 2024. 34 pages.
Liyin Wang, Yuting Cheng, Xueqing Fan, Anna Wang, Hansen Zhao. © 2024. 21 pages.
Tao Zhang, Zaifa Xue, Zesheng Huo. © 2024. 32 pages.
Dharmesh Dhabliya, Vivek Veeraiah, Sukhvinder Singh Dari, Jambi Ratna Raja Kumar, Ritika Dhabliya, Sabyasachi Pramanik, Ankur Gupta. © 2024. 22 pages.
Yi Xu. © 2024. 37 pages.
Chunmao Jiang. © 2024. 22 pages.
Hatice Kübra Özensel, Burak Efe. © 2024. 23 pages.
Body Bottom