Skip to main content

2019 | OriginalPaper | Buchkapitel

Survey on Security in Autonomous Cars

verfasst von : K. V. Harish, B. Amutha

Erschienen in: ICCCE 2018

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The improvements made in automotive control systems and sensory technologies have led to the rise in autonomous cars. These cars use a wide range of networking and sensory technologies to control the car and interact with the environment. One recent application which is making headway is in the alliance of the IoT and autonomous cars. Since the IoT focuses on connectivity between different isolated devices found over the web, it is also used to provide services to autonomous cars. It is therefore, imperative to ensure that data privacy and security is maintained by the system. Hence, this paper surveys and discusses the security issues faced in autonomous cars.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Pacheco J, Satam S, Hariri S, Grijalva C and Berkenbrock H (2016) IoT security development framework for building trustworthy smart car services. In: IEEE conference on intelligence and security informatics, Tucson, AZ, pp 237–242 Pacheco J, Satam S, Hariri S, Grijalva C and Berkenbrock H (2016) IoT security development framework for building trustworthy smart car services. In: IEEE conference on intelligence and security informatics, Tucson, AZ, pp 237–242
2.
Zurück zum Zitat Challita G, Mousset S, Nashashibi F, Bensrhair A (2009) An application of V2V communications: cooperation of vehicles for a better car tracking using GPS and vision systems. In: IEEE vehicular networking conference, Tokyo, pp 1–6 Challita G, Mousset S, Nashashibi F, Bensrhair A (2009) An application of V2V communications: cooperation of vehicles for a better car tracking using GPS and vision systems. In: IEEE vehicular networking conference, Tokyo, pp 1–6
3.
Zurück zum Zitat Gerla K, Lee EK, Pau G, Lee U (2014) Internet of vehicles: from intelligent grid to autonomous cars and vehicular clouds. In: IEEE world forum on internet of things, Seoul, pp 241–246 Gerla K, Lee EK, Pau G, Lee U (2014) Internet of vehicles: from intelligent grid to autonomous cars and vehicular clouds. In: IEEE world forum on internet of things, Seoul, pp 241–246
4.
Zurück zum Zitat Studnia I, Nicomette V, Alata E, Deswarte Y, Kaâniche M, Laarouchi Y (2013) Survey on security threats and protection mechanisms in embedded automotive networks. In: 43rd annual IEEE/IFIP conference on dependable systems and networks workshop, Budapest, pp 1–12 Studnia I, Nicomette V, Alata E, Deswarte Y, Kaâniche M, Laarouchi Y (2013) Survey on security threats and protection mechanisms in embedded automotive networks. In: 43rd annual IEEE/IFIP conference on dependable systems and networks workshop, Budapest, pp 1–12
5.
Zurück zum Zitat Fürst S, Bechter M (2016) AUTOSAR for connected and autonomous vehicles: the AUTOSAR adaptive platform. In: 46th annual IEEE/IFIP international conference on dependable systems and networks workshop, Toulouse, pp 215–217 Fürst S, Bechter M (2016) AUTOSAR for connected and autonomous vehicles: the AUTOSAR adaptive platform. In: 46th annual IEEE/IFIP international conference on dependable systems and networks workshop, Toulouse, pp 215–217
6.
Zurück zum Zitat Krishnapriya VV, Sikha M, Nandakumar R, Kidav JU (2012) Hardware efficiency comparison of IP cores for CAN & LIN protocols. In: International conference on computing communication & networking technologies (ICCCNT), Coimbatore, pp 1–3 Krishnapriya VV, Sikha M, Nandakumar R, Kidav JU (2012) Hardware efficiency comparison of IP cores for CAN & LIN protocols. In: International conference on computing communication & networking technologies (ICCCNT), Coimbatore, pp 1–3
7.
Zurück zum Zitat Lin CW, Sangiovanni-Vincentelli A (2012) Cyber-security for the controller area network (CAN) communication protocol. In: International conference on cyber-security for the controller area network (CAN) communication protocol, Washington, DC, pp 1–7 Lin CW, Sangiovanni-Vincentelli A (2012) Cyber-security for the controller area network (CAN) communication protocol. In: International conference on cyber-security for the controller area network (CAN) communication protocol, Washington, DC, pp 1–7
8.
Zurück zum Zitat Khan J (2017) Vehicle network security testing. In: Third international conference on sensing, signal processing and security, Chennai, India, pp 119–123 Khan J (2017) Vehicle network security testing. In: Third international conference on sensing, signal processing and security, Chennai, India, pp 119–123
9.
Zurück zum Zitat Koscher K et al (2010) Experimental security analysis of a modern automobile. In: IEEE symposium on security and privacy, Oakland, CA, USA, pp 447–462 Koscher K et al (2010) Experimental security analysis of a modern automobile. In: IEEE symposium on security and privacy, Oakland, CA, USA, pp 447–462
10.
Zurück zum Zitat Wu Y, Kim YJ, Piao Z, Chung JG, Kim YE (2016) Security protocol for controller area network using ECANDC compression algorithm. In: IEEE international conference on signal processing, communications and computing (ICSPCC), Hong Kong, pp 1–4 Wu Y, Kim YJ, Piao Z, Chung JG, Kim YE (2016) Security protocol for controller area network using ECANDC compression algorithm. In: IEEE international conference on signal processing, communications and computing (ICSPCC), Hong Kong, pp 1–4
11.
Zurück zum Zitat Farag WA (2017) CANTrack: enhancing automotive CAN bus security using intuitive encryption algorithms. In: 7th international conference on modeling, simulation, and applied optimization (ICMSAO), Sharjah, pp 1–5 Farag WA (2017) CANTrack: enhancing automotive CAN bus security using intuitive encryption algorithms. In: 7th international conference on modeling, simulation, and applied optimization (ICMSAO), Sharjah, pp 1–5
12.
Zurück zum Zitat Onuma Y, Terashima Y, Kiyohara R (2017) ECU software updating in future vehicle networks. In: 31st international conference on advanced information networking and applications workshops (WAINA), Taipei, pp 35–40 Onuma Y, Terashima Y, Kiyohara R (2017) ECU software updating in future vehicle networks. In: 31st international conference on advanced information networking and applications workshops (WAINA), Taipei, pp 35–40
13.
Zurück zum Zitat Nastase L (2017) Security in the internet of things: a survey on application layer protocols. In: 21st international conference on control systems and computer science (CSCS), Bucharest, pp 659–666 Nastase L (2017) Security in the internet of things: a survey on application layer protocols. In: 21st international conference on control systems and computer science (CSCS), Bucharest, pp 659–666
14.
Zurück zum Zitat Zamfir S, Balan T, Iliescu I, Sandu F (2016) A security analysis on standard IoT protocols. In: international conference on applied and theoretical electricity (ICATE), Craiova, pp 1–6 Zamfir S, Balan T, Iliescu I, Sandu F (2016) A security analysis on standard IoT protocols. In: international conference on applied and theoretical electricity (ICATE), Craiova, pp 1–6
15.
Zurück zum Zitat Navet N (1998) Controller area network [automotive applications]. IEEE Potentials 17(4):12–14CrossRef Navet N (1998) Controller area network [automotive applications]. IEEE Potentials 17(4):12–14CrossRef
16.
Zurück zum Zitat Liu J, Zhang S, Sun W, Shi Y (2017) In-vehicle network attacks and countermeasures: challenges and future directions. IEEE Netw 31(5):50–58CrossRef Liu J, Zhang S, Sun W, Shi Y (2017) In-vehicle network attacks and countermeasures: challenges and future directions. IEEE Netw 31(5):50–58CrossRef
Metadaten
Titel
Survey on Security in Autonomous Cars
verfasst von
K. V. Harish
B. Amutha
Copyright-Jahr
2019
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-13-0212-1_64

Neuer Inhalt