Oyler et al., 2016 - Google Patents
Security in automotive telematics: a survey of threats and risk mitigation strategies to counter the existing and emerging attack vectorsOyler et al., 2016
View PDF- Document ID
- 6031415917964083674
- Author
- Oyler A
- Saiedian H
- Publication year
- Publication venue
- Security and Communication Networks
External Links
Snippet
This manuscript surveys a variety of topics related to the security of connected vehicles and their associated services, often referred to as telematics. Current challenges as well as emerging and future security risks are discussed. A number of specific technologies and …
- 230000000116 mitigating 0 title description 4
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/0823—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11637696B2 (en) | End-to-end communication security | |
Dibaei et al. | Attacks and defences on intelligent connected vehicles: A survey | |
den Hartog et al. | Security and privacy for innovative automotive applications: A survey | |
Bernardini et al. | Security and privacy in vehicular communications: Challenges and opportunities | |
Othmane et al. | A survey of security and privacy in connected vehicles | |
Dibaei et al. | An overview of attacks and defences on intelligent connected vehicles | |
Martínez-Cruz et al. | Security on in-vehicle communication protocols: Issues, challenges, and future research directions | |
Chattopadhyay et al. | Security of autonomous vehicle as a cyber-physical system | |
Oyler et al. | Security in automotive telematics: a survey of threats and risk mitigation strategies to counter the existing and emerging attack vectors | |
Takahashi | An overview of cyber security for connected vehicles | |
Cheng et al. | Security patterns for automotive systems | |
Dellios et al. | Information security compliance over intelligent transport systems: Is it possible? | |
Tbatou et al. | Security of communications in connected cars modeling and safety assessment | |
Stabili et al. | Analyses of secure automotive communication protocols and their impact on vehicles life-cycle | |
Ammar et al. | Securing the on-board diagnostics port (obd-ii) in vehicles | |
Cheng et al. | Security patterns for connected and automated automotive systems | |
Singh et al. | Cybersecurity in automotive technology | |
Fysarakis et al. | Security Concerns in Cooperative Intelligent Transportation Systems | |
Humayed | An overview of vehicle obd-ii port countermeasures | |
Markham et al. | A balanced approach for securing the OBD-II port | |
van Roermund | In-vehicle networks and security | |
Amirtahmasebi et al. | Vehicular networks–security, vulnerabilities and countermeasures | |
Dewangan et al. | Cyber Threats and Its Mitigation to Intelligent Transportation System | |
Oancea et al. | Challenges in automotive security | |
Prathap et al. | Penetration Testing of Vehicle ECUs |