Oyler et al., 2016 - Google Patents

Security in automotive telematics: a survey of threats and risk mitigation strategies to counter the existing and emerging attack vectors

Oyler et al., 2016

View PDF @Full View
Document ID
6031415917964083674
Author
Oyler A
Saiedian H
Publication year
Publication venue
Security and Communication Networks

External Links

Snippet

This manuscript surveys a variety of topics related to the security of connected vehicles and their associated services, often referred to as telematics. Current challenges as well as emerging and future security risks are discussed. A number of specific technologies and …
Continue reading at onlinelibrary.wiley.com (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0823Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless

Similar Documents

Publication Publication Date Title
US11637696B2 (en) End-to-end communication security
Dibaei et al. Attacks and defences on intelligent connected vehicles: A survey
den Hartog et al. Security and privacy for innovative automotive applications: A survey
Bernardini et al. Security and privacy in vehicular communications: Challenges and opportunities
Othmane et al. A survey of security and privacy in connected vehicles
Dibaei et al. An overview of attacks and defences on intelligent connected vehicles
Martínez-Cruz et al. Security on in-vehicle communication protocols: Issues, challenges, and future research directions
Chattopadhyay et al. Security of autonomous vehicle as a cyber-physical system
Oyler et al. Security in automotive telematics: a survey of threats and risk mitigation strategies to counter the existing and emerging attack vectors
Takahashi An overview of cyber security for connected vehicles
Cheng et al. Security patterns for automotive systems
Dellios et al. Information security compliance over intelligent transport systems: Is it possible?
Tbatou et al. Security of communications in connected cars modeling and safety assessment
Stabili et al. Analyses of secure automotive communication protocols and their impact on vehicles life-cycle
Ammar et al. Securing the on-board diagnostics port (obd-ii) in vehicles
Cheng et al. Security patterns for connected and automated automotive systems
Singh et al. Cybersecurity in automotive technology
Fysarakis et al. Security Concerns in Cooperative Intelligent Transportation Systems
Humayed An overview of vehicle obd-ii port countermeasures
Markham et al. A balanced approach for securing the OBD-II port
van Roermund In-vehicle networks and security
Amirtahmasebi et al. Vehicular networks–security, vulnerabilities and countermeasures
Dewangan et al. Cyber Threats and Its Mitigation to Intelligent Transportation System
Oancea et al. Challenges in automotive security
Prathap et al. Penetration Testing of Vehicle ECUs