{"title":"Intrusion Detection in the Automotive Domain: A Comprehensive Review","authors":"Brooke Lampe;Weizhi Meng","doi":"10.1109/COMST.2023.3309864","DOIUrl":null,"url":null,"abstract":"The automotive domain has realized amazing advancements in communication, connectivity, and automation—and at a breakneck pace. Such advancements come with ample benefits, such as the reduction of traffic accidents and the refinement of transit efficiency. However, these new developments were not necessarily made with security in mind. Researchers have unearthed a number of security vulnerabilities in paradigms such as in-vehicle networks (IVNs), the Internet of Vehicles (IoV), and intelligent transportation systems (ITSs). As automotive technologies continue to evolve, it would be realistic to expect new vulnerabilities to arise—both vulnerabilities that are identified and vulnerabilities that are not. If—or more pragmatically, when—these vulnerabilities are exploited, intrusion detection will be paramount. Therefore, we find it prudent to review intrusion detection in the automotive domain. We explore a myriad of threats and intrusion detection techniques—from the boundaries of the vehicle’s own network to the wider Internet of Vehicles (IoV). Intrusion detection, while not a panacea, can be a cost-effective solution to many automotive security issues. Generally, such intrusion detection systems (IDSs) do not disrupt existing hardware, infrastructure, or communications; rather, they merely tap into the network and monitor for suspicious traffic. Given the very reasonable price tag, the implementation of intrusion detection systems would be an auspicious step by the automotive industry to assure the security—and safety—of the modern automobile. This paper volunteers a comprehensive review of intrusion detection technologies in the automotive domain.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"25 4","pages":"2356-2426"},"PeriodicalIF":34.4000,"publicationDate":"2023-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10233928","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Communications Surveys and Tutorials","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10233928/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
The automotive domain has realized amazing advancements in communication, connectivity, and automation—and at a breakneck pace. Such advancements come with ample benefits, such as the reduction of traffic accidents and the refinement of transit efficiency. However, these new developments were not necessarily made with security in mind. Researchers have unearthed a number of security vulnerabilities in paradigms such as in-vehicle networks (IVNs), the Internet of Vehicles (IoV), and intelligent transportation systems (ITSs). As automotive technologies continue to evolve, it would be realistic to expect new vulnerabilities to arise—both vulnerabilities that are identified and vulnerabilities that are not. If—or more pragmatically, when—these vulnerabilities are exploited, intrusion detection will be paramount. Therefore, we find it prudent to review intrusion detection in the automotive domain. We explore a myriad of threats and intrusion detection techniques—from the boundaries of the vehicle’s own network to the wider Internet of Vehicles (IoV). Intrusion detection, while not a panacea, can be a cost-effective solution to many automotive security issues. Generally, such intrusion detection systems (IDSs) do not disrupt existing hardware, infrastructure, or communications; rather, they merely tap into the network and monitor for suspicious traffic. Given the very reasonable price tag, the implementation of intrusion detection systems would be an auspicious step by the automotive industry to assure the security—and safety—of the modern automobile. This paper volunteers a comprehensive review of intrusion detection technologies in the automotive domain.
期刊介绍:
IEEE Communications Surveys & Tutorials is an online journal published by the IEEE Communications Society for tutorials and surveys covering all aspects of the communications field. Telecommunications technology is progressing at a rapid pace, and the IEEE Communications Society is committed to providing researchers and other professionals the information and tools to stay abreast. IEEE Communications Surveys and Tutorials focuses on integrating and adding understanding to the existing literature on communications, putting results in context. Whether searching for in-depth information about a familiar area or an introduction into a new area, IEEE Communications Surveys & Tutorials aims to be the premier source of peer-reviewed, comprehensive tutorials and surveys, and pointers to further sources. IEEE Communications Surveys & Tutorials publishes only articles exclusively written for IEEE Communications Surveys & Tutorials and go through a rigorous review process before their publication in the quarterly issues.
A tutorial article in the IEEE Communications Surveys & Tutorials should be designed to help the reader to become familiar with and learn something specific about a chosen topic. In contrast, the term survey, as applied here, is defined to mean a survey of the literature. A survey article in IEEE Communications Surveys & Tutorials should provide a comprehensive review of developments in a selected area, covering its development from its inception to its current state and beyond, and illustrating its development through liberal citations from the literature. Both tutorials and surveys should be tutorial in nature and should be written in a style comprehensible to readers outside the specialty of the article.