Analysis and Simulation of Cyber Attacks Against Connected and Autonomous Vehicles

Shahid Malik, Weiqing Sun
{"title":"Analysis and Simulation of Cyber Attacks Against Connected and Autonomous Vehicles","authors":"Shahid Malik, Weiqing Sun","doi":"10.1109/MetroCAD48866.2020.00018","DOIUrl":null,"url":null,"abstract":"We are expecting to see hundreds of thousands of smart connected cars in a matter of months from now until they replace the legacy vehicles. Connectivity is at the core of every such vehicle, with a large number of computer systems to monitor and control the vehicle. Cyber-security threats are on the rise and manufacturers are facing a unique level of challenge given the increasing complexity of the vehicles. Consumers need to understand the security implications of connected and autonomous vehicles before they can drive them with confidence. This paper reviews most common cyber attacks that hackers use to disrupt and compromise connected and autonomous vehicles. In particular, we use the threat modeling to analyze and identify the most significant threats. Moreover, we simulated the impact of those cyber attacks to demonstrate the significance of the cyber threats against connected and autonomous vehicles.","PeriodicalId":117440,"journal":{"name":"2020 International Conference on Connected and Autonomous Driving (MetroCAD)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"14","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 International Conference on Connected and Autonomous Driving (MetroCAD)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MetroCAD48866.2020.00018","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 14

Abstract

We are expecting to see hundreds of thousands of smart connected cars in a matter of months from now until they replace the legacy vehicles. Connectivity is at the core of every such vehicle, with a large number of computer systems to monitor and control the vehicle. Cyber-security threats are on the rise and manufacturers are facing a unique level of challenge given the increasing complexity of the vehicles. Consumers need to understand the security implications of connected and autonomous vehicles before they can drive them with confidence. This paper reviews most common cyber attacks that hackers use to disrupt and compromise connected and autonomous vehicles. In particular, we use the threat modeling to analyze and identify the most significant threats. Moreover, we simulated the impact of those cyber attacks to demonstrate the significance of the cyber threats against connected and autonomous vehicles.
针对联网和自动驾驶汽车的网络攻击分析与仿真
我们希望在几个月内看到成千上万的智能联网汽车,直到它们取代传统汽车。连接是每一辆这样的车辆的核心,有大量的计算机系统来监控和控制车辆。网络安全威胁正在上升,鉴于车辆日益复杂,制造商正面临着独特的挑战。消费者需要先了解联网和自动驾驶汽车的安全隐患,然后才能放心驾驶。本文回顾了黑客用来破坏联网和自动驾驶汽车的最常见的网络攻击。特别地,我们使用威胁建模来分析和识别最重要的威胁。此外,我们模拟了这些网络攻击的影响,以证明网络威胁对联网和自动驾驶汽车的重要性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信