{"title":"针对联网和自动驾驶汽车的网络攻击分析与仿真","authors":"Shahid Malik, Weiqing Sun","doi":"10.1109/MetroCAD48866.2020.00018","DOIUrl":null,"url":null,"abstract":"We are expecting to see hundreds of thousands of smart connected cars in a matter of months from now until they replace the legacy vehicles. Connectivity is at the core of every such vehicle, with a large number of computer systems to monitor and control the vehicle. Cyber-security threats are on the rise and manufacturers are facing a unique level of challenge given the increasing complexity of the vehicles. Consumers need to understand the security implications of connected and autonomous vehicles before they can drive them with confidence. This paper reviews most common cyber attacks that hackers use to disrupt and compromise connected and autonomous vehicles. In particular, we use the threat modeling to analyze and identify the most significant threats. Moreover, we simulated the impact of those cyber attacks to demonstrate the significance of the cyber threats against connected and autonomous vehicles.","PeriodicalId":117440,"journal":{"name":"2020 International Conference on Connected and Autonomous Driving (MetroCAD)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"14","resultStr":"{\"title\":\"Analysis and Simulation of Cyber Attacks Against Connected and Autonomous Vehicles\",\"authors\":\"Shahid Malik, Weiqing Sun\",\"doi\":\"10.1109/MetroCAD48866.2020.00018\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We are expecting to see hundreds of thousands of smart connected cars in a matter of months from now until they replace the legacy vehicles. Connectivity is at the core of every such vehicle, with a large number of computer systems to monitor and control the vehicle. Cyber-security threats are on the rise and manufacturers are facing a unique level of challenge given the increasing complexity of the vehicles. Consumers need to understand the security implications of connected and autonomous vehicles before they can drive them with confidence. This paper reviews most common cyber attacks that hackers use to disrupt and compromise connected and autonomous vehicles. In particular, we use the threat modeling to analyze and identify the most significant threats. Moreover, we simulated the impact of those cyber attacks to demonstrate the significance of the cyber threats against connected and autonomous vehicles.\",\"PeriodicalId\":117440,\"journal\":{\"name\":\"2020 International Conference on Connected and Autonomous Driving (MetroCAD)\",\"volume\":\"10 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"14\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 International Conference on Connected and Autonomous Driving (MetroCAD)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/MetroCAD48866.2020.00018\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 International Conference on Connected and Autonomous Driving (MetroCAD)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MetroCAD48866.2020.00018","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Analysis and Simulation of Cyber Attacks Against Connected and Autonomous Vehicles
We are expecting to see hundreds of thousands of smart connected cars in a matter of months from now until they replace the legacy vehicles. Connectivity is at the core of every such vehicle, with a large number of computer systems to monitor and control the vehicle. Cyber-security threats are on the rise and manufacturers are facing a unique level of challenge given the increasing complexity of the vehicles. Consumers need to understand the security implications of connected and autonomous vehicles before they can drive them with confidence. This paper reviews most common cyber attacks that hackers use to disrupt and compromise connected and autonomous vehicles. In particular, we use the threat modeling to analyze and identify the most significant threats. Moreover, we simulated the impact of those cyber attacks to demonstrate the significance of the cyber threats against connected and autonomous vehicles.