Abstract
Modern vehicle systems have evolved from an isolated control system into an interconnected architecture combining software, hardware, and data. Such architecture is specialized into vehicle infotainment system (e.g., SYNC of Ford, iDrive of BMW and MMI of Audi), Vehicle to Vehicle (V2V), Vehicle to Infrastructure (V2I), and vehicle social system which connects to social media networks. These systems hold private and sensitive information such as travel plans, social network messages, login credentials to bank accounts, and so on, which is a lucrative target for malicious attackers. Unfortunately, existing research overlooks the security issues with respect to this highly integrated system. This paper presents security issues across various systems related to modern vehicles through a a holistic and systematic view. We analyze each system components with respect to published attacks in details and present a synthesized body of knowledge. We identify the growing trend where security attacks are launched from the cyber space to vehicle control system via smartphones and vehicle networks. In the foreseeable future, we expect more security attacks both in numbers and in complexity. Knowing this will arise the awareness of vehicle system security and help engineers to build security solutions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Al-Kahtani, M.S.: Survey on security attacks in vehicular ad hoc networks (vanets). In Proceedings of ICSPCS, pp. 1–9. IEEE (2012)
Apple. CarPlay (2016). http://www.apple.com/au/ios/carplay/?cid=wwa-au-kwg-features. Accessed 5 April 2016
Apple. Siri (2016). http://www.apple.com/au/ios/siri/. Accessed 5 April 2016
Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001). doi:10.1007/3-540-44647-8_13
Brooks, R.R., Sander, S., Deng, J., Taiber, J.: Automobile security concerns. Veh. Technol. Mag. 4(2), 52–64 (2009)
Delgrossi, L., Zhang, T.: Dedicated short-range communications. In: Vehicle Safety Communications: Protocols, Security, and Privacy, pp. 44–51 (2009)
Dresner, K., Stone, P.: A multiagent approach to autonomous intersection management. J. Artif. Intell. Res. 31, 591–656 (2008)
Ehsani, M., Gao, Y., Emadi, A.: Modern Electric, Hybrid Electric, and Fuel Cell Vehicles: Fundamentals, Theory, and Design. CRC Press (2009)
Etschberger, K.: Controller Area Network: Basics, Protocols, Chips and Applications. IXXAT Press, Weingarten (2001)
Faezipour, M., Nourani, M., Saeed, A., Addepalli, S.: Progress and challenges in intelligent vehicle area networks. Commun. ACM 55(2), 90–100 (2012)
Greengard, S.: Automotive systems get smarter. Commun. ACM 58(10), 18–20 (2015)
Gusikhin, O., Filev, D., Rychtyckyj, N.: Intelligent vehicle systems: applications and new trends. In: Cetto, J.A., Ferrier, J.-L., Costa dias Pereira, J.M., Filipe, J. (eds.) Informatics in Control Automation and Robotics. LNEE, vol. 15, pp. 3–14. Springer, Heidelberg (2008)
Hartenstein, H., Laberteaux, K.P.: A tutorial survey on vehicular ad hoc networks. Commun. Mag. 46(6), 164–171 (2008)
Hoh, B., Gruteser, M., Xiong, H., Alrabady, A.: Enhancing security and privacy in traffic-monitoring systems. Pervasive Comput. 5(4), 38–46 (2006)
Hoppe, T., Dittman, J.: Sniffing/replay attacks on can buses: a simulated attack on the electric window lift classified using an adapted cert taxonomy. In: Proceedings of WESS, pp. 1–6 (2007)
Isaac, J.T., Camara, J.S., Zeadally, S., Marquez, J.T.: A secure vehicle-to-roadside communication payment protocol in vehicular ad hoc networks. Comput. Commun. 31(10), 2478–2484 (2008)
Miller, R., Rouf, I., Mustafa, H., Taylor, T., Oh, S., Xu, W., Gruteser, M., Trappe, W., Seskar, I.: Security and privacy vulnerabilities of in-car wireless networks: a tire pressure monitoring system case study. In: 19th USENIX Security Symposium, pp. 11–13 (2010)
Jungels, D., Raya, M., Aad, I., Hubaux, J.P.: Certificate revocation in vehicular ad hoc networks. Technical LCA-Report-2006-006, LCA (2006)
Koscher, K., Czeskis, A., Roesner, F., Patel, S., Kohno, T., Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, D., et al.: Experimental security analysis of a modern automobile. In: IEEE Symposium on Security and Privacy, pp. 447–462. IEEE (2010)
Le-Anh, T., De Koster, M.: A review of design and control of automated guided vehicle systems. Eur. J. Oper. Res. 171(1), 1–23 (2006)
Li, Q.: Impacts of vehicle to infrastructure communication technologies on vehicle emissions. Environ. Sci. Technol. 1, 326 (2014)
Luo, J., Hubaux, J.-P.: A survey of inter-vehicle communication. Technical report (2004)
Maaroufi, S., Pierre, S.: Vehicular social systems: an overview and a performance case study. In: Proceedings of the Fourth ACM International Symposium on Development and Analysis of Intelligent Vehicular Networks and Applications, pp. 17–24. ACM (2014)
Moharrum, M.A., Al-Daraiseh, A.A.: Toward secure vehicular ad-hoc networks: a survey. IETE Techn. Rev. 29(1), 80–89 (2012)
Nilsson, D.K., Larson, U.E.: Simulated attacks on can buses: vehicle virus. In: Proceedings of AsiaCSN, pp. 66–72 (2008)
Park, S., Aslam, B., Turgut, D., Zou, C.C.: Defense against sybil attack in vehicular ad hoc network based on roadside unit support. In: Proceedings of MILCOM, pp. 1–7. IEEE (2009)
Pawar, T., Manekar, A.: Security threats and its solution for vehicular ad hoc network: a review. Int. J. Electron. Commun. Soft Comput. Sci. Eng. 3(7), 17 (2014)
PRNewswire. PRNewswire (2016). http://goo.gl/ZET6NO. Accessed 5 April 2016
Razzaque, M., Salehi, A., Cheraghi, S.M.: Security and privacy in vehicular ad-hoc networks: survey and the road ahead. In: Khan, S., Pathan, A.-S.K. (eds.) Wireless Networks and Security. SCT, pp. 107–132. Springer, Heidelberg (2013)
Sangiovanni-Vincentelli, A., Natale, M.: Embedded system design for automotive applications. Computer 40(10), 42–51 (2007)
Schuette, H., Waeltermann, P.: Hardware-in-the-loop testing of vehicle dynamics controllers-a technical survey. Technical report, SAE Technical Paper (2005)
Sha, W., Kwak, D., Nath, B., Iftode, L.: Social vehicle navigation: integrating shared driving experience into vehicle navigation. In: Proceedings of the 14th Workshop on Mobile Computing Systems and Applications, p. 16. ACM (2013)
Sichitiu, M.L., Kihl, M.: Inter-vehicle communication systems: a survey. Commun. Surv. Tutorials 10(2), 88–105 (2008)
Tashev, I., Seltzer, M., Ju, Y.C., Wang, Y.Y., Acero, A.: Commute UX: voice enabled in-car infotainment system. In: Mobile HCI, vol. 9 (2009)
Tegra. Tegra (2016). http://www.nvidia.com/object/tegra.html. Accessed 5 April 2016
Tesla. Tesla (2016). https://www.teslamotors.com/en_AU/. Accessed 5 April 2016
Toth, P., Vigo, D.: Vehicle Routing: Problems, Methods, and Applications, vol. 18. SIAM, Philadelphia (2014)
Verdult, R., Garcia, F.D., Balasch, J.: Gone in 360 seconds: Hijacking with hitag2. In: Proceedings of USENIX Security, pp. 237–252 (2012)
Vis, I.F.: Survey of research in the design and control of automated guided vehicle systems. Eur. J. Oper. Res. 170(3), 677–709 (2006)
Xu, Q., Mak, T., Ko, J., Sengupta, R.: Vehicle-to-vehicle safety messaging in DSRC. In: Proceedings of the 1st ACM International Workshop on Vehicular Ad Hoc Networks, pp. 19–28. ACM (2004)
Yang, X., Liu, J., Vaidya, N.H., Zhao, F.: A vehicle-to-vehicle communication protocol for cooperative collision warning. In: Proceedings of MOBIQUITOUS, pp. 114–123. IEEE (2004)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Zheng, X., Pan, L., Chen, H., Wang, P. (2016). Investigating Security Vulnerabilities in Modern Vehicle Systems. In: Batten, L., Li, G. (eds) Applications and Techniques in Information Security. ATIS 2016. Communications in Computer and Information Science, vol 651. Springer, Singapore. https://doi.org/10.1007/978-981-10-2741-3_3
Download citation
DOI: https://doi.org/10.1007/978-981-10-2741-3_3
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-2740-6
Online ISBN: 978-981-10-2741-3
eBook Packages: Computer ScienceComputer Science (R0)