Skip to main content

Investigating Security Vulnerabilities in Modern Vehicle Systems

  • Conference paper
  • First Online:
Applications and Techniques in Information Security (ATIS 2016)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 651))

Abstract

Modern vehicle systems have evolved from an isolated control system into an interconnected architecture combining software, hardware, and data. Such architecture is specialized into vehicle infotainment system (e.g., SYNC of Ford, iDrive of BMW and MMI of Audi), Vehicle to Vehicle (V2V), Vehicle to Infrastructure (V2I), and vehicle social system which connects to social media networks. These systems hold private and sensitive information such as travel plans, social network messages, login credentials to bank accounts, and so on, which is a lucrative target for malicious attackers. Unfortunately, existing research overlooks the security issues with respect to this highly integrated system. This paper presents security issues across various systems related to modern vehicles through a a holistic and systematic view. We analyze each system components with respect to published attacks in details and present a synthesized body of knowledge. We identify the growing trend where security attacks are launched from the cyber space to vehicle control system via smartphones and vehicle networks. In the foreseeable future, we expect more security attacks both in numbers and in complexity. Knowing this will arise the awareness of vehicle system security and help engineers to build security solutions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Al-Kahtani, M.S.: Survey on security attacks in vehicular ad hoc networks (vanets). In Proceedings of ICSPCS, pp. 1–9. IEEE (2012)

    Google Scholar 

  2. Apple. CarPlay (2016). http://www.apple.com/au/ios/carplay/?cid=wwa-au-kwg-features. Accessed 5 April 2016

  3. Apple. Siri (2016). http://www.apple.com/au/ios/siri/. Accessed 5 April 2016

  4. Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001). doi:10.1007/3-540-44647-8_13

    Chapter  Google Scholar 

  5. Brooks, R.R., Sander, S., Deng, J., Taiber, J.: Automobile security concerns. Veh. Technol. Mag. 4(2), 52–64 (2009)

    Article  Google Scholar 

  6. Delgrossi, L., Zhang, T.: Dedicated short-range communications. In: Vehicle Safety Communications: Protocols, Security, and Privacy, pp. 44–51 (2009)

    Google Scholar 

  7. Dresner, K., Stone, P.: A multiagent approach to autonomous intersection management. J. Artif. Intell. Res. 31, 591–656 (2008)

    Google Scholar 

  8. Ehsani, M., Gao, Y., Emadi, A.: Modern Electric, Hybrid Electric, and Fuel Cell Vehicles: Fundamentals, Theory, and Design. CRC Press (2009)

    Google Scholar 

  9. Etschberger, K.: Controller Area Network: Basics, Protocols, Chips and Applications. IXXAT Press, Weingarten (2001)

    Google Scholar 

  10. Faezipour, M., Nourani, M., Saeed, A., Addepalli, S.: Progress and challenges in intelligent vehicle area networks. Commun. ACM 55(2), 90–100 (2012)

    Article  Google Scholar 

  11. Greengard, S.: Automotive systems get smarter. Commun. ACM 58(10), 18–20 (2015)

    Article  Google Scholar 

  12. Gusikhin, O., Filev, D., Rychtyckyj, N.: Intelligent vehicle systems: applications and new trends. In: Cetto, J.A., Ferrier, J.-L., Costa dias Pereira, J.M., Filipe, J. (eds.) Informatics in Control Automation and Robotics. LNEE, vol. 15, pp. 3–14. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  13. Hartenstein, H., Laberteaux, K.P.: A tutorial survey on vehicular ad hoc networks. Commun. Mag. 46(6), 164–171 (2008)

    Article  Google Scholar 

  14. Hoh, B., Gruteser, M., Xiong, H., Alrabady, A.: Enhancing security and privacy in traffic-monitoring systems. Pervasive Comput. 5(4), 38–46 (2006)

    Article  Google Scholar 

  15. Hoppe, T., Dittman, J.: Sniffing/replay attacks on can buses: a simulated attack on the electric window lift classified using an adapted cert taxonomy. In: Proceedings of WESS, pp. 1–6 (2007)

    Google Scholar 

  16. Isaac, J.T., Camara, J.S., Zeadally, S., Marquez, J.T.: A secure vehicle-to-roadside communication payment protocol in vehicular ad hoc networks. Comput. Commun. 31(10), 2478–2484 (2008)

    Article  Google Scholar 

  17. Miller, R., Rouf, I., Mustafa, H., Taylor, T., Oh, S., Xu, W., Gruteser, M., Trappe, W., Seskar, I.: Security and privacy vulnerabilities of in-car wireless networks: a tire pressure monitoring system case study. In: 19th USENIX Security Symposium, pp. 11–13 (2010)

    Google Scholar 

  18. Jungels, D., Raya, M., Aad, I., Hubaux, J.P.: Certificate revocation in vehicular ad hoc networks. Technical LCA-Report-2006-006, LCA (2006)

    Google Scholar 

  19. Koscher, K., Czeskis, A., Roesner, F., Patel, S., Kohno, T., Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, D., et al.: Experimental security analysis of a modern automobile. In: IEEE Symposium on Security and Privacy, pp. 447–462. IEEE (2010)

    Google Scholar 

  20. Le-Anh, T., De Koster, M.: A review of design and control of automated guided vehicle systems. Eur. J. Oper. Res. 171(1), 1–23 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  21. Li, Q.: Impacts of vehicle to infrastructure communication technologies on vehicle emissions. Environ. Sci. Technol. 1, 326 (2014)

    Article  Google Scholar 

  22. Luo, J., Hubaux, J.-P.: A survey of inter-vehicle communication. Technical report (2004)

    Google Scholar 

  23. Maaroufi, S., Pierre, S.: Vehicular social systems: an overview and a performance case study. In: Proceedings of the Fourth ACM International Symposium on Development and Analysis of Intelligent Vehicular Networks and Applications, pp. 17–24. ACM (2014)

    Google Scholar 

  24. Moharrum, M.A., Al-Daraiseh, A.A.: Toward secure vehicular ad-hoc networks: a survey. IETE Techn. Rev. 29(1), 80–89 (2012)

    Article  Google Scholar 

  25. Nilsson, D.K., Larson, U.E.: Simulated attacks on can buses: vehicle virus. In: Proceedings of AsiaCSN, pp. 66–72 (2008)

    Google Scholar 

  26. Park, S., Aslam, B., Turgut, D., Zou, C.C.: Defense against sybil attack in vehicular ad hoc network based on roadside unit support. In: Proceedings of MILCOM, pp. 1–7. IEEE (2009)

    Google Scholar 

  27. Pawar, T., Manekar, A.: Security threats and its solution for vehicular ad hoc network: a review. Int. J. Electron. Commun. Soft Comput. Sci. Eng. 3(7), 17 (2014)

    Google Scholar 

  28. PRNewswire. PRNewswire (2016). http://goo.gl/ZET6NO. Accessed 5 April 2016

  29. Razzaque, M., Salehi, A., Cheraghi, S.M.: Security and privacy in vehicular ad-hoc networks: survey and the road ahead. In: Khan, S., Pathan, A.-S.K. (eds.) Wireless Networks and Security. SCT, pp. 107–132. Springer, Heidelberg (2013)

    Google Scholar 

  30. Sangiovanni-Vincentelli, A., Natale, M.: Embedded system design for automotive applications. Computer 40(10), 42–51 (2007)

    Article  Google Scholar 

  31. Schuette, H., Waeltermann, P.: Hardware-in-the-loop testing of vehicle dynamics controllers-a technical survey. Technical report, SAE Technical Paper (2005)

    Google Scholar 

  32. Sha, W., Kwak, D., Nath, B., Iftode, L.: Social vehicle navigation: integrating shared driving experience into vehicle navigation. In: Proceedings of the 14th Workshop on Mobile Computing Systems and Applications, p. 16. ACM (2013)

    Google Scholar 

  33. Sichitiu, M.L., Kihl, M.: Inter-vehicle communication systems: a survey. Commun. Surv. Tutorials 10(2), 88–105 (2008)

    Article  Google Scholar 

  34. Tashev, I., Seltzer, M., Ju, Y.C., Wang, Y.Y., Acero, A.: Commute UX: voice enabled in-car infotainment system. In: Mobile HCI, vol. 9 (2009)

    Google Scholar 

  35. Tegra. Tegra (2016). http://www.nvidia.com/object/tegra.html. Accessed 5 April 2016

  36. Tesla. Tesla (2016). https://www.teslamotors.com/en_AU/. Accessed 5 April 2016

  37. Toth, P., Vigo, D.: Vehicle Routing: Problems, Methods, and Applications, vol. 18. SIAM, Philadelphia (2014)

    Book  MATH  Google Scholar 

  38. Verdult, R., Garcia, F.D., Balasch, J.: Gone in 360 seconds: Hijacking with hitag2. In: Proceedings of USENIX Security, pp. 237–252 (2012)

    Google Scholar 

  39. Vis, I.F.: Survey of research in the design and control of automated guided vehicle systems. Eur. J. Oper. Res. 170(3), 677–709 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  40. Xu, Q., Mak, T., Ko, J., Sengupta, R.: Vehicle-to-vehicle safety messaging in DSRC. In: Proceedings of the 1st ACM International Workshop on Vehicular Ad Hoc Networks, pp. 19–28. ACM (2004)

    Google Scholar 

  41. Yang, X., Liu, J., Vaidya, N.H., Zhao, F.: A vehicle-to-vehicle communication protocol for cooperative collision warning. In: Proceedings of MOBIQUITOUS, pp. 114–123. IEEE (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xi Zheng .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Zheng, X., Pan, L., Chen, H., Wang, P. (2016). Investigating Security Vulnerabilities in Modern Vehicle Systems. In: Batten, L., Li, G. (eds) Applications and Techniques in Information Security. ATIS 2016. Communications in Computer and Information Science, vol 651. Springer, Singapore. https://doi.org/10.1007/978-981-10-2741-3_3

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-2741-3_3

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-2740-6

  • Online ISBN: 978-981-10-2741-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics