Abstract
AbstractThis article investigates cybersecurity issues related to in-vehicle communication networks. In-vehicle communication network security is evaluated based on the protection characteristics of the network components and the topology of the network. The automotive communication network topologies are represented as undirected weighted graphs, and their vulnerability is estimated based on the specific characteristics of the generated graph. Thirteen different vehicle models have been investigated to compare the vulnerability levels of the in-vehicle network using the Dijkstra's shortest route algorithm. An important advantage of the proposed method is that it is in accordance with the most relevant security evaluation models. On the other hand, the newly introduced approach considers the Secure-by-Design concept principles.
Funder
New National Excellence Programme Bolyai+
Autonomous Systems National Laboratory Programme
Budapest University of Technology and Economics
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering
Reference29 articles.
1. (2021) Vag self study program. http://www.volkspage.net/technik/ssp/index4_eng.php
2. Bajpai P, Enbody R (2020) Towards effective identification and rating of automotive vulnerabilities. In: Proceedings of the Second ACM Workshop on Automotive and Aerial Vehicle Security, pp. 37–44
3. Deng Y, Chen Y, Zhang Y, Mahadevan S (2012) Fuzzy Dijkstra algorithm for shortest path problem under uncertain environment. Appl Soft Comput 12(3):1231–1237
4. ETSI T (2017) 102 165-1 v5. 2.3 (2017-10) cyber; methods and protocols; part 1: Method and proforma for threat, vulnerability. Risk Analysis (TVRA) Standard, European Telecommunications Standards Institute (ETSI)
5. Ghadi M, Sali Á, Szalay Z, Török Á (2020) A new methodology for analyzing vehicle network topologies for critical hacking. J Amb Int Humanized Comp pp. 1–12
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. AuSSE: A Novel Framework for Security and Safety Evaluation for Autonomous Vehicles;2024 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume (DSN-S);2024-06-24
2. Introduction to the Special Issue on Automotive CPS Safety & Security: Part 2;ACM Transactions on Cyber-Physical Systems;2024-04-30
3. Building the Shortest Path Database in Urban Traffic Network Using RAO Algorithm;Lecture Notes in Computer Science;2024
4. Mobility-Based Wormhole Detection at V2V and RSU in VANETs;2023 IEEE 5th International Conference on Cybernetics, Cognition and Machine Learning Applications (ICCCMLA);2023-10-07
5. Reducing Time for Performing ASPICE Assessments;Lecture Notes in Networks and Systems;2023