Abstract
AbstractThis study aims to provide a new approach for describing and measuring the vulnerability of in-vehicle networks regarding cyberattacks. Cyberattacks targeting in-vehicle networks can result in a reasonable threat considering passenger safety. Unlike previous literature, the methodology focuses on a comparatively large sample of vehicle networks (114 objects) by proposing a new framework of statistical techniques for measuring, classifying, and modelling in-vehicle networks concerning the changed vulnerability, instead of dealing with each vehicle network individually. To facilitate understanding of the vulnerability patterns of in-vehicle networks, the dataset has been evaluated through three analytic stages: vulnerability identification, classification, and modeling. The result has helped in ranking vehicles based on their network vulnerability level. The result of the modeling has shown that every additional remote endpoint installation causes a relevant weakening in security. Higher cost vehicles have also appeared to be more vulnerable to cyberattacks, while the increase in the number of segmented network domains has had a positive effect on network security.
Funder
Budapest University of Technology and Economics
Publisher
Springer Science and Business Media LLC
Reference43 articles.
1. Abbas OA (2008) Comparisons between data clustering algorithms. Int Arab J Inf Technol 5(3):320–325
2. Ahmed-Zaid F et al (2011) Vehicle safety communications—applications (VSC-A) final report. DOT HS 811 492, no. September, pp 1–102
3. András S, Levente B, Zsolt S (2015) Hacking cars in the style of Stuxnet. Retrieved from http://www.hit.bme.hu/~buttyan/publications/carhacking-Hacktivity-2015.pdf. Accessed 2019
4. Baker FB, Hubert LJ (1975) Measuring the power of hierarchical cluster analysis. J Am Stat Assoc 70(349):31–38
5. Boehner M (2019) Security for connected vehicles throughout the entire life cycle. ATZelectronics Worldw 14(1–2):16–21
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献