Security Issues with In-Vehicle Networks, and Enhanced Countermeasures Based on Blockchain

Author:

Khatri Narayan,Shrestha RakeshORCID,Nam Seung YeobORCID

Abstract

Modern vehicles are no longer simply mechanical devices. Connectivity between the vehicular network and the outside world has widened the security holes that hackers can use to exploit a vehicular network. Controller Area Network (CAN), FlexRay, and automotive Ethernet are popular protocols for in-vehicle networks (IVNs) and will stay in the industry for many more years. However, these protocols were not designed with security in mind. They have several vulnerabilities, such as lack of message authentication, lack of message encryption, and an ID-based arbitration mechanism for contention resolution. Adversaries can use these vulnerabilities to launch sophisticated attacks that may lead to loss of life and damage to property. Thus, the security of the vehicles should be handled carefully. In this paper, we investigate the security vulnerabilities with in-vehicle network protocols such as CAN, automotive Ethernet, and FlexRay. A comprehensive survey on security attacks launched against in-vehicle networks is presented along with countermeasures adopted by various researchers. Various algorithms have been proposed in the past for intrusion detection in IVNs. However, those approaches have several limitations that need special attention from the research community. Blockchain is a good approach to solving the existing security issues in IVNs, and we suggest a way to improve IVN security based on a hybrid blockchain.

Funder

National Research Foundation of Korea

Ministry of Science and ICT, South Korea

Publisher

MDPI AG

Subject

Electrical and Electronic Engineering,Computer Networks and Communications,Hardware and Architecture,Signal Processing,Control and Systems Engineering

Reference97 articles.

1. VANET: Vehicular Applications and Inter-Networking Technologies;Hartenstein,2009

2. In-Vehicle Networks Outlook: Achievements and Challenges

3. A Blockchain Framework for Securing Connected and Autonomous Vehicles

4. Regional Blockchain for Vehicular Networks to Prevent 51% Attacks

5. Hackers Remotely Kill a Jeep on the Highway-with Me in It https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/

Cited by 35 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. A Two-Layer Dynamic ECU Group Management Scheme for In-Vehicle CAN Bus;IEEE Transactions on Intelligent Transportation Systems;2024-08

2. Emerging Electric Vehicles and Challenges;Cybersecurity in the Transportation Industry;2024-06-28

3. Blockchain-based Framework for Security and Privacy Solutions in VANET;International Journal of Innovative Science and Research Technology (IJISRT);2024-06-12

4. Cybersecurity Metrics for AI-Based In-Vehicle Intrusion Detection Systems;2024 IEEE Vehicular Networking Conference (VNC);2024-05-29

5. Study of Fixed Point Message Scheduling Algorithm for In-Vehicle Ethernet;Electronics;2024-05-24

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3