Securing Connected Vehicles End to End

Paper #:
  • 2014-01-0300

Published:
  • 2014-04-01
DOI:
  • 10.4271/2014-01-0300
Citation:
Zhang, T., Antunes, H., and Aggarwal, S., "Securing Connected Vehicles End to End," SAE Technical Paper 2014-01-0300, 2014, doi:10.4271/2014-01-0300.
Pages:
11
Abstract:
As vehicles become increasingly connected with the external world, they face a growing range of security vulnerabilities. Researchers, hobbyists, and hackers have compromised security keys used by vehicles' electronic control units (ECUs), modified ECU software, and hacked wireless transmissions from vehicle key fobs and tire monitoring sensors. Malware can infect vehicles through Internet connectivity, onboard diagnostic interfaces, devices tethered wirelessly or physically to the vehicle, malware-infected aftermarket devices or spare parts, and onboard Wi-Fi hotspot. Once vehicles are interconnected, compromised vehicles can also be used to attack the connected transportation system and other vehicles. Securing connected vehicles impose a range of unique new challenges. This paper describes some of these unique challenges and presents an end-to-end cloud-assisted connected vehicle security framework that can address these challenges.
Access
Now
SAE MOBILUS Subscriber? You may already have access.
Buy
Select
Price
List
Download
$27.00
Mail
$27.00
Members save up to 40% off list price.
Share
HTML for Linking to Page
Page URL

Related Items

Article
2016-09-06
Article
2016-08-24