Evaluation of Attack Vectors and Risks in Automobiles and Road Infrastructure
Title | Evaluation of Attack Vectors and Risks in Automobiles and Road Infrastructure |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Brewer, John N., Dimitoglou, George |
Conference Name | 2019 International Conference on Computational Science and Computational Intelligence (CSCI) |
Date Published | Dec. 2019 |
Publisher | IEEE |
ISBN Number | 978-1-7281-5584- |
Keywords | 5G mobile communication, attack surface, attack vectors, automobiles, automotive cybersecurity, autonomous cars, Autonomous vehicles, Computational Intelligence, computer network security, Engines, fuzzing, Human Behavior, infrastructure attack vectors, Internet of Things, IoT, mobile robots, pubcrawl, Relays, resilience, Resiliency, road infrastructure, Scalability, Scientific computing, smart automobiles, Telematics, transportation infrastructures, vehicle-automotive security, vehicular ad hoc networks, vulnerabilities |
Abstract | The evolution of smart automobiles and vehicles within the Internet of Things (IoT) - particularly as that evolution leads toward a proliferation of completely autonomous vehicles - has sparked considerable interest in the subject of vehicle/automotive security. While the attack surface is wide, there are patterns of exploitable vulnerabilities. In this study we reviewed, classified according to their attack surface and evaluated some of the common vehicle and infrastructure attack vectors identified in the literature. To remediate these attack vectors, specific technical recommendations have been provided as a way towards secure deployments of smart automobiles and transportation infrastructures. |
URL | http://dx.doi.org/10.1109/CSCI49370.2019.00021 |
DOI | 10.1109/CSCI49370.2019.00021 |
Citation Key | brewer_evaluation_2019 |
- IoT
- vulnerabilities
- vehicular ad hoc networks
- vehicle-automotive security
- transportation infrastructures
- Telematics
- smart automobiles
- scientific computing
- Scalability
- road infrastructure
- Resiliency
- resilience
- Relays
- pubcrawl
- mobile robots
- 5G mobile communication
- Internet of Things
- infrastructure attack vectors
- Human behavior
- fuzzing
- Engines
- computer network security
- computational intelligence
- autonomous vehicles
- autonomous cars
- automotive cybersecurity
- automobiles
- Attack vectors
- attack surface