Facial reconstruction

Search LJMU Research Online

Browse Repository | Browse E-Theses

DRIVING WITH SHARKS Rethinking Connected Vehicles with Vehicle Cybersecurity

Hashem Eiza, M and Ni, Q (2017) DRIVING WITH SHARKS Rethinking Connected Vehicles with Vehicle Cybersecurity. IEEE Vehicular Technology Magazine, 12 (2). pp. 45-51. ISSN 1556-6072

VT-Article-Final.pdf - Accepted Version

Download (1MB) | Preview


In a public service announcement on 17 March 2016, the Federal Bureau of Investigation jointly with the U.S. Department of Transportation and the National Highway Traffic Safety Administration (NHTSA) released a warning regarding the increasing vulnerability of motor vehicles to remote exploits [18]. Engine shutdowns, disabled brakes, and locked doors are a few examples of possible vehicle cybersecurity attacks. Modern cars grow into a new target for cyberattacks as they become increasingly connected. While driving on the road, sharks (i.e., hackers) need only to be within communication range of a vehicle to attack it. However, in some cases, they can hack into it while they are miles away. In this article, we aim to illuminate the latest vehicle cybersecurity threats including malware attacks, on-board diagnostic (OBD) vulnerabilities, and automobile apps threats. We illustrate the in-vehicle network architecture and demonstrate the latest defending mechanisms designed to mitigate such threats.

Item Type: Article
Uncontrolled Keywords: Science & Technology; Technology; Engineering, Electrical & Electronic; Telecommunications; Transportation Science & Technology; Engineering; Transportation; Networking & Telecommunications
Subjects: H Social Sciences > HE Transportation and Communications
Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Q Science > QA Mathematics > QA76 Computer software
Divisions: Computer Science & Mathematics
Publisher: IEEE
SWORD Depositor: A Symplectic
Date Deposited: 23 Aug 2022 10:55
Last Modified: 23 Aug 2022 11:00
DOI or ID number: 10.1109/MVT.2017.2669348
URI: https://researchonline.ljmu.ac.uk/id/eprint/17434
View Item View Item