Javascript must be enabled to continue!
Do Vehicles Need Data Security?
View through CrossRef
<div class="section abstract"><div class="htmlview paragraph">Data security was introduced to vehicles in the 1980's with the electronic theft protection system. Since then data security was also implemented in further electronic systems of vehicles, including theft protection for electronic control units, protection of mileage counter integrity, protection against software manipulation (secure flashing), and secure wireless on-board diagnoses (e.g. via Bluetooth). Vehicles include more and more electronic systems and open communication channels based on public standards, making them vulnerable to a variety of attacks. Security mitigation mechanisms are implemented in software and might be supported by a controller with basic security features.</div><div class="htmlview paragraph">Recently, research was started to centralize security features in a single dedicated security controller. This security controller implements cryptographic methods and provides tamper resistance. Current and future applications with need for security include vehicular communication, feature activation and pay-on-demand applications as well as digital content protection systems.</div><div class="htmlview paragraph">In this work we will analyze which degree of implemented security features in a vehicle is reasonable. We will consider both security features based on secure hardware and software mechanisms. We will distinguish applications that protect a financial asset (e.g. theft protection) and safety applications (e.g. future vehicle-to-vehicle wireless communication safety applications). We will evaluate whether there is a threat to safety because of new technologies, and how this threat needs to be mitigated. Finally, we will identify the useful mitigation mechanisms and describe how these need to evolve over time. We will perform the evaluation under the premise of economic security, i.e. always assuming that only economically feasible solutions will be deployed.</div></div>
Title: Do Vehicles Need Data Security?
Description:
<div class="section abstract"><div class="htmlview paragraph">Data security was introduced to vehicles in the 1980's with the electronic theft protection system.
Since then data security was also implemented in further electronic systems of vehicles, including theft protection for electronic control units, protection of mileage counter integrity, protection against software manipulation (secure flashing), and secure wireless on-board diagnoses (e.
g.
via Bluetooth).
Vehicles include more and more electronic systems and open communication channels based on public standards, making them vulnerable to a variety of attacks.
Security mitigation mechanisms are implemented in software and might be supported by a controller with basic security features.
</div><div class="htmlview paragraph">Recently, research was started to centralize security features in a single dedicated security controller.
This security controller implements cryptographic methods and provides tamper resistance.
Current and future applications with need for security include vehicular communication, feature activation and pay-on-demand applications as well as digital content protection systems.
</div><div class="htmlview paragraph">In this work we will analyze which degree of implemented security features in a vehicle is reasonable.
We will consider both security features based on secure hardware and software mechanisms.
We will distinguish applications that protect a financial asset (e.
g.
theft protection) and safety applications (e.
g.
future vehicle-to-vehicle wireless communication safety applications).
We will evaluate whether there is a threat to safety because of new technologies, and how this threat needs to be mitigated.
Finally, we will identify the useful mitigation mechanisms and describe how these need to evolve over time.
We will perform the evaluation under the premise of economic security, i.
e.
always assuming that only economically feasible solutions will be deployed.
</div></div>.
Related Results
UNDERSTANDING CONSUMERS INTENTION TO PURCHASE GREEN VEHICLE: A LITERATURE REVIEW
UNDERSTANDING CONSUMERS INTENTION TO PURCHASE GREEN VEHICLE: A LITERATURE REVIEW
Global warming is one of the main issues discuss by nations leaders. It is a crucial problem that needs to be address immediately. One of the solutions to global warming is green v...
Public budget security administration: development of primary mechanisms
Public budget security administration: development of primary mechanisms
The current state of public administration of budget security indicates its actual absence. With the extremely important role of budget security, both in the life of the country as...
Rescue and Firefighting Operations During Incidents Involving Vehicles with Alternative Propulsion. Electric Vehicles
Rescue and Firefighting Operations During Incidents Involving Vehicles with Alternative Propulsion. Electric Vehicles
Cel: The aim of the article is to review information about motor vehicles that use alternative propulsion systems (in this case, electric propulsion) and the risks associated with ...
A Front Face Design of New Energy Vehicles Based on Rough Set Theory and Backpropagation Neural Network
A Front Face Design of New Energy Vehicles Based on Rough Set Theory and Backpropagation Neural Network
With the increasing awareness of environmental protection and prominent problem of traditional energy, new energy vehicles are an important choice to replace traditional oil-fueled...
Circular Economy: Rethinking Security Sustainability Through Ransom Project
Circular Economy: Rethinking Security Sustainability Through Ransom Project
Abstract
As part of PETRONAS approach to sustainability, the organization has made more concerted effort to purposefully adopt Circular Economy (CE) across PETRONAS ...
Testing the Fire Safety of Electric Vehicles
Testing the Fire Safety of Electric Vehicles
Aim: The aim of the article is to discuss, using literature on the subject, the results of scientific research and fire tests devoted to lithium-ion batteries and electric-powered ...
THE SECURITY AND PRIVACY MEASURING SYSTEM FOR THE INTERNET OF THINGS DEVICES
THE SECURITY AND PRIVACY MEASURING SYSTEM FOR THE INTERNET OF THINGS DEVICES
The purpose of the article: elimination of the gap in existing need in the set of clear and objective security and privacy metrics for the IoT devices users and manufacturers and a...
SECURITY REQUIREMENTS VALIDATION FOR MOBILE APPS: A SYSTEMATIC LITERATURE REVIEW
SECURITY REQUIREMENTS VALIDATION FOR MOBILE APPS: A SYSTEMATIC LITERATURE REVIEW
Security requirements are important to increase the confidence of mobile users to perform many online transactions, such as banking, booking and payment via mobile devices. Object...

