Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Automotive Cyber Security - Shiho Kim, Rakesh Shrestha

Automotive Cyber Security

Introduction, Challenges, and Standardization
Buch | Hardcover
216 Seiten
2020 | 1st ed. 2020
Springer Verlag, Singapore
978-981-15-8052-9 (ISBN)
CHF 224,65 inkl. MwSt
  • Versand in 15-20 Tagen
  • Versandkostenfrei
  • Auch auf Rechnung
  • Artikel merken
This book outlines the development of safety and cybersecurity, threats and activities in automotive vehicles. This book discusses the automotive vehicle applications and technological aspects considering its cybersecurity issues. Each chapter offers a suitable context for understanding the complexities of the connectivity and cybersecurity of intelligent and autonomous vehicles. A top-down strategy was adopted to introduce the vehicles’ intelligent features and functionality. The area of vehicle-to-everything (V2X) communications aims to exploit the power of ubiquitous connectivity for the traffic safety and transport efficiency. The chapters discuss in detail about the different levels of autonomous vehicles, different types of cybersecurity issues, future trends and challenges in autonomous vehicles. Security must be thought as an important aspect during designing and implementation of the autonomous vehicles to prevent from numerous security threats and attacks. The book thus provides important information on the cybersecurity challenges faced by the autonomous vehicles and it seeks to address the mobility requirements of users, comfort, safety and security. 

This book aims to provide an outline of most aspects of cybersecurity in intelligent and autonomous vehicles. It is very helpful for automotive engineers, graduate students and technological administrators who want to know more about security technology as well as to readers with a security background and experience who want to know more about cybersecurity concerns in modern and future automotive applications and cybersecurity. In particular, this book helps people who need to make better decisions about automotive security and safety approaches. Moreover, it is beneficial to people who are involved in research and development in this exciting area. 


As seen from the table of contents, automotive security covers a wide variety of topics. In addition to being distributed throughvarious technological fields, automotive cybersecurity is a recent and rapidly moving field, such that the selection of topics in this book is regarded as tentative solutions rather than a final word on what exactly constitutes automotive security. All of the authors have worked for many years in the area of embedded security and for a few years in the field of different aspects of automotive safety and security, both from a research and industry point of view. 

Prof. Shiho Kim received his Ph.D. degree in Department of Electrical Engineering from KAIST, Korea. He has a long career in semiconductor research area especially working in LG Electronics, Sandisk and LG Semicon as a Research Engineer or Semiconductor Device Engineer from 1988 to 1996. From 1997, he began to perform research in universities, Wonkwang University and Chungbuk National University. And since 2011, he has been Professor of the School of Integrated Technology at Yonsei University. He was also a Chair of IEEE Solid-State Circuit Society Seoul Chapter and Chair of IEIE Vehicle Electronics Research Group. Dr. Rakesh Shrestha (M’ 19) received his B.E in Electronics and Communication Engineering from Tribhuwan University (TU), Nepal in 2006. He received his M.E in Information and Communication Engineering from Chosun University, in 2010 and PhD degree in Information and Communication Engineering from Yeungnam University in 2018 respectively. From Feb. 2010 toMay 2011, he worked for Honeywell Security system as a security Engineer. From Jun. 2010 to Sep. 2012, he worked as a Core Network Engineer at Huawei Technologies Co. Ltd, Nepal. From 2018 Feb to 2019 Feb, he worked as a Postdoctoral Researcher at Department of Information and Communication Engineering, Yeungnam University, Korea. He is currently working as a Postdoctoral Researcher in Yonsei Institute of Convergence Technology (YICT), Yonsei University. He was invited as a keynote speaker in the Third IEEE ICCCS conference. He has worked as a reviewer in several renowned journal and conferences. He is currently an IEEE member and his main research interests include wireless communications, Mobile ad-hoc networks, Vehicular ad-hoc network, blockchain, IoT, homomorphic encryption, deep learning, wireless security, etc.

1. Introduction to Automotive Cybersecurity

1.1 Overview

1.2 Introduction

1.2.1. Security and Its Impact

1.3. Cybersecurity in Automotive Technology

1.3.1 The Rising Threat

1.4. Vehicular Ransomware Attack

1.4.1. Vehicle Ransomware Attack Scheme

1.5. Overview of Topics

1.5.1 Intelligent and Autonomous Vehicle

1.5.2 Cybersecurity and Privacy in Intelligent Autonomous Vehicles

1.5.3 In-Vehicle communication and Cyber Security

1.5.4 AUTOSAR Embedded Security in Vehicles

1.5.5 Inter-vehicle Communication and Cyber Security

1.5.6 Internet of Vehicles, Vehicular Social Networks, and Security Issues

1.5.7 V2X Current Security Issues, Standards, Challenges, Use cases and Future Trends

 

2. Intelligent Autonomous Vehicles


2.1 Overview

2.2 History of Intelligent and Autonomous Vehicle

2.3 Classification of Autonomous vehicle driving levels

2.3.1 SAE and NHTS classification:

2.4 State-of-the-art Intelligent and Autonomous Vehicle Technologies

2.4.1 Autonomous Vehicle

2.4.1.1 In-vehicle Communication

2.4.1.2. In-Vehicle Networking Types

2.4.2 Connected Vehicle Technology

2.4.2.1Inter-vehicle communication

2.5 Battle for Adoption

2.6 Market demand of Automotive Cyber security

2.7 Summary




3. Security and Privacy in Intelligent Autonomous Vehicles

3.1 Overview

3.2 Cryptography Introduction

3.3 Cryptography Objective

3.3.1 Confidentiality

3.3.2 Data Integrity

3.3.3 Authentication

3.3.4 Non-Repudiation

3.4 Cryptographic Primitives

3.4.1 Symmetric Key or Secret Key encryption

3.4.2 Asymmetric Key or Public Key encryption

3.4.3 Digital Signatures

3.4.4 Homomorphic Encryption

3.5 Cyber Security in Intelligent and Autonomous Vehicles

3.5.1.    Cyber Security Framework

3.5.2.    Cybersecurity Layers by Design

3.5.3.    Threat Modelling Method (TMM)

3.5.4.    HARA and TARA Safety and Security Methods

3.5.5 Security & Privacy Threats in Vehicular Networks


3.5.6 Autonomous Vehicle Cyber Security


3.5.7Connected Vehicle Security


3.5.7.1Components of IAV


3.5.7.2Vehicular Ad-hoc Networks Vulnerabilities


3.5.7.3Privacy in VANET


3.5.8. Trust Management in VANET

3.5.6. Blockchain as a security in VANET

3.6. Summary




4. In-vehicle Communication and Cyber Security

4.1 Overview

4.2. In-Vehicle System

4.2.1 Vehicle Electrical and Electronic System

4.2.1.1Body electronics

4.2.1.2 Chassis Electronics

4.3. In-Vehicle Communication

4.3.1 In-vehicle Sensing Technologies

4.3.2 In-Vehicle Network (IVN) Systems

4.2.1.3Comfort Electronics

4.2.1.4Electronic Control Units (ECUs):

4.2.1.5Infotainment Electronics:

4.2.1.6Sensor Technology

4.2.1.7Advanced Driver Assistance System (ADAS)

4.3.In-vehicle communication

4.3.1In-Vehicle Sensing Technologies

4.3.1.1.Sensor Technologies

4.3.1.2Vision Technologies

4.3.1.3Positioning Technologies

4.3.2 In-Vehicle Network (IVN) Systems

4.3.2.1Controller Area Network (CAN)

4.3.2.2FlexRay

4.3.2.3Local Interconnect Network (LIN)

4.3.2.4Automotive Ethernet (AE)

4.3.2.5Media Oriented Serial Transport (MOST)

4.3.2.6Single Edge Nibble Transmission SENT (SENT)

4.3.2.7Other BUS protocols

4.4 In-Vehicle Network Architecture and Topology

4.5 Functional Safety and Cybersecurity

4.6 In-Vehicle Cybersecurity Issues and Challenges

4.6.1 Challenges of IVN architecture

4.6.1.1 Bandwidth

4.6.1.2 Latency

4.6.1.3 Reliability

4.6.2 In-Vehicle Onboard Ports, Threats and Countermeasures

4.6.2.1OBD-II ports

4.6.2.2USB port:

4.6.2.3Electric Vehicle (EV) Charging port

4.6.2.4Countermeasures to port threats

4.7 Cyber Security in In-Vehicle Network

4.7.1 In-Vehicle Network (IVN) Security Threats

4.7.1.1CAN Security

4.7.1.2FlexRay Security Threats

4.7.1.3LIN Security Threats

4.7.1.4AE Security

4.7.1.5MOST Security Threats

4.7.2 Cyber Security protection Layers

4.7.3 Cyber security for ECU

4.7.3.1 On communication

4.7.3.2 On Exposed Functions

4.7.3.3 Non-Invasive

4.7.3.4 Semi-Invasive

4.7.3.5 Invasive

4.8 Summary




5 AUTOSAR Embedded Security in Vehicles

5.1 Overview

5.2 Introduction

5.2.1 Background

5.2.1.1TARA

5.2.1.2STRIDE

5.2.1.3AUTOSAR

5.3 Threat models for the automotive domain

5.3.1 Adaptation of TARA


5.3.2 Adaptation of STRIDE

5.4 Applying the Adapted Threat Models to the Automotive Domain

5.4.1 TARA

5.4.2 STRIDE

5.5 Results

5.5.1 TARA

5.5.2 STRIDE

5.5.3 Related Work

5.5.4 Discussion and Future Work

5.6 Conclusion




6. Connected Vehicle Technology and Cyber Security

6.1 Overview

6.2 Connected Vehicles

6.2.1 VANET Technology Overview

6.2.2 Types of communications Technology in Connected Vehicle

6.3 State-of-the-art Technologies in VANET

6.3.1 DSRC based V2X

6.3.2 Cellular based V2X

6.3.2.1 Advancement in Cellular V2X

6.3.3 Hybrid V2X Technology


6.3.4 C-V2X applications and requirements

6.4 Role of Edge computing and SDN in V2X communication

6.5 Connected Vehicle Cyber Security

6.5.1. WAVE Communication Cybersecurity

6.5.2. Security and Privacy in V2X communication

6.6. Trust management in V2X communication

6.7. Homomorphic Encryption in V2X communication

6.8. Blockchain in V2X communication

6.9. Safety Standards for IAV

6.10. Summary




7. Internet of Vehicles, Vehicular Social Networks, and Cybersecurity

7.1 Overview

7.2 IoT in VANET (IoV)

7.2.1 IoV Network Model

7.2.1.1Cloud network

7.2.1.2Communication Network

7.2.1.3Vehicles

7.2.2 IoV Layered Architecture

7.2.3 Security in IoV

7.2.4 IoV security requirements and attacks

7.2.5 Challenges in IoV

7.2.6 IoV Applications

7.3 Machine Learning in Vehicular Networks

7.3.1 Types of Machine Learning Techniques

7.3.2 Machine Learning as a Cybersecurity Solutions in Vehicular Networks

7.3.3 Application of Machine Learning in Vehicular Networks

7.4 Security based on ML in Vehicular Networks

7.4.3ML to detect Misbehaviour Detection

7.4.4ML to detect DoS and DDoS Attacks

7.4.5ML to detect Intrusion attack

7.4.6ML to detect Smart Jamming Attack

7.5Vehicular Social Network

7.5.1 Applications of VSN

7.5.2 Security Issues

7.5.3 Privacy Issues

7.6 Summary




8. V2X Standards, Regulations, Security Issues, Use Cases and Future Trends

8.1 Overview

8.2. Standards, regulations and legal issues

8.2.1 International Cybersecurity Standardization in Automotive industry

8.2.2 Standardization for V2X Communication and Frequency Allocation

8.2.2.1 International V2X Standardization


8.2.3 ITS Spectrum Recommendation and Regulation Consideration


8.2.4 Cyber Security Standardization in V2X

8.3 Competition over V2X technology Adoption

8.3.1 Challenges for DSRC V2X and Cellular V2X

8.4 V2X Use Cases

8.4.1 Smart mobility

8.4.1.1 Smart Mobility and Security Issues

8.4.2 V2X Testbed

8.5 Current Trends and Future of Intelligent and Autonomous Vehicles

8.5.1 Trends in Intelligent and Autonomous Vehicles

8.5.2 Autonomous Electric Vehicle and Challenges

8.5.3 Cyber-attacks in Future Autonomous Vehicles

8.5.2.1 Protection of Future Autonomous Vehicle from Cyber attacks

8.5.2.2. Cybersecurity of Future Vehicles and Machine Learning Techniques

8.5.4 Challenges in Future Autonomous Vehicles

8.5.5 Intelligent Autonomous Vehicle Improves Environment

8.6 Summary

Erscheinungsdatum
Zusatzinfo 76 Illustrations, color; 2 Illustrations, black and white; XVII, 216 p. 78 illus., 76 illus. in color.
Verlagsort Singapore
Sprache englisch
Maße 155 x 235 mm
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Technik Bauwesen
Technik Fahrzeugbau / Schiffbau
Technik Maschinenbau
ISBN-10 981-15-8052-9 / 9811580529
ISBN-13 978-981-15-8052-9 / 9789811580529
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …

von Norbert Pohlmann

Buch | Softcover (2022)
Springer Vieweg (Verlag)
CHF 48,95
Management der Informationssicherheit und Vorbereitung auf die …

von Michael Brenner; Nils gentschen Felde; Wolfgang Hommel

Buch (2024)
Carl Hanser (Verlag)
CHF 97,95

von Chaos Computer Club

Buch | Softcover (2024)
KATAPULT Verlag
CHF 39,20