DocumentCode :
150133
Title :
Revisiting attacker model for smart vehicles
Author :
Petit, Jonathan ; Feiri, Michael ; Kargl, Frank
Author_Institution :
Cybersecurity & Safety Group, Univ. of Twente, Enschede, Netherlands
fYear :
2014
fDate :
14-15 Sept. 2014
Firstpage :
1
Lastpage :
5
Abstract :
Because of the potential impact on user´s life in cooperative automated safety applications, the security of Vehicle-to-X communication (V2X) is mandatory. However, the current attacker model used in literature is often too network-oriented, and it is unclear what realistic attacks could be. In this paper, we use the V2X data lifecycle to derive the attack surfaces. From this, we lay the foundations of a revisited attacker model, which details realistic attacks and identify appropriate countermeasures. We demonstrate that while the security of data processing, data at rest, and data in-transit is well-advanced, the security of meta-data and data acquisition requires extra attention by the research community.
Keywords :
intelligent transportation systems; meta data; mobile radio; security of data; telecommunication security; V2X data lifecycle; attacker model; cooperative automated safety applications; data acquisition; metadata security; smart vehicles; vehicle-to-X communication; Cryptography; Hardware; Sensor phenomena and characterization; Telematics; Vehicles; Vehicularnetworks; attacker model; privacy; security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Wireless Vehicular Communications (WiVeC), 2014 IEEE 6th International Symposium on
Conference_Location :
Vancouver, BC
Type :
conf
DOI :
10.1109/WIVEC.2014.6953258
Filename :
6953258
Link To Document :
بازگشت