On authentication in a connected vehicle: Secure integration of mobile devices with vehicular networks

K Han, SD Potluri, KG Shin - Proceedings of the ACM/IEEE 4th …, 2013 - dl.acm.org
Recent advances in in-vehicle technologies have paved way to a new era of connectivity.
Vehicle manufacturers have already deployed various technologies for driving assistance …

Cyberattacks and countermeasures for in-vehicle networks

E Aliwa, O Rana, C Perera, P Burnap - ACM computing surveys (CSUR), 2021 - dl.acm.org
As connectivity between and within vehicles increases, so does concern about safety and
security. Various automotive serial protocols are used inside vehicles such as Controller …

Short paper: MVSec: secure and easy-to-use pairing of mobile devices with vehicles

J Han, YH Lin, A Perrig, F Bai - … of the 2014 ACM conference on Security …, 2014 - dl.acm.org
With the increasing popularity of mobile devices, drivers and passengers will naturally want
to connect their devices to their cars. Malicious entities can and likely will try to attack such …

Connected vehicles' security from the perspective of the in-vehicle network

X Li, Y Yu, G Sun, K Chen - IEEE Network, 2018 - ieeexplore.ieee.org
Connected vehicles are generally equipped with many (dozens of, or even hundreds of)
electronic and intelligent devices so that drivers can gain a more comfortable driving …

A survey of security and privacy in connected vehicles

LB Othmane, H Weffers, MM Mohamad… - Wireless sensor and …, 2015 - Springer
Electronic control units (ECUs) of a vehicle control the behavior of its devices—eg, break
and engine. They communicate through the in-vehicle network. Vehicles communicate with …

Securing vehicles against cyber attacks

UE Larson, DK Nilsson - Proceedings of the 4th annual workshop on …, 2008 - dl.acm.org
The automobile industry has grown to become an integral part of our everyday life. As
vehicles evolve, the primarily mechanical solutions for vehicle control are gradually replaced …

Security in automotive networks: Lightweight authentication and authorization

P Mundhenk, A Paverd, A Mrowca… - ACM Transactions on …, 2017 - dl.acm.org
With the increasing amount of interconnections between vehicles, the attack surface of
internal vehicle networks is rising steeply. Although these networks are shielded against …

[PDF][PDF] Securing vehicular on-board it systems: The evita project

O Henniger, A Ruddle, H Seudié, B Weyl… - VDI/VW Automotive …, 2009 - researchgate.net
Secure and trustworthy automotive on-board IT systems are essential for the success of
intelligent transport systems based on vehicle-to-vehicle and vehicle-to-infrastructure …

Towards a distributed secure in-vehicle communication architecture for modern vehicles

C Patsakis, K Dellios, M Bouroche - Computers & security, 2014 - Elsevier
Modern automotive vehicles are becoming a collection of interconnected embedded
subsystems, where the mechanical parts are controlled by electronic ones and the vehicle is …

Vehicular networks–security, vulnerabilities and countermeasures

K Amirtahmasebi, SR Jalalinia - 2010 - odr.chalmers.se
Vehicular networks are becoming more popular every day. There are several applications of
vehicular networks which are discussed by manufacturers and also academics which will be …