Design and Experimental Assessment of Real-Time Anomaly Detection Techniques for Automotive Cybersecurity

P Dini, S Saponara - Sensors, 2023 - mdpi.com
In recent decades, an exponential surge in technological advancements has significantly
transformed various aspects of daily life. The proliferation of indispensable objects such as …

Formal Security Analysis of Vehicle Diagnostic Protocols

T Lauser, C Krauß - Proceedings of the 18th International Conference on …, 2023 - dl.acm.org
Diagnostic protocols for vehicles are important for maintenance, updates, etc. However, if
they are not secure, an attacker can use them as an entry point to the vehicle or even directly …

A Two-Layer Dynamic ECU Group Management Scheme for In-Vehicle CAN Bus

Y Shen, J Cui, H Zhong, J Zhang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
To enable the vehicle control system to provide better service, an increasing number of
network nodes are being introduced into the vehicle; this also dramatically expands the …

Centralized architecture for ECU security management in connected and autonomous vehicles

H Khemissa, P Urien - 2022 13th International Conference on …, 2022 - ieeexplore.ieee.org
The strong development of automotive industry is changing traditional perceptions towards a
vision of connected and autonomous vehicles (CAVs), such as each vehicle consists of a …

One-Time Passwords: A Literary Review of Different Protocols and Their Applications

LE Almeida, BA Fernández, D Zambrano… - … on Advanced Research …, 2023 - Springer
Currently, user authentication only based on passwords can be inadequate due to different
types of vulnerabilities and attacks. To solve this problem, two-factor authentication is …

Cybersecurity Systems Modeling: An Automotive System Case Study

ML McKelvin - Handbook of Model-Based Systems Engineering, 2023 - Springer
Modern automotive systems are increasingly complex and interconnected, providing
enhanced services and functionalities, such as improving driver experience and safety …

Wavelet Transform Based PID Sequence Analysis for IDS on CAN Protocol

MR Islam, I Oh, M Batzorig, M Kim, K Yim - International Conference on …, 2022 - Springer
Due to the increasing complexity of the group of software and hardware components used in
automobiles, current threats continue to hit the onboard network day after day. These …

A Systematic Review on Security Mechanism of Electric Vehicles

V Mishra, S Kadam - … Conference on Intelligent Systems Design and …, 2022 - Springer
A classic protocol for in-vehicle network communication is the Controller Area Network
(CAN) bus for electric vehicles. The key characteristics of CAN bus are its simplicity …

[PDF][PDF] Cybersecurity for future interconnected and smart vehicles

F Oberti - 2024 - tesidottorato.depositolegale.it
The continual technological advancements mark the modern world, and the automotive
industry is no exception. As vehicles rely more heavily on technology and connectivity …

Towards a centralized security architecture for SOME/IP automotive services

H Khemissa, P Urien - 2023 IEEE 20th Consumer …, 2023 - ieeexplore.ieee.org
Connected and autonomous vehicles (CAVs) consist of a number of networked computer
components, called Electronic Control Units (ECUs). Scalable service-Oriented MiddlewarE …