Revisiting attacker model for smart vehicles

Jonathan Petit, Michael Feiri, Frank Kargl

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    19 Citations (Scopus)
    16 Downloads (Pure)


    Because of the potential impact on user's life in cooperative automated safety applications, the security of Vehicle-to-X communication (V2X) is mandatory. However, the current attacker model used in literature is often too network-oriented, and it is unclear what realistic attacks could be. In this paper, we use the V2X data lifecycle to derive the attack surfaces. From this, we lay the foundations of a revisited attacker model, which details realistic attacks and identify appropriate countermeasures. We demonstrate that while the security of data processing, data at rest, and data in-transit is well-advanced, the security of meta-data and data acquisition requires extra attention by the research community.
    Original languageUndefined
    Title of host publicationIEEE 6th International Symposium on Wireless Vehicular Communications (WiVeC 2014)
    Place of PublicationUSA
    Number of pages5
    ISBN (Print)978-1-4799-4452-1
    Publication statusPublished - Sept 2014
    EventIEEE 6th International Symposium on Wireless Vehicular Communications, WiVeC 2014 - Vancouver, Canada
    Duration: 14 Sept 201415 Sept 2014

    Publication series



    ConferenceIEEE 6th International Symposium on Wireless Vehicular Communications, WiVeC 2014
    Other14-15 September 2014


    • SCS-Cybersecurity
    • METIS-309785
    • cooperative automated safety applications
    • meta data
    • attacker model
    • mobile radio
    • metadata security
    • smart vehicles
    • EWI-25517
    • security of data
    • EC Grant Agreement nr.: FP7/269994
    • Security
    • V2X data lifecycle
    • Sensor phenomena and characterization
    • Vehicle-to-X communication
    • Vehicles
    • Vehicular Networks
    • Telematics
    • Privacy
    • telecommunication security
    • Cryptography
    • Data acquisition
    • Hardware
    • IR-93397
    • intelligent transportation systems

    Cite this