Revisiting attacker model for smart vehicles

Jonathan Petit, Michael Feiri, Frank Kargl

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    21 Citations (Scopus)
    19 Downloads (Pure)

    Abstract

    Because of the potential impact on user's life in cooperative automated safety applications, the security of Vehicle-to-X communication (V2X) is mandatory. However, the current attacker model used in literature is often too network-oriented, and it is unclear what realistic attacks could be. In this paper, we use the V2X data lifecycle to derive the attack surfaces. From this, we lay the foundations of a revisited attacker model, which details realistic attacks and identify appropriate countermeasures. We demonstrate that while the security of data processing, data at rest, and data in-transit is well-advanced, the security of meta-data and data acquisition requires extra attention by the research community.
    Original languageUndefined
    Title of host publicationIEEE 6th International Symposium on Wireless Vehicular Communications (WiVeC 2014)
    Place of PublicationUSA
    PublisherIEEE
    Pages1-5
    Number of pages5
    ISBN (Print)978-1-4799-4452-1
    DOIs
    Publication statusPublished - Sept 2014
    EventIEEE 6th International Symposium on Wireless Vehicular Communications, WiVeC 2014 - Vancouver, Canada
    Duration: 14 Sept 201415 Sept 2014

    Publication series

    Name
    PublisherIEEE

    Conference

    ConferenceIEEE 6th International Symposium on Wireless Vehicular Communications, WiVeC 2014
    Period14/09/1415/09/14
    Other14-15 September 2014

    Keywords

    • SCS-Cybersecurity
    • METIS-309785
    • cooperative automated safety applications
    • meta data
    • attacker model
    • mobile radio
    • metadata security
    • smart vehicles
    • EWI-25517
    • security of data
    • EC Grant Agreement nr.: FP7/269994
    • Security
    • V2X data lifecycle
    • Sensor phenomena and characterization
    • Vehicle-to-X communication
    • Vehicles
    • Vehicular Networks
    • Telematics
    • Privacy
    • telecommunication security
    • Cryptography
    • Data acquisition
    • Hardware
    • IR-93397
    • intelligent transportation systems

    Cite this