Revisiting attacker model for smart vehicles

  • Jonathan Petit
  • , Michael Feiri
  • , Frank Kargl

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    22 Citations (Scopus)
    19 Downloads (Pure)

    Abstract

    Because of the potential impact on user's life in cooperative automated safety applications, the security of Vehicle-to-X communication (V2X) is mandatory. However, the current attacker model used in literature is often too network-oriented, and it is unclear what realistic attacks could be. In this paper, we use the V2X data lifecycle to derive the attack surfaces. From this, we lay the foundations of a revisited attacker model, which details realistic attacks and identify appropriate countermeasures. We demonstrate that while the security of data processing, data at rest, and data in-transit is well-advanced, the security of meta-data and data acquisition requires extra attention by the research community.
    Original languageEnglish
    Title of host publicationIEEE 6th International Symposium on Wireless Vehicular Communications (WiVeC 2014)
    Place of PublicationPiscataway, NJ
    PublisherIEEE
    Pages1-5
    Number of pages5
    ISBN (Print)978-1-4799-4452-1
    DOIs
    Publication statusPublished - Sept 2014
    EventIEEE 6th International Symposium on Wireless Vehicular Communications, WiVeC 2014 - Vancouver, Canada
    Duration: 14 Sept 201415 Sept 2014
    Conference number: 6

    Conference

    ConferenceIEEE 6th International Symposium on Wireless Vehicular Communications, WiVeC 2014
    Abbreviated titleWiVeC
    Country/TerritoryCanada
    CityVancouver
    Period14/09/1415/09/14

    Keywords

    • SCS-Cybersecurity
    • Cooperative automated safety applications
    • Metadata
    • Attacker model
    • Mobile radio
    • Metadata security
    • Smart vehicles
    • Security of data
    • EC Grant Agreement nr.: FP7/269994
    • Security
    • V2X data lifecycle
    • Sensor phenomena and characterization
    • Vehicle-to-X communication
    • Vehicles
    • Vehicular Networks
    • Telematics
    • Privacy
    • Telecommunication security
    • Cryptography
    • Data acquisition
    • Hardware
    • Intelligent transportation systems

    Fingerprint

    Dive into the research topics of 'Revisiting attacker model for smart vehicles'. Together they form a unique fingerprint.

    Cite this