A new methodology for analyzing vehicle network topologies for critical hacking

This study aims to provide a new approach for describing and measuring the vulnerability of in-vehicle networks regarding cyberattacks. Cyberattacks targeting in-vehicle networks can result in a reasonable threat considering passenger safety. Unlike previous literature, the methodology focuses on a comparatively large sample of vehicle networks (114 objects) by proposing a new framework of statistical techniques for measuring, classifying, and modelling in-vehicle networks concerning the changed vulnerability, instead of dealing with each vehicle network individually. To facilitate understanding of the vulnerability patterns of in-vehicle networks, the dataset has been evaluated through three analytic stages: vulnerability identification, classification, and modeling. The result has helped in ranking vehicles based on their network vulnerability level. The result of the modeling has shown that every additional remote endpoint installation causes a relevant weakening in security. Higher cost vehicles have also appeared to be more vulnerable to cyberattacks, while the increase in the number of segmented network domains has had a positive effect on network security.

[1]  Alan Burns,et al.  Broadening real-time systems research , 1996, CSUR.

[2]  Alastair R. Ruddle,et al.  Threat Analysis and Risk Assessment in Automotive Cyber Security , 2013 .

[3]  A. Peterson,et al.  Effects of sample size on the performance of species distribution models , 2008 .

[4]  Christian Hennig,et al.  Comparing latent class and dissimilarity based clustering for mixed type variables with application to social stratification , 2010 .

[5]  Tiago M. Fernández-Caramés,et al.  A Review on Blockchain Technologies for an Advanced and Cyber-Resilient Automotive Industry , 2019, IEEE Access.

[6]  David J. Ketchen,et al.  THE APPLICATION OF CLUSTER ANALYSIS IN STRATEGIC MANAGEMENT RESEARCH: AN ANALYSIS AND CRITIQUE , 1996 .

[7]  Osama Abu Abbas,et al.  Comparisons Between Data Clustering Algorithms , 2008, Int. Arab J. Inf. Technol..

[8]  Ajay Kaul,et al.  A survey on Intrusion Detection Systems and Honeypot based proactive security mechanisms in VANETs and VANET Cloud , 2018, Veh. Commun..

[9]  B. Everitt,et al.  Cluster Analysis: Everitt/Cluster Analysis , 2011 .

[10]  Heejo Lee,et al.  Attack Resiliency of Network Topologies , 2004, PDCAT.

[11]  G. Manimaran,et al.  Cybersecurity for Critical Infrastructures: Attack and Defense Modeling , 2010, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[12]  Rajeshwari Hegde,et al.  The Impact of Network Topologies on the Performance of the In-Vehicle Network , 2013 .

[13]  Lucia Lo Bello,et al.  Recent Advances and Trends in On-Board Embedded and Networked Automotive Systems , 2019, IEEE Transactions on Industrial Informatics.

[14]  L. Hubert,et al.  Measuring the Power of Hierarchical Cluster Analysis , 1975 .

[15]  Máté Zöldy,et al.  Influence of External Environmental Factors on Range Estimation of Autonomous Hybrid Vehicles , 2019 .

[16]  Donal Heffernan,et al.  Expanding Automotive Electronic Systems , 2002, Computer.

[17]  István Varga,et al.  Development of a Test Track for Driverless Cars: Vehicle Design, Track Configuration, and Liability Considerations , 2017 .

[18]  Christoph Schmittner,et al.  The Need for Safety and Cyber-Security Co-engineering and Standardization for Highly Automated Automotive Vehicles , 2016 .

[19]  Martin Boehner Security for Connected Vehicles throughout the Entire Life Cycle , 2019 .

[20]  Alastair R. Ruddle,et al.  Towards a systematic security evaluation of the automotive Bluetooth interface , 2017, Veh. Commun..

[21]  Markus Plöger,et al.  Steuergeräte-Verbundtests mittels Hardware-in-the-Loop-Simulation , 2003 .

[22]  V. K. Bhuvaneswari,et al.  A Comparative Study of Various Clustering Algorithms in Data Mining , 2014 .

[23]  Experimental Design and Data Analysis for Biologists: Generalized linear models and logistic regression , 2002 .