Connected cars — Threats, vulnerabilities and their impact

The growing demand for interoperability between system components within a connected car has led to new security challenges in automotive development. The existing components, based on established technology, are often being combined to form such a connected car. For such established technologies, individual, often sector specific threat and vulnerability catalogs exist. The aim of this paper is to identify blocks of established technologies in a connected car and to consolidate the corresponding threat and vulnerability catalogs relevant for the individual constituent components. These findings are used to estimate the impact on specific system components and subsystems to identify the most crucial components and threats.

[1]  Yves Deswarte,et al.  Survey on security threats and protection mechanisms in embedded automotive networks , 2013, 2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W).

[2]  Bernd Grobauer,et al.  Understanding Cloud Computing Vulnerabilities , 2011, IEEE Security & Privacy.

[3]  Jim Harkin,et al.  Case Study on the Bluetooth Vulnerabilities in Mobile Devices , 2006 .

[4]  Felix C. Freiling,et al.  Vulnerabilities and Attacks in Wireless Sensor Networks , 2008 .

[5]  Péter Gáspár,et al.  Security issues and vulnerabilities in connected car systems , 2015, 2015 International Conference on Models and Technologies for Intelligent Transportation Systems (MT-ITS).

[6]  G. Padmavathi,et al.  Mobile Device Security: A Survey on Mobile Device Threats, Vulnerabilities and their Defensive Mechanism , 2012 .

[7]  Panagiotis Papadimitratos,et al.  SECURING VEHICULAR COMMUNICATIONS , 2006, IEEE Wireless Communications.

[8]  Dongho Won,et al.  A Practical Analysis of Smartphone Security , 2011, HCI.

[9]  Nuno Pereira,et al.  Security vulnerabilities and risks in industrial usage of wireless communication , 2014, Proceedings of the 2014 IEEE Emerging Technology and Factory Automation (ETFA).

[10]  Syed Masud Mahmud,et al.  Security Needs for the Future Intelligent Vehicles , 2006 .

[11]  Frank Leymann,et al.  The Connected Car in the Cloud: A Platform for Prototyping Telematics Services , 2015, IEEE Software.

[12]  Lih Wern Wong Potential Bluetooth Vulnerabilities in Smartphones , 2005, AISM.

[13]  Thomas Peyrin,et al.  Security challenges in automotive hardware/software architecture design , 2013, 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[14]  Srivaths Ravi,et al.  Security as a new dimension in embedded system design , 2004, Proceedings. 41st Design Automation Conference, 2004..

[15]  Marcus Scholler,et al.  Critical services in the cloud: Understanding security and resilience risks , 2014, 2014 6th International Workshop on Reliable Networks Design and Modeling (RNDM).