Threat Analysis and Risk Assessment for Connected Vehicles: A Survey

نویسندگان

چکیده

With the rapid development of connected vehicles, people can get a better driving experience. However, interconnection with external network may bring growing accidents caused by cybersecurity vulnerabilities. As result, automakers are paying more attention to and spending cost on developing defense mechanisms. Threat analysis risk assessment (TARA) is an efficient method ensure effect greatly save costs in early stage vehicle development. It analyzes threat systems determines hierarchical corresponding mitigations according potential system. This paper gives overview automotive field. First, novel classification different TARA methods has been proposed. The existing have analyzed compared. Then, we found some commonly used tools applied compared their performance. After that, concept named attack-defense mapping proposed figure out how map already threats vulnerabilities system appropriate mitigations. At last, future directions domain discussed.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Connected Vehicles: Surveillance Threat and Mitigation

Intelligent Transportation Systems (ITSs) are an upcoming technology that allow vehicles and road-side infrastructure to communicate to increase traffic efficiency and safety. To enable cooperative awareness, vehicles continually broadcast messages containing their location. These messages can be received by anyone, jeopardizing location privacy. A misconception is that such attacks are only po...

متن کامل

A Survey of Security and Privacy in Connected Vehicles

Electronic Control Units (ECUs) of a vehicle control the behavior of its devices–e.g., break and engine. They communicate through the in-vehicle network. Vehicles communicate with other vehicles and Road Side Units (RSUs) through Vehicular Ad-hoc Networks (VANets), with personal devices through Wireless Personal Area Networks (WPANs), and with service center systems through cellular networks. A...

متن کامل

diagnostic and developmental potentials of dynamic assessment for writing skill

این پایان نامه بدنبال بررسی کاربرد ارزیابی مستمر در یک محیط یادگیری زبان دوم از طریق طرح چهار سوال تحقیق زیر بود: (1) درک توانایی های فراگیران زمانیکه که از طریق برآورد عملکرد مستقل آنها امکان پذیر نباشد اما در طول جلسات ارزیابی مستمر مشخص شوند; (2) امکان تقویت توانایی های فراگیران از طریق ارزیابی مستمر; (3) سودمندی ارزیابی مستمر در هدایت آموزش فردی به سمتی که به منطقه ی تقریبی رشد افراد حساس ا...

15 صفحه اول

A survey on motion prediction and risk assessment for intelligent vehicles

ion: 1 Physics-based motion models are the simplest models, they consider that the motion of vehicles only depends on the laws of physics. They are described in Section 2. 2 Maneuver-based motion models are more advanced as they consider that the future motion of a vehicle also depends on the maneuver that the driver intends to perform. These models are presented in Section 3. 3 Interaction-awa...

متن کامل

Threat-Based Risk Assessment for Enterprise Networks

Protecting enterprise networks requires continuous risk assessment that automatically identifies and prioritizes cybersecurity risks, enables efficient allocation of cybersecurity resources, and enhances protection against modern cyberthreats. Lincoln Laboratory developed a foundational network security maturity model to guide development of such risk assessments and has developed practical ris...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Security and Communication Networks

سال: 2021

ISSN: ['1939-0122', '1939-0114']

DOI: https://doi.org/10.1155/2021/1263820