Skip to main content
Log in

Counteraction the cybersecurity threats of the in-vehicle local network

  • Original Paper
  • Published:
Journal of Computer Virology and Hacking Techniques Aims and scope Submit manuscript

Abstract

This paper focuses on creating a solution to counter cyber threats to the local network of modern vehicles at the level of architecture, topology and communication process. The authors pay special attention to the communication process of electronic control units within the local network. A comparative analysis of different types of cyber-attacks on modern motor vehicles has been carried out, and threat and intruder models have been formulated. By means of mathematical modeling of the topology of the local network, a method for its clustering has been implemented. Methods and mechanisms for message integrity control and node authentication have been developed. The analysis of compliance of the proposed solution to the requirements of the real-time system based on the measurement of the worst-case time delay between the end network nodes has been carried out.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Koscher, K., et al.: Experimental Security Analysis of a Modern Automobile. The Ethics of Information Technologies, pp. 119–134. Routledge, London (2020)

    Book  Google Scholar 

  2. Bozdal, M., et al.: Evaluation of can bus security challenges. Sensors 20(8), 2364 (2020)

    Article  Google Scholar 

  3. Karahasanovic, A., Kleberger, P., Almgren, M. Adapting threat modeling methods for the automotive industry. In: Proceedings of the 15th ESCAR Conference, pp. 1–10 (2017)

  4. Huq, N., Gibson, C., Vossele, R.: Driving security into connected cars: threat model and recommendations. https://documents.trendmicro.com/assets/white_papers/wp-driving-security-into-connected-cars.pdf

  5. Nie, S., Liu, L., Du, Y.: Free-fall: hacking tesla from wireless to can bus. Brief. Black Hat USA 25, 1–16 (2017)

    Google Scholar 

  6. Checkoway, S. et al.: Comprehensive experimental analyses of automotive attack surfaces //USENIX Security Symposium. - 2011. - Vol. 4. - P. 447-462

  7. Tencent Keen Security Lab. Experimental security assessment of BMW cars: a summary report. https://keenlab.tencent.com/en/whitepapers/Experimental_Security _Assessment_of_BMW_Cars_by_KeenLab.pdf

  8. Miller, C., Valasek C.: Remote exploitation of an unaltered passenger vehicle. http://illmatics.com/Remote%20Car%20Hacking.pdf

  9. Barkley, J.: Role based access control on the World Wide Web. https://csrc.nist.gov/CSRC/media/Projects/Role-Based-Access-Control/documents/web_servers/rbac-web.pdf

  10. Hackel, T., et al.: Software-defined networks supporting time-sensitive in-vehicular communication. In: 2019 IEEE 89th Vehicular Technology Conference (VTC2019-Spring), pp. 1–5. IEEE (2019)

  11. SimTime Class Reference. https://doc.omnetpp.org/omnetpp4/api /classSimTime.html_details

  12. Sheng, Z., et al.: Delay analysis and time-critical protocol design for in-vehicle power line communication systems. IEEE Trans. Veh. Technol. 67(1), 3–16 (2017)

    Article  Google Scholar 

Download references

Acknowledgements

The research is funded by the Ministry of Science and Higher Education of the Russian Federation under the strategic academic leadership program “Priority 2030” (Agreement 075-15-2021-1333 dated 30 November 2021). Project results are achieved using the resources of supercomputer center of Peter the Great St.Petersburg Polytechnic University - SCC “Polytechnichesky” (www.spbstu.ru). 1

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to E. Y. Pavlenko.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Pavlenko, E.Y., Vasileva , K.V., Lavrova, D.S. et al. Counteraction the cybersecurity threats of the in-vehicle local network. J Comput Virol Hack Tech 19, 399–408 (2023). https://doi.org/10.1007/s11416-022-00451-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11416-022-00451-0

Keywords

Navigation