Abstract
This paper focuses on creating a solution to counter cyber threats to the local network of modern vehicles at the level of architecture, topology and communication process. The authors pay special attention to the communication process of electronic control units within the local network. A comparative analysis of different types of cyber-attacks on modern motor vehicles has been carried out, and threat and intruder models have been formulated. By means of mathematical modeling of the topology of the local network, a method for its clustering has been implemented. Methods and mechanisms for message integrity control and node authentication have been developed. The analysis of compliance of the proposed solution to the requirements of the real-time system based on the measurement of the worst-case time delay between the end network nodes has been carried out.
Similar content being viewed by others
References
Koscher, K., et al.: Experimental Security Analysis of a Modern Automobile. The Ethics of Information Technologies, pp. 119–134. Routledge, London (2020)
Bozdal, M., et al.: Evaluation of can bus security challenges. Sensors 20(8), 2364 (2020)
Karahasanovic, A., Kleberger, P., Almgren, M. Adapting threat modeling methods for the automotive industry. In: Proceedings of the 15th ESCAR Conference, pp. 1–10 (2017)
Huq, N., Gibson, C., Vossele, R.: Driving security into connected cars: threat model and recommendations. https://documents.trendmicro.com/assets/white_papers/wp-driving-security-into-connected-cars.pdf
Nie, S., Liu, L., Du, Y.: Free-fall: hacking tesla from wireless to can bus. Brief. Black Hat USA 25, 1–16 (2017)
Checkoway, S. et al.: Comprehensive experimental analyses of automotive attack surfaces //USENIX Security Symposium. - 2011. - Vol. 4. - P. 447-462
Tencent Keen Security Lab. Experimental security assessment of BMW cars: a summary report. https://keenlab.tencent.com/en/whitepapers/Experimental_Security _Assessment_of_BMW_Cars_by_KeenLab.pdf
Miller, C., Valasek C.: Remote exploitation of an unaltered passenger vehicle. http://illmatics.com/Remote%20Car%20Hacking.pdf
Barkley, J.: Role based access control on the World Wide Web. https://csrc.nist.gov/CSRC/media/Projects/Role-Based-Access-Control/documents/web_servers/rbac-web.pdf
Hackel, T., et al.: Software-defined networks supporting time-sensitive in-vehicular communication. In: 2019 IEEE 89th Vehicular Technology Conference (VTC2019-Spring), pp. 1–5. IEEE (2019)
SimTime Class Reference. https://doc.omnetpp.org/omnetpp4/api /classSimTime.html_details
Sheng, Z., et al.: Delay analysis and time-critical protocol design for in-vehicle power line communication systems. IEEE Trans. Veh. Technol. 67(1), 3–16 (2017)
Acknowledgements
The research is funded by the Ministry of Science and Higher Education of the Russian Federation under the strategic academic leadership program “Priority 2030” (Agreement 075-15-2021-1333 dated 30 November 2021). Project results are achieved using the resources of supercomputer center of Peter the Great St.Petersburg Polytechnic University - SCC “Polytechnichesky” (www.spbstu.ru). 1
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Pavlenko, E.Y., Vasileva , K.V., Lavrova, D.S. et al. Counteraction the cybersecurity threats of the in-vehicle local network. J Comput Virol Hack Tech 19, 399–408 (2023). https://doi.org/10.1007/s11416-022-00451-0
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11416-022-00451-0