Skip to main navigation Skip to search Skip to main content

A Security Evaluation Framework for Intelligent Connected Vehicles Based on Attack Chains

  • Qi Li
  • , Jinxin Zuo
  • , Ruohan Cao
  • , Yibo Zhang
  • , Jianrui Chen
  • , Qiang Liu
  • , Jingjing Wang*
  • *Corresponding author for this work
  • Beijing University of Technology
  • Beijing University of Posts and Telecommunications
  • Beijing Information Science & Technology University
  • Beihang University
  • Peng Cheng Laboratory
  • Shandong University of Science and Technology

Research output: Contribution to journalArticlepeer-review

Abstract

With the rapid development of intelligent connected vehicles (ICVs), their intelligent, remote, and high-speed mobility characteristics have led to an expansion of their attack surface, and thus an increase in security requirements. Consequently, security research for ICVs has become a current research focus. However, existing security risk monitoring measures lack linkage with attack behavior, and security defense strategies cannot fully and promptly respond to security risk levels and system vulnerabilities. Therefore, this paper proposes a security evaluation framework for ICVs based on attack chains. The framework focuses on the mechanism and steps of attack generation, evaluates the current risk level and degree of harm in a targeted manner, and maps appropriate security management measures according to the degree of harm. This security evaluation model integrates various defense mechanisms and resolves the mismatch between existing ICV security defense measures and security situations. The effectiveness of this model has been validated through experiments, and potential research directions in the future are discussed and analyzed.

Original languageEnglish
Pages (from-to)148-155
Number of pages8
JournalIEEE Network
Volume38
Issue number2
DOIs
StatePublished - 1 Mar 2024

Keywords

  • Intelligent connected vehicles
  • attack chain
  • security evaluation
  • threat attack tree

Fingerprint

Dive into the research topics of 'A Security Evaluation Framework for Intelligent Connected Vehicles Based on Attack Chains'. Together they form a unique fingerprint.

Cite this