Testing Practice of Cybersecurity Validation of Intelligent Connected Vehicles

  • Keyi Zhu*
  • , Daxin Tian
  • , Bosong Zou
  • , Pinlong Cai
  • , Yuran Li
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

As Intelligent and Connected Vehicles (ICVs) rapidly evolve, real-world cybersecurity issues in automobiles are increasingly prevalent, posing threats to user information security, travel safety, and public transportation safety. Cybersecurity of vehicles is becoming a focal point of concern. This paper specifies the relationship between validation and verifications in ISO/SAE 21434, proposes a systematic cybersecurity validation framework for ICVs for practical applications, and provides pivotal metrics for evaluating vehicles’ cybersecurity. Rigorous testing practice is made to analyze the cybersecurity of vehicles in the mass production stage or already on the market for further in-depth study and recommendations.

Original languageEnglish
Title of host publicationAdvances and Applications in SmartRail, Traffic, and Transportation Engineering - Proceedings of 2024 2nd International Conference on SmartRail, Traffic and Transportation Engineering, ICSTTE 2024
EditorsLimin Jia, Yanhui Wang, Said Easa
PublisherSpringer Science and Business Media Deutschland GmbH
Pages132-141
Number of pages10
ISBN (Print)9789819674404
DOIs
StatePublished - 2025
Event2nd International Conference on SmartRail, Traffic and Transportation Engineering, ICSTTE 2024 - Chongqing, China
Duration: 25 Oct 202427 Oct 2024

Publication series

NameLecture Notes in Electrical Engineering
Volume1432 LNEE
ISSN (Print)1876-1100
ISSN (Electronic)1876-1119

Conference

Conference2nd International Conference on SmartRail, Traffic and Transportation Engineering, ICSTTE 2024
Country/TerritoryChina
CityChongqing
Period25/10/2427/10/24

Keywords

  • Cybersecurity
  • Intelligent and connected vehicles
  • Testing

Fingerprint

Dive into the research topics of 'Testing Practice of Cybersecurity Validation of Intelligent Connected Vehicles'. Together they form a unique fingerprint.

Cite this