Towards comprehensive threat modeling for intelligent vehicle cyber security

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

In recent years, the development of advanced driver assistant system (ADAS) and vehicular communication has enhanced the level of autonomous vehicles and connected vehicles, which brings a new security challenge to intelligent vehicles. This paper reviews the existing vehicle-related threat modeling and presents the abstract threat model referring to the fundamental factors. Then we perform vulnerability analysis from three respects of vehicular terminal, network communication, and telematics system. Our work can provide comprehensive understanding of intelligent vehicle cyber security threat models and benefit the implementation of security measures in automotive industry.

Original languageEnglish
Title of host publicationCICTP 2017
Subtitle of host publicationTransportation Reform and Change - Equity, Inclusiveness, Sharing, and Innovation - Proceedings of the 17th COTA International Conference of Transportation Professionals
EditorsHaizhong Wang, Jian Sun, Jian Lu, Lei Zhang, Yu Zhang, ShouEn Fang
PublisherAmerican Society of Civil Engineers (ASCE)
Pages4380-4390
Number of pages11
ISBN (Electronic)9780784480915
DOIs
StatePublished - 2018
Event17th COTA International Conference of Transportation Professionals: Transportation Reform and Change - Equity, Inclusiveness, Sharing, and Innovation, CICTP 2017 - Shanghai, China
Duration: 7 Jul 20179 Jul 2017

Publication series

NameCICTP 2017: Transportation Reform and Change - Equity, Inclusiveness, Sharing, and Innovation - Proceedings of the 17th COTA International Conference of Transportation Professionals
Volume2018-January

Conference

Conference17th COTA International Conference of Transportation Professionals: Transportation Reform and Change - Equity, Inclusiveness, Sharing, and Innovation, CICTP 2017
Country/TerritoryChina
CityShanghai
Period7/07/179/07/17

Fingerprint

Dive into the research topics of 'Towards comprehensive threat modeling for intelligent vehicle cyber security'. Together they form a unique fingerprint.

Cite this