Titolo:  Automotive cybersecurity: Foundations for next-generation vehicles
Data di pubblicazione:  2019
Autori:  Scalas, M.; Giacinto, G.
Presenza coautori internazionali:  no
Lingua:  Inglese
Titolo del libro:  2019 2nd International Conference on New Trends in Computing Sciences, ICTCS 2019 - Proceedings
ISBN:  978-1-7281-2882-5
Editore:  IEEE (Institute of Electrical and Electronics Engineers)
Pagina iniziale:  1
Pagina finale:  6
Numero di pagine:  6
Digital Object Identifier (DOI):  http://dx.doi.org/10.1109/ICTCS.2019.8923077
Codice identificativo Scopus:  2-s2.0-85077183042
Codice identificativo ISI:  WOS:000534132400003
Revisione (peer review):  Comitato scientifico
Nome del convegno:  2nd International Conference on New Trends in Computing Sciences, ICTCS 2019
Periodo del convegno:  9-11 October 2019
Luogo del convegno:  Amman, Jordan
Abstract:  The automotive industry is experiencing a serious transformation due to a digitalisation process and the transition to the new paradigm of Mobility-As-A-Service. The next-generation vehicles are going to be very complex cyber-physical systems, whose design must be reinvented to fulfil the increasing demand of smart services, both for safety and entertainment purposes, causing the manufacturers' model to converge towards that of IT companies. Connected cars and autonomous driving are the preeminent factors that drive along this route, and they cause the necessity of a new design to address the emerging cybersecurity issues: The 'old' automotive architecture relied on a single closed network, with no external communications; modern vehicles are going to be always connected indeed, which means the attack surface will be much more extended. The result is the need for a paradigm shift towards a secure-by-design approach. In this paper, we propose a systematisation of knowledge about the core cybersecurity aspects to consider when designing a modern car. The major focus is pointed on the in-vehicle network, including its requirements, the current most used protocols and their vulnerabilities. Moreover, starting from the attackers' goals and strategies, we outline the proposed solutions and the main projects towards secure architectures. In this way, we aim to provide the foundations for more targeted analyses about the security impact of autonomous driving and connected cars.
Tipologia: 4.1 Contributo in Atti di convegno

File in questo prodotto:
File Descrizione Tipologia Licenza  
08923077.pdf  File PDF disponibile nella digital library IEEE versione editoriale Administrator   Richiedi una copia

Questionario e social

Condividi su: