A new methodology for analyzing vehicle network topologies for critical hacking

  • PDF / 641,786 Bytes
  • 12 Pages / 595.276 x 790.866 pts Page_size
  • 104 Downloads / 162 Views

DOWNLOAD

REPORT


ORIGINAL RESEARCH

A new methodology for analyzing vehicle network topologies for critical hacking Maen Ghadi1   · Ádám Sali1 · Zsolt Szalay1 · Árpád Török1 Received: 20 May 2020 / Accepted: 4 September 2020 © The Author(s) 2020

Abstract This study aims to provide a new approach for describing and measuring the vulnerability of in-vehicle networks regarding cyberattacks. Cyberattacks targeting in-vehicle networks can result in a reasonable threat considering passenger safety. Unlike previous literature, the methodology focuses on a comparatively large sample of vehicle networks (114 objects) by proposing a new framework of statistical techniques for measuring, classifying, and modelling in-vehicle networks concerning the changed vulnerability, instead of dealing with each vehicle network individually. To facilitate understanding of the vulnerability patterns of in-vehicle networks, the dataset has been evaluated through three analytic stages: vulnerability identification, classification, and modeling. The result has helped in ranking vehicles based on their network vulnerability level. The result of the modeling has shown that every additional remote endpoint installation causes a relevant weakening in security. Higher cost vehicles have also appeared to be more vulnerable to cyberattacks, while the increase in the number of segmented network domains has had a positive effect on network security. Keywords  Vehicle network topology · Cybersecurity · Network vulnerability · Hierarchical clustering · Ordinal logistic regression

1 Introduction and literature review Transport safety and security are sensitive issues that affect all transport users and providers. Self-driving cars could increase safety, prevent deaths, and increase lower-income mobility. But any discussion on the self-driving cars must involve security issues and particularly cybersecurity. Cyberattacks targeting in-vehicle networks can result in a reasonable threat considering passenger safety. When the field of automotive cybersecurity is investigated, vehicular ad-hoc networks (VANETs) cannot be ignored. It seems to be clear that in-vehicle and inter-vehicle communication networks are essential to implement highly automated and connected transportation systems. Electronic supplementary material  The online version of this article (https​://doi.org/10.1007/s1265​2-020-02522​-w) contains supplementary material, which is available to authorized users. * Maen Ghadi [email protected] 1



Faculty of Transportation Engineering and Vehicle Engineering, Budapest University of Technology and Economics, Budapest 1111, Hungary

Accordingly, Sharma and Kaul (2018) present a summary related to the different intrusion detection methods to introduce the different approaches especially focusing on VANETs. In the last part of the paper, the benchmarking of the different models has been performed, presenting pros and cons with regard to the investigated models. Recently, one of the most known cybersecurity issues of automotive communication technologies is the