PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

The safety of modern and traditional communication protocols in vehicles

Autorzy
Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Communication infrastructure of vehicles sub-assemblies has undergone three phases of development. The first phase was initiated by the need to reduce emission levels. The function of vehicle sub-assemblies health monitoring was introduced simultaneously. This phase took place in the 70s and 80s of the 20th century. The second phase was focused on the elimination of redundant sensors and implementation of new functions of the vehicle. This phase has been particularly noticeable since the beginning of the 21st century. At the moment, there are 2 directions of development. On the one hand, the works are being continued in the scope of autonomous movement of vehicle and, on the otherhand multimedia solutions are being introduced in order to make the time spent in a vehicle more attractive (multimedia, the Internet, …). The present study is focused on the mechanisms of protection applied in communication protocols used in vehicles. Furthermore, it contains the classification of communication methods, characteristics of the basic methods of protection incorporated in the described protocols and the practical cases of security breach. Therefore, it is possible to answer the question why it is possible for third persons to interfere into the communication network of a vehicle and to indicate potential methods of protection against the functioning disturbance in such communication networks.
Twórcy
autor
  • Lublin University of Technology, Department of Structural Mechanics, Poland, 20-618 Lublin, Nadbystrzycka 40
Bibliografia
  • 1. Bono S.C., Green M., Stubblefield A. Juels A., RubinA.D.,Szydlo M. 2005. Security Analysis of a Cryptographically-Enabled RFID Device. Proceedings of USENIX Security 2005, USENIX Association.
  • 2. Bosch R. GmbH. 1991. CAN Specification. Version 2.0, Stuttgart.
  • 3. Bosch R. GmbH. 2008. Data exchange network in vehicles. Wydawnictwa Komunikacji i Łączności, Warszawa (in Polish).
  • 4. Checkoway S., McCoy D., Kantor B., Anderson D, Shacham H., Savage S., Koscher K., Czeskis A., Roesner F., Kohno T. 2011. Comprehensive Experimental Analyses of Automotive Attack Surfaces. Report for the National Academy of Sciences Committee on Electronic Vehicle Controls and Unintended Acceleration, http://www.autosec.org/pubs/cars-usenixsec2011.pdf.
  • 5. Cornell University. 2008. GPS Navigation Devices Can Be Spoofed, Counter Measures Not Effective In Certain Cases. https://www.sciencedaily.com/releases/2008/09/080922122523.htm (23.09.2008).
  • 6. Fijalkowski B.T. 2011. Automotive Mechatronics: Operational and Practical Issues. Volume 1. Springer Science+Business Media B.V.
  • 7. FlexRay Consortium. 2004. FlexRay Communications System. Bus Guardian Specification, Version 2.0. www.uni-salzburg.at/fileadmin/multimedia/SRC/docs/teaching/ SS08/PS_VS/FlexRayCommunicationSystem.pdf.
  • 8. FlexRay Consortium. 2010. FlexRay Communications System. Protocol Specification, Version 3.0.1, svn.ipd.kit.edu/nlrp/public/FlexRay/FlexRay%E2%84%A2%20Protocol%20Specification%20Version%203.0.1.pdf.
  • 9. Gozdek J. 2015. Hackers without limits. Chip, 11, 104-108 (in Polish).
  • 10. Gozdek J. 2015. The spring novelties. Chip, 4,20-25 (in Polish).
  • 11. Greenberg A. 2015. Hackers Remotely Kill a Jeep on the Highway—With Me in It. Wired, www.wired.com/2015/07/hackers-remotely-kill-jeep-highway, 21.07.2015.
  • 12. Greenberg A. 2015. This Hacker’s Tiny Device Unlocks Cars And Opens Garages. Wired, www.wired.com/2015/08/hackers-tiny-device-unlocks-cars-opens-garages, 06.08.2015.
  • 13. Grzemba A. 2008. MOST -The Automotive Multimedia Network. Frazis Verlag GmbH.
  • 14. Haataja K., Hyppönen K., Pasanen S., Toivanen P. 2013. Bluetooth Security Attacks. Comparative Analysis, Attacks, and Countermeasures. Springer Berlin Heidelberg.
  • 15. Humphreys T.E, Ledvina B.M., Psiaki M.L., O'Hanlon B.W., Kintner P.M. 2008. Assessing the Spoofing Threat: Development of a Portable GPS Civilian Spoofer. Proceedings of ION GNSS, The Institute of Navigation, Savanna, Georgia, USA.
  • 16. Jaffe E., 2015. Google's New Self-Driving Car Is About to Hit the Streets. CityLab, http://www.citylab.com/tech/2015/05/googles-new-self-driving-car-is-about-to-hit-the-streets/393323.
  • 17. Joe M.M., Ramakrishnan B. 2015. Review of vehicular ad hoc network communication models including WVANET (Web VANET) model and WVANET future research directions. Wireless Networks. Springer Science+Business Media New York.
  • 18. Korn J. 2015. Computer: The Sorcerer's Apprentice. Chip, 9, 108-111 (in Polish).
  • 19. Koscher K., Czeskis A., Roesner F., Patel S., Kohno T., Checkoway S., McCoy D., Kantor B., Anderson D., Shacham H., Savage S. 2010. Experimental Security Analysis of a Modern Automobile. Proceedings of IEEE Symposium on Security and Privacy, Oakland, CA, May 16–19, 2010, http://www.autosec.org/pubs/cars-oakland2010.pdf.
  • 20. Kulas T. 2015. New methods of security. Chip, 8, 100-101 (in Polish).
  • 21. Larson U.E., Nilsson D.K. 2008. Securing vehiclesagainst cyber attacks. Mili and Krings editors, CSIIRW ’08, ACM Press.
  • 22. Leen G., Hefferman D. 2000: Talking to the car. The Engineneer, http://www.theengineer.co.uk/news/talking-to-the-car/285325.article, 5 October 2000.
  • 23. LIN Consortium. 2006. LIN Specification Package Revision 2.1. tge.cmaisonneuve.qc.ca/barbaud/R%C3%A9f%C3%A9rences%20techniques/Bus%20LIN/LIN-Spec_Pac2_1.pdf.
  • 24. Merkisz J., Mazurek S. 2007. On-board Diagnostic Systems of Vehicles. Wydawnictwa Komunikacji i Łączności, Warszawa (inPolish).
  • 25. Panasonic Corporation. 2016. DMP-BD10 Firmware Download. http://av.jpn.support.panasonic.com/support/global/cs/bd/download/bd10/europe_uk/index.html
  • 26. Sony Europe. 2016. Sony Home Audio and Video: Firmware Download. https://www.sony.co.uk/support/en/content/cnt-dwnl/prd-tvhc/sony-rdrhxd-firmware-update-v170/RDR-HXD870
  • 27. Soppera A., Burbridge T. 2005. Wireless identification -privacy and security. BT Technology Journal, Vol 23, 4, 54-64.
  • 28. Stavens D. M. 2011. Learning to Drive: Perception For Autonomous Cars. Dissertation Submitted to the Department of Computer Science and the Committee on Graduate Studies of Stanford University, http://purl.stanford.edu/pb661px9942.
  • 29. Stern A. 2013. Bluetooth Connectivity Threatens Your Security. https://blog.kaspersky.com/bluetooth-security/1637/ (15.04.2013).
  • 30. Sumorek A. 2010. Safe Communication Among Vehicle Sub-Assemblies on the Basis of the Embedded Functions of CAN Protocol. Teka (Archives) of the Commission of Motorization and Power Industryin Agriculture, Vol. 10, 432-439.
  • 31. Sumorek A. 2010. The Variability of Electrical Parameters of CAN Protocol Signals in Vehicles. Logistyka, 6, 3263-3272 (in Polish).
  • 32. Sumorek A., Buczaj M. 2011. The Problems in Fibre Optic Communication in the Communication Systems of Vehicles. Teka (Archives) of the Commission of Motorization and Power Industry in Agriculture, Vol. 11, 363-372.
  • 33. Sumorek A., Pietrzyk W. 2011. Controlling of Access of Mechatronic Nodes to the Information Networks of Vehicles. MOTROL - Motorization and Power Industry in Agriculture, Vol. 13, 290-301 (in Polish).
  • 34. Sumorek A. 2011. The Variability of Diagnostic, Control and Multimedia Protocols in Vehicles. Logistyka, 3, 2583-2592 (in Polish).
  • 35. Tran E., Koopman P. (advisor). 1999. Multi-Bit Error Vulnerabilities in the Controller Area Network Protocol. Carnegie Mellon University, Institute for Complex Engineered Systems, 33. Pittsburgh.
  • 36. Widerski T., Kędzierski J. 2004. Automotive information networks (CAN). Auto Moto Serwis, 4, Warszawa, Wydawnictwo Instalator Polski, 38-42 (in Polish).
  • 37. Wolański R. 2016. Every car will be able do it in five years. Chip, 3, 106-107 (in Polish).
  • 38. Zimmermann W., Schmidgall R. 2008: Bussystems in Automotivetechnology: Protocolls and Standards. Wydawnictwa Komunikacji i Łączności, Warszawa (in Polish).
Uwagi
Opracowanie ze środków MNiSW w ramach umowy 812/P-DUN/2016 na działalność upowszechniającą naukę (zadania 2017).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-2075bf80-b04a-4505-ad7e-df61b2b50207
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.