SlideShare une entreprise Scribd logo
1  sur  5
Télécharger pour lire hors ligne
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 431
Vehicle Cyber Security
Mamta Pednekar1, Prof. Sarita Sapkal2
1UG Student, Department of Computer Engineering, MMCOE, Pune
2Asst. Professor, Department of Computer Engineering, MMCOE, Pune
-------------------------------------------------------------------------***------------------------------------------------------------------------
Abstract - Technology has revolutionized the world changing the lives of people dramatically. There has been no time in history
where the lived lives of people had experienced this greatness that technologyhasmadetotheautomobilesector. Dueto the ideaof
smart cities and technological advancements, we have seen a revolution in the way we drive our vehicles. Vehicle cyber-security
consists of the security of vehicles, its networks and communications, and steps taken to avoid the exploitation of the software,
hardware and the communication networks which are within the vehicle.
Vehicles are no longer mechanical devices. Earlier, the entire control of the vehicle was the driver’s responsibility but their
functionalities can now be handled via software’s. We are also seeing that the software companies are now developing software’s
for the automobile companies for providing automation. As automobile companies are growing more concerned withembedding
smart technologies in the modern vehicles, it is giving rise to more vulnerabilities which allow entry of hackers into the vehicle’s
system which can take control from the driver which may lead to serious and irreversible threats. If it is a software or anyproduct
or a device, it has its own disadvantages and defects which can be hackable. Examples of some threats to the vehicle are Engine
Shutdown, Locked Doors, Human loss, Loss of money, etc. In order to exploit the system, the hackers need to stay in the same
network the car is operating on. But nowadays, it is also possible to hack the system even if the attacker is miles away from the
system. This topic is now restricted to four wheeler vehicles only but maybe in the near future, same problems may be evident for
airplanes or satellites leading to more devastating problems the world willexperience. Theproblemswewillfaceinthe nearfuture
will be more but we cannot be reactionary to the technological advancements. Rather, we must find a way to overcome the
problems.
Key Words:
ABS(Anti-Lock Braking System), ESP(Electronic Stability Program), ECU(Electronic Control Unit), CAN(Controller Area
Network), IDS(Intrusion Detection System), OTA(Over the Air), CVC(Connected Vehicle Cloud)
1. INTRODUCTION
Nowadays, there has been a shift in the choice of vehicles that people buy. Earlier, people used to buy low cost vehicles which
could suffice their purpose of travel. It had very less technologies or sometimes absolutely no technologies, but in these days
people prefer buying high end vehicles which provide more security and are safer. There has been a change in the mindsetsof
people. They are becoming more concerned about safety.Alotoftechnologieshavebeenintroducedinthesevehicles.Recently,
Google had launched a self driving car which is completely automated and is driver- less. Security requirements for road
vehicles and especially a driver-less car are more. Active safety systems provide various functionalities which have definitely
reduced the road fatalities. Active Safety System such as ABS and ESP are some of the common featuresinmostofthehigh-end
vehicles. ABS and ESP are technologies which helps reduce accidents. Earlier, before ABS, wheneverthedriverappliedbrakes,
the car used to stop immediately increasing the threat of skidding and accidents. But, in ABS, whenever brakes are applied by
the driver in order to completely stop the vehicle, internally the brakes aren’t applied instantly but in series of intervals of
milliseconds. This avoid skidding and indirectly accidents. Secondly, before ESP, driving a car on a curvy road was dangerous
because there were greater chances of the rear part of the car to get displaced or carried awaybythecurvyroad.But,with ESP,
this problem is avoided. This feature is mandatory in Sports Utility Vehicles. We can definitely say that these technology and
many other have improved Road safety. Decrease of road traffic accidents need to be
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 432
Fig 1.1
considered as a priority area because vehicle cybersecurity is a very serious topic and proper attentionisrequiredin thisfield.
In the above figure, the ways of hacking of the vehicle are mentioned.Thefirstwayvia smartphoneswhichareconnectedtothe
internet. This internet can be hacked. The smartphone usually has apps through which we connect to the vehicle. Various
companies are providing different applications which varied functionalities suchasConnectNext,OnStarApp, etc.Vehiclesare
also used for infotainment. SO, whenever we play music via laptops or mobile phones, the defects can be hacked.
2. LITERATURE SURVEY
The paper by authors “Driving with Sharks:RethinkingvehicleswithCybersecurity”byauthorsQiangNiandMahmoudHashem
Eiza had a lot of illustations but appropriate measures were absent. In this paper, the authors have illustrated the fact that
nowadays, vehicles are no longer isolated mechanical machines that are solely used for transportation but now customers are
increasingly demanding a seamless connected experience in all aspects of their lives including driving. The ECU units are
explained and the various functionalities provided by themis also mentioned briefly. The software’s present in the vehicles are
hackable.
Some examples provided in the paper are-
1. Cherokee Jeep car uses a software Uconnect. Cherokee Jeep was remotely controlled by the Hackers using a simple 3G
connection. The car was placed on the highway and the hackers were 10 miles away from the car. They were able to hack the
software as it had a vulnerability.
2. The Mitsubishi Outlander Plug was hacked by a man in the middle attack. The hackers were able to turn the lights on and off
and disable the whole theft alarm system leaving the vehicle vulnerable to more attacks.
In the network Architecture, the ways to enter into the system are shown. Cars contain 30 to 100 ECU which communicate
among each other in order to perform a particular functionality such as Air Conditioning, AirBags, ABS, ESP, etc. ECU’s
communicates through thecommonnetwork.ConnectiondifferentdevicesisobtainedthroughUSB,Bluetooth,Wi-Fi,3G/4Getc.
Each subsystem of the ECU implements its own communication module to connect to the outside world. There are huge no of
communication modules which makes the car functionalities accessible to the outside world.
Some of the Cyber Threats
a)OBD Threats
OBD Port
These ports provide entry into the vehicles functionalities. If these are hacked, the entire network of the vehicle will be
accessible.
Outside WorldCar Problems
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 433
b)Malware
Malware can cause numerous problems. It can affect subsystems, packages, operations and the functionalities of the vehicle.
c)Mobile Applications
Automobile companiesarenowprovidingvariousIoTfunctionalitiesviaapplications.But,iftheseapplicationshavedefects,they
may give rise to problems like data leakage or compromising safety or giving authority to a third party to
d)OTA Solution
Most of the updates by the automobile companies are provided to the vehicles throughOTA. It allowsa codetorun.Ifsecurityis
not well implemented, the security is again at risk.
OTA Solution
e)Cloud Services
The paper”Cyber-security as an attribute of active safety systems and their migration towards vehicle automation” by Dr I
Ibarra*, Dr D D Ward hasa brief introduction of the problem, the solutions and properriskmanagementapproach.Abriefabout
Active Safety Systems is given. Various systems like ABS and ESP are explained. Their usesareexplained.Inthispaperalso,OBD
ports are explained.A car is no longer only used for transportation but also forinfotainment industry.AnoverviewofIn-vehicle
systems and cyber-security implications are given. The paper” Approaches for Vehicle Cyber Security” by Hiro Onishi had
explanatory diagrams. Two different ways of hacking were shown and explained thoroughly. This paper focuses onvehicleand
smart phone connectivity. The vulnerabilitiescausedbysmartphoneisexplained.Thevarioussoftwaresofdifferentautomobile
companies are mentioned. The paper has mentioned guidelines such as-
Awareness
Well-defined threats and risk analysis
Cyber security techniques
Handling and mitigation of cyber threats
In the paper, “Cybersecurity in the age of autonomous vehicles, intelligent traffic controls and pervasive transportation
networks,”, the main focus is on the self-driving cars. It has also mentioned the risks of deploying vehicles with less security. In
the paper, “Experimental Security Analysis of a Modern Automobile”, it is explaining that vehicles are used for manifold of
purposes rather than just as a mechanical device. The vehicles are suffering from major potential risks. The common problems
that the cars are facing is mentioned and have also tried to explain the ways in order to overcome these problems. In the paper,
“DefendingConnectedVehiclesAgainstMalware:ChallengesandaSolutionFramework,”thevarioussolutionsanditslimitations
are explained briefly. Also, malware and cloud is also explained.
3. SYSTEM ARCHITECTURE
Vehicles nowadays are controlled by hundreds of ECU’s that form an internal network of devices within the vehicle inorderto
perform a particular functionality suchasAirbagControl Unit,InfotainmentSystem,ESP,ABS,etc.TheECU’scommunicatewith
other ECU’s in order to achieve the function. A common netwrok is usually used for thispurpose.Butthismayalsoincreasethe
risk of a new cyber threat leading to more problems than solving them.
UpdatesVehicle
ECU ECU ECU
Smartphone Bluetooth
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 434
4. ALGORITHM/ FLOWCHART
A car is now equipped with lot more functionalities than ever before. It has made life simpler but also has given rise to
problems. Some of the steps in order to overcome these are to solely identify the problem and to find out whether the similar
problem has been experienced before. If not, then assess the possibilities of overcoming it. Moreover,findingthemostfeasible
security solution for it and testing the system with the new solution.
5. CONCLUSION AND FUTURE WORK
Firewalls are one the most common prevention systems for a system as it can block specifiedkindsofattacksandsitesthrough
packet filtering. They are both hardware and software based. IDS products are designed to detect network attacks.Twofactor
authentication is a method for mitigating unauthorized access to a system or sensitive information. It requires some software
like a password or PIN, and some hardware like a card, dongle, cellphone. This reduces the unauthorized access to thesystem.
Improving the security measures, will reduce unauthorized hacks. Active safety systems reduces the road fatalities
significantly, as they improve the vehicle performance in critical situationswherethe drivermaynototherwisebe abletoreact
in time.
Advantages:
1. It is possible and a necessity to use strong security measures and mechanisms in ordinary networks to protect the system.
2. Technology and various systems have improved safety and security
3. Reduced accidents and subsequently the human loss also.
4. Have made life easier.
5. Easily control the functionalities of the vehicles like starting or stopping the vehicle with a click.
Disadvantages:
1. High-end vehicles are costly which many people cannot afford.
2. ECUs in the vehicle are not developed from the same vendor. Thus, we cannot design one security solution for the whole
system.
3. The functionalities should be provided at low cost so everyone can afford it and make use of it.
Identify Threats
Review by sending messages between
ECU and safety systems
Install required Software measures
Assess by setting constraints
Protect against other attacks
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 435
4. With the advent of technological advancements, there has been a significant change in the customer needs. People now buy
high end vehicles which ensure safety and security. But these safe systems which are handled via software are also hackable
which may cause huge and irreversible losses because if it is a software or a mechanical device or a product, it may have its
disadvantages.
5. Software must be well-tested so that it has minimum defects.
6. Softwares must be complex which can reduce their chances of being hacked.
7. Connecting outside devices with vehicles networks are makingthemmorevulnerablewhich cancausevariousproblemslike
data leakage, etc.
REFERENCES
[1] M. Hashem Eiza and Q. Ni. Driving with sharks: Rethinking connected vehicles with vehicle cyber security. IEEE Vehicular
Technology Magazine, 12(2):45–51, June 2017.
[2] I. Ibarra and D. D. Ward. Cyber-security as an attribute of active safety systems and their migration towards vehicle
automation. In 8th IET International SystemSafetyConferenceincorporatingtheCyberSecurityConference2013,pages1–
5, Oct 2013.
[3] H. Onishi. Approaches for vehicle cyber security. In 2014 IEEE Conference on Communications and Network Security,
pages 506–507, Oct 2014.
[4] C.W.Axelrod, “Cybersecurity in the age of autonomous vehicles, intelligent traffic controls and pervasive transportation
networks,”Proc . Of the 2017 IEEE LISAT Conference, Farmingdale, NY, May 2017.
[5] E.Vinsel, “The man who invented intelligent traffic control a century too early.” IEEE Spectrum, July 21, 2016
[6] K. Koscher, A. Czeskis, F.Roesner,S. Patel, and T.Kohno, “Experimental Security Analysis of a Modern
Automobile”, IEEE Symposium on Security and Privacy, 2010
[7] A. Greenberg, “Hackers remotely kill a Jeep on the highway – with me in it,” WIRED, July 21, 2015. [Online].Available:
http://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway
[8] D. Lodge, “Hacking the Mitsubishi Outlander PHEV hybrid,” PenTestPartners, June 05, 2016. [Online]. Available:
https://www.pentestpartners.com/blog/hacking-the-mitsubishi-outlander-phev-hybrid-suv
[9] T. Zhang, H. Antunes and S. Aggarwal, “Defending Connected Vehicles Against Malware: Challenges and a Solution
Framework,” IEEE Internet of Things, vol. 1, no. 1, Feb 2014, pp.10-21

Contenu connexe

Tendances

Fighting Accident Using Eye Detection forSmartphones
Fighting Accident Using Eye Detection forSmartphonesFighting Accident Using Eye Detection forSmartphones
Fighting Accident Using Eye Detection forSmartphones
IJERA Editor
 
Autonomous Vehicle Navigation
Autonomous Vehicle NavigationAutonomous Vehicle Navigation
Autonomous Vehicle Navigation
Torben Haagh
 

Tendances (20)

The Internet of Cars - Towards the Future of the Connected Car
The Internet of Cars - Towards the Future of the Connected CarThe Internet of Cars - Towards the Future of the Connected Car
The Internet of Cars - Towards the Future of the Connected Car
 
Protection for Single PCs
Protection for Single PCsProtection for Single PCs
Protection for Single PCs
 
IRJET - Accident Prevention Control System and Detection of Lost Key
IRJET - Accident Prevention Control System and Detection of Lost KeyIRJET - Accident Prevention Control System and Detection of Lost Key
IRJET - Accident Prevention Control System and Detection of Lost Key
 
Connected Cars - Poster Child for the IoT Reality Check
Connected Cars - Poster Child for the IoT Reality CheckConnected Cars - Poster Child for the IoT Reality Check
Connected Cars - Poster Child for the IoT Reality Check
 
IRJET- Smart Travel Automated Vehicle
IRJET- Smart Travel Automated VehicleIRJET- Smart Travel Automated Vehicle
IRJET- Smart Travel Automated Vehicle
 
Fighting Accident Using Eye Detection forSmartphones
Fighting Accident Using Eye Detection forSmartphonesFighting Accident Using Eye Detection forSmartphones
Fighting Accident Using Eye Detection forSmartphones
 
Advanced Driver Assistance System using Vehicle to Vehicle Communication
Advanced Driver Assistance System using Vehicle to Vehicle CommunicationAdvanced Driver Assistance System using Vehicle to Vehicle Communication
Advanced Driver Assistance System using Vehicle to Vehicle Communication
 
Autonomous Vehicle Navigation
Autonomous Vehicle NavigationAutonomous Vehicle Navigation
Autonomous Vehicle Navigation
 
Hacking your Connected Car: What you need to know NOW
Hacking your Connected Car: What you need to know NOWHacking your Connected Car: What you need to know NOW
Hacking your Connected Car: What you need to know NOW
 
IRJET- Car Accident Detection and Notification: An Analytical Survey
IRJET-  	  Car Accident Detection and Notification: An Analytical SurveyIRJET-  	  Car Accident Detection and Notification: An Analytical Survey
IRJET- Car Accident Detection and Notification: An Analytical Survey
 
IRJET - Smart Vehicle System for Accident Prevention
IRJET - Smart Vehicle System for Accident PreventionIRJET - Smart Vehicle System for Accident Prevention
IRJET - Smart Vehicle System for Accident Prevention
 
Autonomous vehicles
Autonomous vehiclesAutonomous vehicles
Autonomous vehicles
 
First Passenger
First PassengerFirst Passenger
First Passenger
 
Real Time Vehicle Tracking and Automatic Engine Lock System
Real Time Vehicle Tracking and Automatic Engine Lock SystemReal Time Vehicle Tracking and Automatic Engine Lock System
Real Time Vehicle Tracking and Automatic Engine Lock System
 
IRJET- Smart Technology for Vehicle Safety
IRJET- Smart Technology for Vehicle SafetyIRJET- Smart Technology for Vehicle Safety
IRJET- Smart Technology for Vehicle Safety
 
Addressing Security in the Automotive Industry
Addressing Security in the Automotive IndustryAddressing Security in the Automotive Industry
Addressing Security in the Automotive Industry
 
Anatomy of self driving vehicle
Anatomy of self driving vehicleAnatomy of self driving vehicle
Anatomy of self driving vehicle
 
IRJET- Biometric Vehicle Starter and Security
IRJET-  	  Biometric Vehicle Starter and SecurityIRJET-  	  Biometric Vehicle Starter and Security
IRJET- Biometric Vehicle Starter and Security
 
Connected Car Security and the Future of Transportation
Connected Car Security and the Future of Transportation Connected Car Security and the Future of Transportation
Connected Car Security and the Future of Transportation
 
IRJET- Data Acquistion through Connectivities in Cars
IRJET- Data Acquistion through Connectivities in CarsIRJET- Data Acquistion through Connectivities in Cars
IRJET- Data Acquistion through Connectivities in Cars
 

Similaire à IRJET- Vehicle Cyber Security

Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
IJCI JOURNAL
 
Algorithm for Security in Autonomous Cars
Algorithm for Security in Autonomous CarsAlgorithm for Security in Autonomous Cars
Algorithm for Security in Autonomous Cars
Association of Scientists, Developers and Faculties
 

Similaire à IRJET- Vehicle Cyber Security (20)

Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
 
Advanced Driver Assistance System using Vehicle to Vehicle Communication
Advanced Driver Assistance System using Vehicle to Vehicle CommunicationAdvanced Driver Assistance System using Vehicle to Vehicle Communication
Advanced Driver Assistance System using Vehicle to Vehicle Communication
 
IRJET - Automobile Enhanced Security System using LabVIEW based on IoT
IRJET - Automobile Enhanced Security System using LabVIEW based on IoTIRJET - Automobile Enhanced Security System using LabVIEW based on IoT
IRJET - Automobile Enhanced Security System using LabVIEW based on IoT
 
IRJET- A Survey on Application of Automobile Safety Features
IRJET-  	  A Survey on Application of Automobile Safety FeaturesIRJET-  	  A Survey on Application of Automobile Safety Features
IRJET- A Survey on Application of Automobile Safety Features
 
IRJET- Car Accident Detection and Reporting System
IRJET-  	  Car Accident Detection and Reporting SystemIRJET-  	  Car Accident Detection and Reporting System
IRJET- Car Accident Detection and Reporting System
 
Algorithm for Security in Autonomous Cars
Algorithm for Security in Autonomous CarsAlgorithm for Security in Autonomous Cars
Algorithm for Security in Autonomous Cars
 
SANS - Developments car hacking - 36607
SANS - Developments car hacking - 36607SANS - Developments car hacking - 36607
SANS - Developments car hacking - 36607
 
VEHICLE THEFT DETECTION WITH ALCOHOL DETECTION,SMOKE DETECTION AND FINGERPRIN...
VEHICLE THEFT DETECTION WITH ALCOHOL DETECTION,SMOKE DETECTION AND FINGERPRIN...VEHICLE THEFT DETECTION WITH ALCOHOL DETECTION,SMOKE DETECTION AND FINGERPRIN...
VEHICLE THEFT DETECTION WITH ALCOHOL DETECTION,SMOKE DETECTION AND FINGERPRIN...
 
IRJET- The Smart in-Car Technology
IRJET-  	  The Smart in-Car TechnologyIRJET-  	  The Smart in-Car Technology
IRJET- The Smart in-Car Technology
 
IRJET-Anti-Lock Braking System with Hydraulic Brake Assist for Emergency Braking
IRJET-Anti-Lock Braking System with Hydraulic Brake Assist for Emergency BrakingIRJET-Anti-Lock Braking System with Hydraulic Brake Assist for Emergency Braking
IRJET-Anti-Lock Braking System with Hydraulic Brake Assist for Emergency Braking
 
Gx3512131216
Gx3512131216Gx3512131216
Gx3512131216
 
IRJET- Advanced Safety Sytem for the Vehicles
IRJET-  	  Advanced Safety Sytem for the VehiclesIRJET-  	  Advanced Safety Sytem for the Vehicles
IRJET- Advanced Safety Sytem for the Vehicles
 
IRJET- Data Acquistion through Connectivities in Cars
IRJET- Data Acquistion through Connectivities in CarsIRJET- Data Acquistion through Connectivities in Cars
IRJET- Data Acquistion through Connectivities in Cars
 
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
 
IRJET- Build and Integrate Perception Features on Freescale Platform
IRJET-  	  Build and Integrate Perception Features on Freescale PlatformIRJET-  	  Build and Integrate Perception Features on Freescale Platform
IRJET- Build and Integrate Perception Features on Freescale Platform
 
IRJET- Review Paper on Iot Based Technology in Automobiles
IRJET-  	  Review Paper on Iot Based Technology in AutomobilesIRJET-  	  Review Paper on Iot Based Technology in Automobiles
IRJET- Review Paper on Iot Based Technology in Automobiles
 
The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected CarsThe New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
 
IRJET- Smart Vehicle Automation with Blackbox using IoT
IRJET- Smart Vehicle Automation with Blackbox using IoTIRJET- Smart Vehicle Automation with Blackbox using IoT
IRJET- Smart Vehicle Automation with Blackbox using IoT
 
Vehicle Related Prevention Techniques: Pothole/Speedbreaker Detection and Ant...
Vehicle Related Prevention Techniques: Pothole/Speedbreaker Detection and Ant...Vehicle Related Prevention Techniques: Pothole/Speedbreaker Detection and Ant...
Vehicle Related Prevention Techniques: Pothole/Speedbreaker Detection and Ant...
 
IRJET- Emergency Accident Reporting using Smartphone
IRJET- Emergency Accident Reporting using SmartphoneIRJET- Emergency Accident Reporting using Smartphone
IRJET- Emergency Accident Reporting using Smartphone
 

Plus de IRJET Journal

Plus de IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Dernier

Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Christo Ananth
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
Tonystark477637
 

Dernier (20)

Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 

IRJET- Vehicle Cyber Security

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 431 Vehicle Cyber Security Mamta Pednekar1, Prof. Sarita Sapkal2 1UG Student, Department of Computer Engineering, MMCOE, Pune 2Asst. Professor, Department of Computer Engineering, MMCOE, Pune -------------------------------------------------------------------------***------------------------------------------------------------------------ Abstract - Technology has revolutionized the world changing the lives of people dramatically. There has been no time in history where the lived lives of people had experienced this greatness that technologyhasmadetotheautomobilesector. Dueto the ideaof smart cities and technological advancements, we have seen a revolution in the way we drive our vehicles. Vehicle cyber-security consists of the security of vehicles, its networks and communications, and steps taken to avoid the exploitation of the software, hardware and the communication networks which are within the vehicle. Vehicles are no longer mechanical devices. Earlier, the entire control of the vehicle was the driver’s responsibility but their functionalities can now be handled via software’s. We are also seeing that the software companies are now developing software’s for the automobile companies for providing automation. As automobile companies are growing more concerned withembedding smart technologies in the modern vehicles, it is giving rise to more vulnerabilities which allow entry of hackers into the vehicle’s system which can take control from the driver which may lead to serious and irreversible threats. If it is a software or anyproduct or a device, it has its own disadvantages and defects which can be hackable. Examples of some threats to the vehicle are Engine Shutdown, Locked Doors, Human loss, Loss of money, etc. In order to exploit the system, the hackers need to stay in the same network the car is operating on. But nowadays, it is also possible to hack the system even if the attacker is miles away from the system. This topic is now restricted to four wheeler vehicles only but maybe in the near future, same problems may be evident for airplanes or satellites leading to more devastating problems the world willexperience. Theproblemswewillfaceinthe nearfuture will be more but we cannot be reactionary to the technological advancements. Rather, we must find a way to overcome the problems. Key Words: ABS(Anti-Lock Braking System), ESP(Electronic Stability Program), ECU(Electronic Control Unit), CAN(Controller Area Network), IDS(Intrusion Detection System), OTA(Over the Air), CVC(Connected Vehicle Cloud) 1. INTRODUCTION Nowadays, there has been a shift in the choice of vehicles that people buy. Earlier, people used to buy low cost vehicles which could suffice their purpose of travel. It had very less technologies or sometimes absolutely no technologies, but in these days people prefer buying high end vehicles which provide more security and are safer. There has been a change in the mindsetsof people. They are becoming more concerned about safety.Alotoftechnologieshavebeenintroducedinthesevehicles.Recently, Google had launched a self driving car which is completely automated and is driver- less. Security requirements for road vehicles and especially a driver-less car are more. Active safety systems provide various functionalities which have definitely reduced the road fatalities. Active Safety System such as ABS and ESP are some of the common featuresinmostofthehigh-end vehicles. ABS and ESP are technologies which helps reduce accidents. Earlier, before ABS, wheneverthedriverappliedbrakes, the car used to stop immediately increasing the threat of skidding and accidents. But, in ABS, whenever brakes are applied by the driver in order to completely stop the vehicle, internally the brakes aren’t applied instantly but in series of intervals of milliseconds. This avoid skidding and indirectly accidents. Secondly, before ESP, driving a car on a curvy road was dangerous because there were greater chances of the rear part of the car to get displaced or carried awaybythecurvyroad.But,with ESP, this problem is avoided. This feature is mandatory in Sports Utility Vehicles. We can definitely say that these technology and many other have improved Road safety. Decrease of road traffic accidents need to be
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 432 Fig 1.1 considered as a priority area because vehicle cybersecurity is a very serious topic and proper attentionisrequiredin thisfield. In the above figure, the ways of hacking of the vehicle are mentioned.Thefirstwayvia smartphoneswhichareconnectedtothe internet. This internet can be hacked. The smartphone usually has apps through which we connect to the vehicle. Various companies are providing different applications which varied functionalities suchasConnectNext,OnStarApp, etc.Vehiclesare also used for infotainment. SO, whenever we play music via laptops or mobile phones, the defects can be hacked. 2. LITERATURE SURVEY The paper by authors “Driving with Sharks:RethinkingvehicleswithCybersecurity”byauthorsQiangNiandMahmoudHashem Eiza had a lot of illustations but appropriate measures were absent. In this paper, the authors have illustrated the fact that nowadays, vehicles are no longer isolated mechanical machines that are solely used for transportation but now customers are increasingly demanding a seamless connected experience in all aspects of their lives including driving. The ECU units are explained and the various functionalities provided by themis also mentioned briefly. The software’s present in the vehicles are hackable. Some examples provided in the paper are- 1. Cherokee Jeep car uses a software Uconnect. Cherokee Jeep was remotely controlled by the Hackers using a simple 3G connection. The car was placed on the highway and the hackers were 10 miles away from the car. They were able to hack the software as it had a vulnerability. 2. The Mitsubishi Outlander Plug was hacked by a man in the middle attack. The hackers were able to turn the lights on and off and disable the whole theft alarm system leaving the vehicle vulnerable to more attacks. In the network Architecture, the ways to enter into the system are shown. Cars contain 30 to 100 ECU which communicate among each other in order to perform a particular functionality such as Air Conditioning, AirBags, ABS, ESP, etc. ECU’s communicates through thecommonnetwork.ConnectiondifferentdevicesisobtainedthroughUSB,Bluetooth,Wi-Fi,3G/4Getc. Each subsystem of the ECU implements its own communication module to connect to the outside world. There are huge no of communication modules which makes the car functionalities accessible to the outside world. Some of the Cyber Threats a)OBD Threats OBD Port These ports provide entry into the vehicles functionalities. If these are hacked, the entire network of the vehicle will be accessible. Outside WorldCar Problems
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 433 b)Malware Malware can cause numerous problems. It can affect subsystems, packages, operations and the functionalities of the vehicle. c)Mobile Applications Automobile companiesarenowprovidingvariousIoTfunctionalitiesviaapplications.But,iftheseapplicationshavedefects,they may give rise to problems like data leakage or compromising safety or giving authority to a third party to d)OTA Solution Most of the updates by the automobile companies are provided to the vehicles throughOTA. It allowsa codetorun.Ifsecurityis not well implemented, the security is again at risk. OTA Solution e)Cloud Services The paper”Cyber-security as an attribute of active safety systems and their migration towards vehicle automation” by Dr I Ibarra*, Dr D D Ward hasa brief introduction of the problem, the solutions and properriskmanagementapproach.Abriefabout Active Safety Systems is given. Various systems like ABS and ESP are explained. Their usesareexplained.Inthispaperalso,OBD ports are explained.A car is no longer only used for transportation but also forinfotainment industry.AnoverviewofIn-vehicle systems and cyber-security implications are given. The paper” Approaches for Vehicle Cyber Security” by Hiro Onishi had explanatory diagrams. Two different ways of hacking were shown and explained thoroughly. This paper focuses onvehicleand smart phone connectivity. The vulnerabilitiescausedbysmartphoneisexplained.Thevarioussoftwaresofdifferentautomobile companies are mentioned. The paper has mentioned guidelines such as- Awareness Well-defined threats and risk analysis Cyber security techniques Handling and mitigation of cyber threats In the paper, “Cybersecurity in the age of autonomous vehicles, intelligent traffic controls and pervasive transportation networks,”, the main focus is on the self-driving cars. It has also mentioned the risks of deploying vehicles with less security. In the paper, “Experimental Security Analysis of a Modern Automobile”, it is explaining that vehicles are used for manifold of purposes rather than just as a mechanical device. The vehicles are suffering from major potential risks. The common problems that the cars are facing is mentioned and have also tried to explain the ways in order to overcome these problems. In the paper, “DefendingConnectedVehiclesAgainstMalware:ChallengesandaSolutionFramework,”thevarioussolutionsanditslimitations are explained briefly. Also, malware and cloud is also explained. 3. SYSTEM ARCHITECTURE Vehicles nowadays are controlled by hundreds of ECU’s that form an internal network of devices within the vehicle inorderto perform a particular functionality suchasAirbagControl Unit,InfotainmentSystem,ESP,ABS,etc.TheECU’scommunicatewith other ECU’s in order to achieve the function. A common netwrok is usually used for thispurpose.Butthismayalsoincreasethe risk of a new cyber threat leading to more problems than solving them. UpdatesVehicle ECU ECU ECU Smartphone Bluetooth
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 434 4. ALGORITHM/ FLOWCHART A car is now equipped with lot more functionalities than ever before. It has made life simpler but also has given rise to problems. Some of the steps in order to overcome these are to solely identify the problem and to find out whether the similar problem has been experienced before. If not, then assess the possibilities of overcoming it. Moreover,findingthemostfeasible security solution for it and testing the system with the new solution. 5. CONCLUSION AND FUTURE WORK Firewalls are one the most common prevention systems for a system as it can block specifiedkindsofattacksandsitesthrough packet filtering. They are both hardware and software based. IDS products are designed to detect network attacks.Twofactor authentication is a method for mitigating unauthorized access to a system or sensitive information. It requires some software like a password or PIN, and some hardware like a card, dongle, cellphone. This reduces the unauthorized access to thesystem. Improving the security measures, will reduce unauthorized hacks. Active safety systems reduces the road fatalities significantly, as they improve the vehicle performance in critical situationswherethe drivermaynototherwisebe abletoreact in time. Advantages: 1. It is possible and a necessity to use strong security measures and mechanisms in ordinary networks to protect the system. 2. Technology and various systems have improved safety and security 3. Reduced accidents and subsequently the human loss also. 4. Have made life easier. 5. Easily control the functionalities of the vehicles like starting or stopping the vehicle with a click. Disadvantages: 1. High-end vehicles are costly which many people cannot afford. 2. ECUs in the vehicle are not developed from the same vendor. Thus, we cannot design one security solution for the whole system. 3. The functionalities should be provided at low cost so everyone can afford it and make use of it. Identify Threats Review by sending messages between ECU and safety systems Install required Software measures Assess by setting constraints Protect against other attacks
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 435 4. With the advent of technological advancements, there has been a significant change in the customer needs. People now buy high end vehicles which ensure safety and security. But these safe systems which are handled via software are also hackable which may cause huge and irreversible losses because if it is a software or a mechanical device or a product, it may have its disadvantages. 5. Software must be well-tested so that it has minimum defects. 6. Softwares must be complex which can reduce their chances of being hacked. 7. Connecting outside devices with vehicles networks are makingthemmorevulnerablewhich cancausevariousproblemslike data leakage, etc. REFERENCES [1] M. Hashem Eiza and Q. Ni. Driving with sharks: Rethinking connected vehicles with vehicle cyber security. IEEE Vehicular Technology Magazine, 12(2):45–51, June 2017. [2] I. Ibarra and D. D. Ward. Cyber-security as an attribute of active safety systems and their migration towards vehicle automation. In 8th IET International SystemSafetyConferenceincorporatingtheCyberSecurityConference2013,pages1– 5, Oct 2013. [3] H. Onishi. Approaches for vehicle cyber security. In 2014 IEEE Conference on Communications and Network Security, pages 506–507, Oct 2014. [4] C.W.Axelrod, “Cybersecurity in the age of autonomous vehicles, intelligent traffic controls and pervasive transportation networks,”Proc . Of the 2017 IEEE LISAT Conference, Farmingdale, NY, May 2017. [5] E.Vinsel, “The man who invented intelligent traffic control a century too early.” IEEE Spectrum, July 21, 2016 [6] K. Koscher, A. Czeskis, F.Roesner,S. Patel, and T.Kohno, “Experimental Security Analysis of a Modern Automobile”, IEEE Symposium on Security and Privacy, 2010 [7] A. Greenberg, “Hackers remotely kill a Jeep on the highway – with me in it,” WIRED, July 21, 2015. [Online].Available: http://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway [8] D. Lodge, “Hacking the Mitsubishi Outlander PHEV hybrid,” PenTestPartners, June 05, 2016. [Online]. Available: https://www.pentestpartners.com/blog/hacking-the-mitsubishi-outlander-phev-hybrid-suv [9] T. Zhang, H. Antunes and S. Aggarwal, “Defending Connected Vehicles Against Malware: Challenges and a Solution Framework,” IEEE Internet of Things, vol. 1, no. 1, Feb 2014, pp.10-21