A platform for research: civil engineering, architecture and urbanism
Security issues and vulnerabilities in connected car systems
The Connected Revolution has reached the automotive industry and the Internet penetrates into the modern vehicles. Formerly acquiring data from a vehicle was the tool of Fleet Management Systems handling commercial vehicles. In the recent years connectivity began to appear in the passenger vehicles also. The first features were infotainment and navigation, having low security needs remaining far from the vehicular networks. Then telematics and remote control, such as keyless entry appeared and created a new security threat in the vehicle. The paper shows how the connected feature changes the vehicle and also presents vulnerabilities of each element to show the importance of cautious system security design.
Security issues and vulnerabilities in connected car systems
The Connected Revolution has reached the automotive industry and the Internet penetrates into the modern vehicles. Formerly acquiring data from a vehicle was the tool of Fleet Management Systems handling commercial vehicles. In the recent years connectivity began to appear in the passenger vehicles also. The first features were infotainment and navigation, having low security needs remaining far from the vehicular networks. Then telematics and remote control, such as keyless entry appeared and created a new security threat in the vehicle. The paper shows how the connected feature changes the vehicle and also presents vulnerabilities of each element to show the importance of cautious system security design.
Security issues and vulnerabilities in connected car systems
Becsi, Tamas (author) / Aradi, Szilard (author) / Gaspar, Peter (author)
2015-06-01
758852 byte
Conference paper
Electronic Resource
English
‘Violent spaces’: production and reproduction of security and vulnerabilities
Taylor & Francis Verlag | 2011
|'Violent spaces': production and reproduction of security and vulnerabilities
British Library Online Contents | 2011
|'Violent spaces': production and reproduction of security and vulnerabilities
Online Contents | 2011
|A Case Study of Security Vulnerabilities in Smart Contracts
DataCite | 2022
|