Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Services in Connected Vehicles: Security Risks and Countermeasures

Services in Connected Vehicles: Security Risks and Countermeasures
View Sample PDF
Author(s): Marcus Bertilsson (Chalmers University of Technology, Sweden), Michel Folkemark (Chalmers University of Technology, Sweden), Qingyun Gu (Chalmers University of Technology, Sweden), Viktor Rydberg (Chalmers University of Technology, Sweden) and Abdullah Yazar (Marmara University, Turkey)
Copyright: 2021
Pages: 22
Source title: Decision Support Systems and Industrial IoT in Smart Grid, Factories, and Cities
Source Author(s)/Editor(s): Ismail Butun (Chalmers University of Technology, Sweden & Konya Food and Agriculture University, Turkey & Royal University of Technology, Sweden)
DOI: 10.4018/978-1-7998-7468-3.ch007


View Services in Connected Vehicles: Security Risks and Countermeasures on the publisher's website for pricing and purchasing information.


Smart vehicles have introduced many services which can be categorized by their functionality (infotainment, comfort, ADAS, OEM services). Introducing new services increases the risk of compromising security. A mobile app used by drivers to connect the vehicle could be infected with malware and spread to the vehicle. Forging remote starting signals enables an attacker to start the vehicle without a key. Security implications of these services should be investigated and addressed thoroughly. This chapter investigates such problems and provides an overview of vulnerabilities, attacks, and mitigations related to these services along with findings including software bugs and insecure protocols. The mitigations for these attacks include strengthening the security protocol of the vehicle CAN bus and incorporating security protocols such as TLS and IPsec. It is hard to say that all connected vehicles are secured. In conclusion, security cannot be neglected, and best practices like sufficient logging (e.g., IDS), reviewing, security testing, and updating of software and hardware should be used.

Related Content

Okure Udo Obot, Kingsley Friday Attai, Gregory O. Onwodi. © 2023. 28 pages.
Thomas M. Connolly, Mario Soflano, Petros Papadopoulos. © 2023. 29 pages.
Dmytro Dosyn. © 2023. 26 pages.
Jan Kalina. © 2023. 21 pages.
Avishek Choudhury, Mostaan Lotfalian Saremi, Estfania Urena. © 2023. 20 pages.
Yuanying Qu, Xingheng Wang, Limin Yu, Xu Zhu, Wenwu Wang, Zhi Wang. © 2023. 26 pages.
Yousra Kherabi, Damien Ming, Timothy Miles Rawson, Nathan Peiffer-Smadja. © 2023. 10 pages.
Body Bottom