Intelligent and connected vehicle security

Intelligent and Connected Vehicles (ICVs) are moving into the mainstream of the worldwide automotive industry. A lot of advanced technologies, like artificial intelligence, big data, millimeter wave radar, LiDAR and high-definition camera based real-time environmental perception, etc., are increasin...

Full description

Saved in:
Bibliographic Details
Main Authors: Liu, Jiajia, (Author), Benslimane, Abderrahim, (Author)
Format: eBook
Language: English
Published: [United States] : River Publishers, [2021]
Subjects:
ISBN: 9788770223669
8770223661
9781003338598
1003338593
9781000797237
1000797236
9781000794076
1000794075
9788770223676
Physical Description: 1 online resource

Cover

Table of contents

LEADER 08896cam a2200457 i 4500
001 kn-on1263184104
003 OCoLC
005 20240717213016.0
006 m o d
007 cr cn|||||||||
008 210809t20212021xxu ob 001 0 eng d
040 |a IEEEE  |b eng  |e rda  |e pn  |c IEEEE  |d OCLCO  |d OCLCF  |d N$T  |d OCLCQ  |d OCLCO  |d YDX  |d TYFRS  |d OCLCQ  |d SFB  |d OCLCQ  |d OCLCO  |d OCLCL 
020 |a 9788770223669  |q (electronic bk.) 
020 |a 8770223661  |q (electronic bk.) 
020 |a 9781003338598  |q (electronic bk.) 
020 |a 1003338593  |q (electronic bk.) 
020 |a 9781000797237  |q (electronic bk. : EPUB) 
020 |a 1000797236  |q (electronic bk. : EPUB) 
020 |a 9781000794076  |q (electronic bk. : PDF) 
020 |a 1000794075  |q (electronic bk. : PDF) 
020 |z 9788770223676 
024 7 |a 10.1201/9781003338598  |2 doi 
035 |a (OCoLC)1263184104 
100 1 |a Liu, Jiajia,  |e author. 
245 1 0 |a Intelligent and connected vehicle security /  |c Jiajia Liu, Abderrahim Benslimane. 
264 1 |a [United States] :  |b River Publishers,  |c [2021] 
264 4 |c ©2021 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
506 |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty 
520 |a Intelligent and Connected Vehicles (ICVs) are moving into the mainstream of the worldwide automotive industry. A lot of advanced technologies, like artificial intelligence, big data, millimeter wave radar, LiDAR and high-definition camera based real-time environmental perception, etc., are increasingly being applied in ICVs, making them more intelligent and connected with devices surrounding the vehicles. However, although the versatile connection and information exchange among ICVs, external devices and human beings provides vehicles with a better and faster perception of surrounding environments and a better driving experience for users, they also create a series of intrusion portals for malicious attackers which threaten the safety of drivers and passengers. This book is concerned with the recognition and protection against such threats. Security for ICVs includes information across the fields of automobile engineering, artificial intelligence, computer, microelectronics, automatic control, communication technology, big data, edge/cloud computing and others. This book comprehensively and systematically introduces security threats to ICVs coming from automotive technology development, on-board sensors, vehicle networking, automobile communications, intelligent transportation, big data, cloud computing, etc. Then, through discussion of some typical automobile cyber-attack cases studies, readers will gain a deeper understanding of the working principle of ICVs, so that they can test vehicles more objectively and scientifically. In this way they will find the existence of vulnerabilities and security risks and take the corresponding protective measures to prevent malicious attacks. 
505 0 |a Preface xi List of Figures xiii List of Tables xix List of Abbreviations xxi 1 Vehicle Bus Security 1 1.1 Vehicle Bus 1 1.1.1 Overview of Vehicle Bus 1 1.1.2 Categories of Vehicle Bus 2 1.1.2.1 LIN Bus 3 1.1.2.2 CAN Bus 5 1.1.2.3 FlexRay Bus 8 1.1.2.4 MOST Bus 9 1.1.2.5 Automotive Ethernet Bus 11 1.1.3 Threat Analysis of Vehicle Bus 12 1.2 CAN Bus Vulnerability and Analysis 13 1.2.1 CAN Bus Architecture 13 1.2.2 On-Board CAN Bus Access 17 1.2.3 Reverse CAN Bus Communication 19 1.2.4 Analysis of CAN Message Data 21 1.2.5 Fuzz Testing of CAN Bus 22 1.3 Analysis of OBD-II Interface Attack Technology 24 1.3.1 Overview of OBD-II 24 1.3.2 Attack Technique Analysis of OBD Box 26 1.3.2.1 Attack Surface Analysis 27 1.3.2.2 Attack Process Analysis 29 1.3.2.3 Invade Car CAN Bus 35 1.4 Attack Experiment Against Vehicle Bus 35 1.4.1 Control of the Display of Vehicle Dashboard 36 1.4.2 Vehicle Status Tampering via Body Control Module 39 1.4.2.1 Control the Door Lock Switch 40 1.4.2.2 Car Lights and Wiper Attacks 41 1.4.3 CAN Bus Overload via Flood Attack 42 1.5 Experiment of Driving Behaviour Analysis 43 1.5.1 A Novel Scheme About Driving Behaviour Extraction 43 1.5.1.1 Extraction and Processing of Driving Data 44 1.5.1.2 Grade Regulation and Label Design 45 1.5.1.3 Establishment of MTL Network 46 1.5.2 Experimental and Numerical Results 47 1.5.2.1 Volunteer Recruitment and Experiment Route 47 1.5.2.2 Illegal Driver Detection Results 47 1.5.2.3 Legal Driver Identification Results 49 1.5.2.4 Driving Behaviour Evaluation Results 49 2 Intra-Vehicle Communication Security 53 2.1 Basic Introduction to Intra-Vehicle Communication 53 2.1.1 Overview of Intra-Vehicle Communication 53 2.1.2 Module Threat Analysis 54 2.1.2.1 Threat Analysis of Keyless Entry 54 2.1.2.2 Threat Analysis of TPMS 54 2.1.2.3 Threat Analysis of Wi-Fi 55 2.1.2.4 Threat Analysis of Bluetooth 55 2.1.2.5 Threat Analysis of FM 57 2.1.2.6 Threat Analysis of GPS 57 2.2 RKE/PKE Security 58 2.2.1 Overview of RKE 58 2.2.2 Overview of PKE 60 2.2.3 Attack Technique Analysis of RKE/PKE 62 2.2.3.1 Security Technology of RKE/PKE System 62 2.2.3.2 Summary of Common Attacks of RKE/PKE System 64 2.3 TPMS Security 66 2.3.1 Overview of TPMS 66 2.3.2 Attack Technique Analysis of TPMS 70 2.4 On-Board Wi-Fi Security 72 2.4.1 Overview of On-Board Wi-Fi 72 2.4.2 Attack Technique Analysis of On-Board Wi-Fi 74 2.4.2.1 WEP Protocol 74 2.4.2.2 WPA/WPA2 Protocol 76 2.4.2.3 WPA3 Protocol 81 2.5 On-Board Bluetooth Security 82 2.5.1 Overview of On-Board Bluetooth 82 2.5.2 Attack Technique Analysis of On-Board Bluetooth 84 2.5.2.1 Status of Bluetooth Security Mechanism 86 2.6 FM Security 91 2.6.1 Overview of Radio 91 2.6.2 Attack Technique Analysis of FM 93 2.6.2.1 Introduction of FM Radio 94 2.6.2.2 Attack Process of FM Radio 94 2.7 GPS Security 96 2.7.1 Overview of GPS 96 2.7.2 Attack Technique Analysis of GPS 99 2.8 Experiments 101 2.8.1 Attack Experiment Against RKE 101 2.8.1.1 Experimental Environment 101 2.8.1.2 Experimental Method 102 2.8.2 Attack Experiment Against TSP 103 2.8.2.1 TSP Attack Process 104 2.8.2.2 Experimental Results of TSP Attack 105 2.8.3 Attack Experiment Against TPMS 106 2.8.3.1 Structure of TPMS 107 2.8.3.2 Reverse Engineering TPMS Communication Protocols 108 2.8.4 Attack Experiment Against Vehicle Bluetooth via BlueBorne Vulnerability 109 2.8.4.1 What is BlueBorne? 110 2.8.4.2 Process of BlueBorne 111 2.8.5 Attack Experiment Against Road Navigation System 111 2.8.5.1 Goals of Road Navigation System 112 2.8.5.2 Detailed Attacking Process 113 2.8.5.3 Experiments and Results 114 3 Unmanned Driving Security and Navigation Deception 117 3.1 Basic Introduction to Unmanned Driving 117 3.1.1 What is an Unmanned Vehicle? 117 3.1.2 Core Functional Modules of Unmanned Driving 118 3.1.2.1 Perception 119 3.1.2.2 Planning 121 3.1.2.3 Control 123 3.2 Ultrasonic Radar Security 126 3.2.1 Overview of Ultrasonic Radar 126 3.2.2 Basic Principle of Ultrasonic Radar 130 3.2.3 Attack Technique Analysis of Ultrasonic Radar 131 3.2.3.1 Jamming Attack 132 3.2.3.2 Spoofing Attack 133 3.3 Millimeter Wave Radar Security 133 3.3.1 Overview of Millimeter Wave Radar 133 3.3.2 Basic Principle of Millimeter Wave Radar 135 3.3.2.1 Ranging Principle 136 3.3.2.2 Velocity Measuring Principle 137 3.3.2.3 Target Recognition 138 3.3.3 Attack Technique Analysis of Millimeter Wave Radar 138 3.3.3.1 Jamming Attack 139 3.3.3.2 Spoofing Attack 139 3.3.3.3 Relay Attack 140 3.4 Hi-Definition Camera Security 140 3.4.1 Overview of Hi-Definition Camera 140 3.4.2 Basic Principle of Hi-Definition Camera 143 3.4.3 Attack Technique Analysis of Hi-Definition Camera 144 3.4.3.1 Blinding Attack 145 3.5 LiDAR Security 145 3.5.1 Overview of LiDAR 145 3.5.2 Basic Principle of LiDAR 147 3.5.3 Attack Technique Analysis of LiDAR 151 3.5.3.1 Relay Attack 151 3.5.3.2 Spoofing Attack 152 3.6 Experiments 152 3.6.1 Attack Experiment Against Ultrasonic Radar 152 3.6.1.1 Jamming Attack 153 3.6.1.2 Spoofing Attack 154 3.6.2 Attack Experiment Against Millimeter Wave Radar 155 3.6.2.1 Jamming Attack 155 3.6.3 Attack Experiment Against Hi-Definition Camera 157 3.6.3.1 Blinding Attack 157 3.6.4 Attack Experiment Against LiDAR 160 3.6.4.1 Relay Attack 160 3.6.4.2 Spoofing Attack 162 Bibliography 167 Index 169 About the Authors 171. 
504 |a Includes bibliographical references and index. 
590 |a Knovel  |b Knovel (All titles) 
650 0 |a Intelligent transportation systems  |x Security measures. 
655 7 |a elektronické knihy  |7 fd186907  |2 czenas 
655 9 |a electronic books  |2 eczenas 
700 1 |a Benslimane, Abderrahim,  |e author. 
856 4 0 |u https://proxy.k.utb.cz/login?url=https://app.knovel.com/hotlink/toc/id:kpICVS0002/intelligent-and-connected?kpromoter=marc  |y Full text