Refine Your Search

Search Results

Viewing 1 to 2 of 2
Technical Paper

Vulnerability analysis of DoIP implementation based on model learning

2024-04-09
2024-01-2807
The software installed in Electronic Control Units (ECUs) has witnessed a significant scale expansion as the functionality of Intelligent Connected Vehicles (ICVs) has become more sophisticated. To seek convenient long-term functional maintenance, stakeholders want to access ECUs data or update software from anywhere via diagnostic. Accordingly, as one of the external interfaces, Diagnostics over Internet Protocol (DoIP) is inevitably prone to malicious attacks. It is essential to note that cybersecurity threats not only arise from inherent protocol defects but also consider software implementation vulnerabilities. When implementing a specification, developers have considerable freedom to decide how to proceed. Differences between protocol specifications and implementations are often unavoidable, which can result in security vulnerabilities and potential attacks exploiting them.
Technical Paper

A Trust Establishment Mechanism of VANETs based on Fuzzy Analytical Hierarchy Process (FAHP)

2022-03-29
2022-01-0142
As the connectivity of vehicles increases rapidly, more vehicles have the capability to communicate with each other. Because Vehicular Ad-hoc NETworks (VANETs) have the characteristics of solid mobility and decentralization, traditional security strategies such as authentication, firewall, and access control are difficult to play an influential role. As a soft security method, trust management can ensure the security attributes of VANETs. However, the rapid growth of newly encountered nodes of the trust management system also increases the requirements for trust establishing mechanisms. Without a proper trust establishment mechanism, the trust value of the newly encountered nodes will deviate significantly from its actual performance, and the trust management system will suffer from newcomer attacks.
X