Skip navigation

A taxonomy and survey of cyber-physical intrusion detection approaches for vehicles

A taxonomy and survey of cyber-physical intrusion detection approaches for vehicles

Loukas, George, Karapistoli, Eirini, Panaousis, Emmanouil, Sarigiannidis, Panagiotis, Bezemskij, Anatolij and Vuong, Tuan (2018) A taxonomy and survey of cyber-physical intrusion detection approaches for vehicles. Ad Hoc Networks, 84. pp. 124-147. ISSN 1570-8705 (doi:https://doi.org/10.1016/j.adhoc.2018.10.002)

[img] PDF (Author Accepted Manuscript)
21803 LOUKAS_A_Taxonomy_and_Survey_of_Cyber-Physical_Intrusion_Detection_2018.pdf - Accepted Version
Restricted to Repository staff only until 3 October 2019.

Download (792kB) | Request a copy

Abstract

With the growing threat of cyber and cyber-physical attacks against automobiles, drones, ships, driverless pods and other vehicles, there is also a growing need for intrusion detection approaches that can facilitate defence against such threats. Vehicles tend to have limited processing resources and are energy-constrained. So, any security provision needs to abide by these limitations. At the same time, attacks against vehicles are very rare, often making knowledge-based intrusion detection systems less practical than behaviour-based ones, which is the reverse of what is seen in conventional computing systems. Furthermore, vehicle design and implementation can differ wildly between different types or different manufacturers, which can lead to intrusion detection designs that are vehicle-specific. Equally importantly, vehicles are practically defined by their ability to move, autonomously or not. Movement, as well as other physical manifestations of their operation may allow cyber security breaches to lead to physical damage, but can also be an opportunity for detection. For example, physical sensing can contribute to more accurate or more rapid intrusion detection through observation and analysis of physical manifestations of a security breach. This paper presents a classification and survey of intrusion detection systems designed and evaluated specifically on vehicles and networks of vehicles. Its aim is to help identify existing techniques that can be adopted in the industry, along with their advantages and disadvantages, as well as to identify gaps in the literature, which are attractive and highly meaningful areas of future research.

Item Type: Article
Uncontrolled Keywords: Cyber security, vehicles, Internet of Things, cyber-physical attacks, cyber-physical security
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Faculty / Department / Research Group: Faculty of Architecture, Computing & Humanities
Faculty of Architecture, Computing & Humanities > Internet of Things and Security (ISEC)
Faculty of Architecture, Computing & Humanities > Department of Computing & Information Systems
Last Modified: 08 Jan 2019 11:43
Selected for GREAT 2016: None
Selected for GREAT 2017: None
Selected for GREAT 2018: None
Selected for GREAT 2019: None
URI: http://gala.gre.ac.uk/id/eprint/21803

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year

View more statistics