Threat Analysis and Risk Assessment for Connected Vehicles: A Survey

With the rapid development of connected vehicles, people can get a better driving experience. However, the interconnection with the external network may bring growing accidents caused by cybersecurity vulnerabilities. As a result, automakers are paying more attention to cybersecurity and spending mo...

Full description

Bibliographic Details
Main Authors: Feng Luo, Yifan Jiang, Zhaojing Zhang, Yi Ren, Shuo Hou
Format: Article
Language:English
Published: Hindawi-Wiley 2021-01-01
Series:Security and Communication Networks
Online Access:http://dx.doi.org/10.1155/2021/1263820
id doaj-e2a621cfa1c64bc0890f9dff7017c131
record_format Article
spelling doaj-e2a621cfa1c64bc0890f9dff7017c1312021-10-04T01:58:16ZengHindawi-WileySecurity and Communication Networks1939-01222021-01-01202110.1155/2021/1263820Threat Analysis and Risk Assessment for Connected Vehicles: A SurveyFeng Luo0Yifan Jiang1Zhaojing Zhang2Yi Ren3Shuo Hou4School of Automotive StudiesSchool of Automotive StudiesSchool of Automotive StudiesSchool of Automotive StudiesSchool of Automotive StudiesWith the rapid development of connected vehicles, people can get a better driving experience. However, the interconnection with the external network may bring growing accidents caused by cybersecurity vulnerabilities. As a result, automakers are paying more attention to cybersecurity and spending more cost on developing cybersecurity defense mechanisms. Threat analysis and risk assessment (TARA) is an efficient method to ensure the defense effect and greatly save costs in the early stage of vehicle development. It analyzes the threat of vehicle systems and determines the hierarchical defense and corresponding mitigations according to the potential threat to the system. This paper gives an overview of threat analysis and risk assessment in the automotive field. First, a novel classification of different TARA methods has been proposed. The existing methods have been analyzed and compared. Then, we have found some commonly used tools applied to TARA and compared their performance. After that, a concept named attack-defense mapping is proposed to figure out how to map the already found threats and vulnerabilities of the system to the appropriate mitigations. At last, the future development directions of TARA in the automotive domain have been discussed.http://dx.doi.org/10.1155/2021/1263820
collection DOAJ
language English
format Article
sources DOAJ
author Feng Luo
Yifan Jiang
Zhaojing Zhang
Yi Ren
Shuo Hou
spellingShingle Feng Luo
Yifan Jiang
Zhaojing Zhang
Yi Ren
Shuo Hou
Threat Analysis and Risk Assessment for Connected Vehicles: A Survey
Security and Communication Networks
author_facet Feng Luo
Yifan Jiang
Zhaojing Zhang
Yi Ren
Shuo Hou
author_sort Feng Luo
title Threat Analysis and Risk Assessment for Connected Vehicles: A Survey
title_short Threat Analysis and Risk Assessment for Connected Vehicles: A Survey
title_full Threat Analysis and Risk Assessment for Connected Vehicles: A Survey
title_fullStr Threat Analysis and Risk Assessment for Connected Vehicles: A Survey
title_full_unstemmed Threat Analysis and Risk Assessment for Connected Vehicles: A Survey
title_sort threat analysis and risk assessment for connected vehicles: a survey
publisher Hindawi-Wiley
series Security and Communication Networks
issn 1939-0122
publishDate 2021-01-01
description With the rapid development of connected vehicles, people can get a better driving experience. However, the interconnection with the external network may bring growing accidents caused by cybersecurity vulnerabilities. As a result, automakers are paying more attention to cybersecurity and spending more cost on developing cybersecurity defense mechanisms. Threat analysis and risk assessment (TARA) is an efficient method to ensure the defense effect and greatly save costs in the early stage of vehicle development. It analyzes the threat of vehicle systems and determines the hierarchical defense and corresponding mitigations according to the potential threat to the system. This paper gives an overview of threat analysis and risk assessment in the automotive field. First, a novel classification of different TARA methods has been proposed. The existing methods have been analyzed and compared. Then, we have found some commonly used tools applied to TARA and compared their performance. After that, a concept named attack-defense mapping is proposed to figure out how to map the already found threats and vulnerabilities of the system to the appropriate mitigations. At last, the future development directions of TARA in the automotive domain have been discussed.
url http://dx.doi.org/10.1155/2021/1263820
work_keys_str_mv AT fengluo threatanalysisandriskassessmentforconnectedvehiclesasurvey
AT yifanjiang threatanalysisandriskassessmentforconnectedvehiclesasurvey
AT zhaojingzhang threatanalysisandriskassessmentforconnectedvehiclesasurvey
AT yiren threatanalysisandriskassessmentforconnectedvehiclesasurvey
AT shuohou threatanalysisandriskassessmentforconnectedvehiclesasurvey
_version_ 1716844778716397568