Threat Analysis and Risk Assessment for Connected Vehicles: A Survey
With the rapid development of connected vehicles, people can get a better driving experience. However, the interconnection with the external network may bring growing accidents caused by cybersecurity vulnerabilities. As a result, automakers are paying more attention to cybersecurity and spending mo...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi-Wiley
2021-01-01
|
Series: | Security and Communication Networks |
Online Access: | http://dx.doi.org/10.1155/2021/1263820 |
id |
doaj-e2a621cfa1c64bc0890f9dff7017c131 |
---|---|
record_format |
Article |
spelling |
doaj-e2a621cfa1c64bc0890f9dff7017c1312021-10-04T01:58:16ZengHindawi-WileySecurity and Communication Networks1939-01222021-01-01202110.1155/2021/1263820Threat Analysis and Risk Assessment for Connected Vehicles: A SurveyFeng Luo0Yifan Jiang1Zhaojing Zhang2Yi Ren3Shuo Hou4School of Automotive StudiesSchool of Automotive StudiesSchool of Automotive StudiesSchool of Automotive StudiesSchool of Automotive StudiesWith the rapid development of connected vehicles, people can get a better driving experience. However, the interconnection with the external network may bring growing accidents caused by cybersecurity vulnerabilities. As a result, automakers are paying more attention to cybersecurity and spending more cost on developing cybersecurity defense mechanisms. Threat analysis and risk assessment (TARA) is an efficient method to ensure the defense effect and greatly save costs in the early stage of vehicle development. It analyzes the threat of vehicle systems and determines the hierarchical defense and corresponding mitigations according to the potential threat to the system. This paper gives an overview of threat analysis and risk assessment in the automotive field. First, a novel classification of different TARA methods has been proposed. The existing methods have been analyzed and compared. Then, we have found some commonly used tools applied to TARA and compared their performance. After that, a concept named attack-defense mapping is proposed to figure out how to map the already found threats and vulnerabilities of the system to the appropriate mitigations. At last, the future development directions of TARA in the automotive domain have been discussed.http://dx.doi.org/10.1155/2021/1263820 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Feng Luo Yifan Jiang Zhaojing Zhang Yi Ren Shuo Hou |
spellingShingle |
Feng Luo Yifan Jiang Zhaojing Zhang Yi Ren Shuo Hou Threat Analysis and Risk Assessment for Connected Vehicles: A Survey Security and Communication Networks |
author_facet |
Feng Luo Yifan Jiang Zhaojing Zhang Yi Ren Shuo Hou |
author_sort |
Feng Luo |
title |
Threat Analysis and Risk Assessment for Connected Vehicles: A Survey |
title_short |
Threat Analysis and Risk Assessment for Connected Vehicles: A Survey |
title_full |
Threat Analysis and Risk Assessment for Connected Vehicles: A Survey |
title_fullStr |
Threat Analysis and Risk Assessment for Connected Vehicles: A Survey |
title_full_unstemmed |
Threat Analysis and Risk Assessment for Connected Vehicles: A Survey |
title_sort |
threat analysis and risk assessment for connected vehicles: a survey |
publisher |
Hindawi-Wiley |
series |
Security and Communication Networks |
issn |
1939-0122 |
publishDate |
2021-01-01 |
description |
With the rapid development of connected vehicles, people can get a better driving experience. However, the interconnection with the external network may bring growing accidents caused by cybersecurity vulnerabilities. As a result, automakers are paying more attention to cybersecurity and spending more cost on developing cybersecurity defense mechanisms. Threat analysis and risk assessment (TARA) is an efficient method to ensure the defense effect and greatly save costs in the early stage of vehicle development. It analyzes the threat of vehicle systems and determines the hierarchical defense and corresponding mitigations according to the potential threat to the system. This paper gives an overview of threat analysis and risk assessment in the automotive field. First, a novel classification of different TARA methods has been proposed. The existing methods have been analyzed and compared. Then, we have found some commonly used tools applied to TARA and compared their performance. After that, a concept named attack-defense mapping is proposed to figure out how to map the already found threats and vulnerabilities of the system to the appropriate mitigations. At last, the future development directions of TARA in the automotive domain have been discussed. |
url |
http://dx.doi.org/10.1155/2021/1263820 |
work_keys_str_mv |
AT fengluo threatanalysisandriskassessmentforconnectedvehiclesasurvey AT yifanjiang threatanalysisandriskassessmentforconnectedvehiclesasurvey AT zhaojingzhang threatanalysisandriskassessmentforconnectedvehiclesasurvey AT yiren threatanalysisandriskassessmentforconnectedvehiclesasurvey AT shuohou threatanalysisandriskassessmentforconnectedvehiclesasurvey |
_version_ |
1716844778716397568 |