Revisiting attacker model for smart vehicles

@article{Petit2014RevisitingAM,
  title={Revisiting attacker model for smart vehicles},
  author={Jonathan Petit and Michael Feiri and Frank Kargl},
  journal={2014 IEEE 6th International Symposium on Wireless Vehicular Communications (WiVeC 2014)},
  year={2014},
  pages={1-5}
}
Because of the potential impact on user's life in cooperative automated safety applications, the security of Vehicle-to-X communication (V2X) is mandatory. However, the current attacker model used in literature is often too network-oriented, and it is unclear what realistic attacks could be. In this paper, we use the V2X data lifecycle to derive the attack surfaces. From this, we lay the foundations of a revisited attacker model, which details realistic attacks and identify appropriate… CONTINUE READING

From This Paper

Figures, tables, and topics from this paper.

References

Publications referenced by this paper.
Showing 1-10 of 17 references

ETSI TS 103 097 v1.1.1 - intelligent transport systems (ITS); security; security header and certificate formats

  • TC ITSETSI
  • Standard, TC ITS, 2013, http://www.etsi.org…
  • 2013
1 Excerpt

Verifying mobility data under privacy considerations in car-to-x communication

  • H. Stubing, A. Jaeger, C. Schmidt, S. A. Huss
  • 17th ITS World Congress, 2010.
  • 2010
1 Excerpt

Similar Papers

Loading similar papers…