• Corpus ID: 55880898

Smart Cars and Information Security

@article{kolc2018SmartCA,
  title={Smart Cars and Information Security},
  author={Ga{\vs}per {\vS}kolc and Blaz Markelj},
  journal={Journal of Criminal Justice and Security},
  year={2018},
  pages={218-236}
}
Purpose: ‘Smart cars’ use a great variety of data in order to operate. They obtain this from the surrounding area using sensor technology and other available resources. The drivers and passengers of such vehicles transfer different data by connecting their mobile devices with smart-vehicle systems (and by using various apps). The purpose of this paper is to investigate the problem of user data security in smart cars and to provide an insight into the general knowledge regarding such issues held… 

Figures, Tables, and Topics from this paper

Security Weaknesses and Attacks on the Internet of Things Applications
TLDR
This paper summarizes and points to some attacks on the smart car, smart home, smart campus, smart farm and healthcare and the challenges of IoT in terms of hardware, network and software.
CYBERSECURITY IN SMART CARS
This paper covers the main concepts of smart cars – threats, security, privacy, and a base overview of the technology.
Preliminary Tendencies of Users’ Expectations about Privacy on Connected-Autonomous Vehicles
TLDR
This survey aimed to understand users’ expectations of privacy towards CAV’s most autonomous levels, part of users�’ satisfaction and CAV's usability, and implications for the design of CAV for future works.
Handbook of Computer Networks and Cyber Security: Principles and Paradigms
TLDR
This chapter describes key architectures pertaining to various applications of mobile cloud computing, and later, it discusses few security frameworks proposed for MCC in terms of handling privacy, security, and attacks.
Evaluation and defense of light commands attacks against voice controllable systems in smart cars
The in-car voice controllable system has become an almost standard feature in smart cars. Prior work shows that the voice controllable system is vulnerable to light commands attack which uses the

References

SHOWING 1-10 OF 30 REFERENCES
IoT Security Development Framework for building trustworthy Smart car services
TLDR
An IoT Security Development Framework (ISDF) is presented to build trustworthy and highly secure applications and services and it is shown how this framework can be used to develop highly secure and trustworthy VIMP services and how to apply the Anomaly Behavior Analysis methodology to secure and protect these services against any type of attacks.
Regulating the Internet of Things: First Steps Toward Managing Discrimination, Privacy, Security & Consent
The consumer “Internet of Things” is suddenly reality, not science fiction. Electronic sensors are now ubiquitous in our smart phones, cars, homes, electric systems, health care devices, fitness
Internet of Things
TLDR
The fields of application for IoT technologies are as numerous as they are diverse, as IoT solutions are increasingly extending to virtually all areas of everyday.
Property, Privacy, and Personal Data
Modern computing technologies and the Internet have generated the capacity to gather, manipulate, and share massive quantities of data; this capacity, in turn, has spawned a booming trade in personal
Automotive Security Best Practices
Recommendations for security and privacy in the era of the next-generation car.
Autonomous Vehicle Technology: A Guide for Policymakers
Autonomous vehicles may change the transportation landscape and policymakers must find the best course to maximize social benefits while minimizing drawbacks. This report weighs the potential
21st century automobiles: Vulnerabilities, threats, cyber security and digital forensics (Master’s thesis)
  • Utica: Faculty of Utica College.
  • 2017
Automotive industry trends: IoT connected smart cars & vehicles. Business Insider
  • Retrieved from http://www.businessinsider
  • 2016
Internetna študija poznavanja kibernetskih groženj in strahu pred kibernetsko kriminaliteto [Internet study of familiarity with cyber threats and fear of cybercrime
  • Revija za kriminalistiko in kriminologijo,
  • 2011
Introduction to smart vehicles
  • A. Eskandarian (Ed.), Handbook of smart vehicles (pp. 2–13). Washington: Center for Smart Systems Research in the George Washington University.
  • 2012
...
1
2
3
...