Analysis of Threats and Countermeasures for Odomter Protection

被引:0
|
作者
Kim, Seil [1 ]
Cho, Aram [1 ]
Lee, Dong Hoon [2 ]
机构
[1] Hyundai Motor Grp, Elect Base Technol Dev Team, 150 Hyundaiyeonguso Ro, Hwaseong Si 18280, Gyeonggi Do, South Korea
[2] Korea Univ, Ctr Informat Secur Technol, Seoul 02841, South Korea
关键词
Odometer protection; Threat analysis; Cluster; CAN bus; SECURITY;
D O I
10.1007/s12239-020-0120-x
中图分类号
TH [机械、仪表工业];
学科分类号
0802 ;
摘要
In the used car market, mileage is one of the principal criteria used for evaluating the overall condition of a vehicle. For this reason, mileage fraud continues to occur. Futhermore, the number of malicious brokers who obtain a monetary advantage by manipulating vehicle mileage is increasing. As many used cars with manipulated mileage are sold each year, buyers have suffered significant monetary damages. Although the number of mileage fraud reports has remained steady, governments and OEMs have no technical countermeasures to prevent it, beyond asking used car buyers to pay careful attention when purchasing used cars. This paper classifies odometer system architectures according to the types of sensors and controllers used to measure and transmit vehicle speed, and defines the assets to be protected in a secured odometer. Based on this classification, we analyze potential security threats related to mileage fraud. Finally, we propose realistic security requirements to prevent mileage fraud, within a resource constrained automotive controller environment.
引用
收藏
页码:1271 / 1281
页数:11
相关论文
共 50 条
  • [1] Analysis of Threats and Countermeasures for Odomter Protection
    Seil Kim
    Aram Cho
    Dong Hoon Lee
    International Journal of Automotive Technology, 2020, 21 : 1271 - 1281
  • [2] THREATS AND COUNTERMEASURES
    ADAM, JA
    IEEE SPECTRUM, 1992, 29 (08) : 21 - 28
  • [3] Analysis of threats and countermeasures in NFV use cases
    Alwakeel, Ahmed M.
    Alnaim, Abdulrahman K.
    Fernandez, Eduardo B.
    2019 13TH ANNUAL IEEE INTERNATIONAL SYSTEMS CONFERENCE (SYSCON), 2019,
  • [4] Security threats and countermeasures in WLAN
    Nagamalai, D
    Dhinakaran, BC
    Sasikala, P
    Lee, SH
    Lee, JK
    TECHNOLOGIES FOR ADVANCED HETEROGENEOUS NETWORKS, PROCEEDINGS, 2005, 3837 : 168 - 182
  • [5] A Security Review in the UAVNet Era: Threats, Countermeasures, and Gap Analysis
    Rugo, Alessio
    Ardagna, Claudio A.
    Ioini, Nabil El
    ACM Computing Surveys, 2022, 55 (01):
  • [6] Modern Telephony Threats & Countermeasures
    Androulidakis, Iosif I.
    Christou, Vasileios P.
    Karametis, Alex S.
    Papanikolaou, Chris A.
    PROCEEDINGS OF THE 12TH WSEAS INTERNATIONAL CONFERENCE ON COMMUNICATIONS: NEW ASPECTS OF COMMUNICATIONS, 2008, : 106 - +
  • [7] A Security Review in the UAVNet Era: Threats, Countermeasures, and Gap Analysis
    Rugo, Alessio
    Ardagna, Claudio A.
    El Ioini, Nabil
    ACM COMPUTING SURVEYS, 2023, 55 (01)
  • [8] Israel in the Middle East: Threats and Countermeasures
    Spyer, Jonathan
    INTERNATIONAL RELATIONS, 2008, 22 (03) : 349 - 352
  • [9] Economic Security: New Threats and Countermeasures
    Tsiklauri, Viktoria
    Tkacheva, Elizabeth
    Piyaltsev, Alexander
    Ukrainceva, Irina
    EDUCATION EXCELLENCE AND INNOVATION MANAGEMENT: A 2025 VISION TO SUSTAIN ECONOMIC DEVELOPMENT DURING GLOBAL CHALLENGES, 2020, : 9528 - 9537
  • [10] Techniques and countermeasures for preventing insider threats
    Alsowail R.A.
    Al-Shehari T.
    PeerJ Computer Science, 2022, 8