𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Intelligent and Connected Vehicle Security

✍ Scribed by Jiajia Liu


Year
2021
Tongue
English
Leaves
198
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Table of Contents


Front Cover
Intelligent and Connected Vehicle Security
Contents
Preface
List of Figures
List of Tables
List of Abbreviations
1 Vehicle Bus Security
1.1 Vehicle Bus
1.1.1 Overview of Vehicle Bus
1.1.2 Categories of Vehicle Bus
1.1.2.1 LIN Bus
1.1.2.2 CAN Bus
1.1.2.3 FlexRay Bus
1.1.2.4 MOST Bus
1.1.2.5 Automotive Ethernet Bus
1.1.3 Threat Analysis of Vehicle Bus
1.2 CAN Bus Vulnerability and Analysis
1.2.1 CAN Bus Architecture
1.2.2 On-Board CAN Bus Access
1.2.3 Reverse CAN Bus Communication
1.2.4 Analysis of CAN Message Data
1.2.5 Fuzz Testing of CAN Bus
1.3 Analysis of OBD-II Interface Attack Technology
1.3.1 Overview of OBD-II
1.3.2 Attack Technique Analysis of OBD Box
1.3.2.1 Attack Surface Analysis
1.3.2.2 Attack Process Analysis
1.3.2.3 Invade Car CAN Bus
1.4 Attack Experiment Against Vehicle Bus
1.4.1 Control of the Display of Vehicle Dashboard
1.4.2 Vehicle Status Tampering via Body Control Module
1.4.2.1 Control the Door Lock Switch
1.4.2.2 Car Lights and Wiper Attacks
1.4.3 CAN Bus Overload via Flood Attack
1.5 Experiment of Driving Behaviour Analysis
1.5.1 A Novel Scheme About Driving Behaviour Extraction
1.5.1.1 Extraction and Processing of Driving Data
1.5.1.2 Grade Regulation and Label Design
1.5.1.3 Establishment of MTL Network
1.5.2 Experimental and Numerical Results
1.5.2.1 Volunteer Recruitment and Experiment Route
1.5.2.2 Illegal Driver Detection Results
1.5.2.3 Legal Driver Identification Results
1.5.2.4 Driving Behaviour Evaluation Results
2 Intra-Vehicle Communication Security
2.1 Basic Introduction to Intra-Vehicle Communication
2.1.1 Overview of Intra-Vehicle Communication
2.1.2 Module Threat Analysis
2.1.2.1 Threat Analysis of Keyless Entry
2.1.2.2 Threat Analysis of TPMS
2.1.2.3 Threat Analysis of Wi-Fi
2.1.2.4 Threat Analysis of Bluetooth
2.1.2.5 Threat Analysis of FM
2.1.2.6 Threat Analysis of GPS
2.2 RKE/PKE Security
2.2.1 Overview of RKE
2.2.2 Overview of PKE
2.2.3 Attack Technique Analysis of RKE/PKE
2.2.3.1 Security Technology of RKE/PKE System
2.2.3.2 Summary of Common Attacks of RKE/PKE System
2.3 TPMS Security
2.3.1 Overview of TPMS
2.3.2 Attack Technique Analysis of TPMS
2.4 On-Board Wi-Fi Security
2.4.1 Overview of On-Board Wi-Fi
2.4.2 Attack Technique Analysis of On-Board Wi-Fi
2.4.2.1 WEP Protocol
2.4.2.2 WPA/WPA2 Protocol
2.4.2.3 WPA3 Protocol
2.5 On-Board Bluetooth Security
2.5.1 Overview of On-Board Bluetooth
2.5.2 Attack Technique Analysis of On-Board Bluetooth
2.5.2.1 Status of Bluetooth Security Mechanism
2.6 FM Security
2.6.1 Overview of Radio
2.6.2 Attack Technique Analysis of FM
2.6.2.1 Introduction of FM Radio
2.6.2.2 Attack Process of FM Radio
2.7 GPS Security
2.7.1 Overview of GPS
2.7.2 Attack Technique Analysis of GPS
2.8 Experiments
2.8.1 Attack Experiment Against RKE
2.8.1.1 Experimental Environment
2.8.1.2 Experimental Method
2.8.2 Attack Experiment Against TSP
2.8.2.1 TSP Attack Process
2.8.2.2 Experimental Results of TSP Attack
2.8.3 Attack Experiment Against TPMS
2.8.3.1 Structure of TPMS
2.8.3.2 Reverse Engineering TPMS Communication Protocols
2.8.4 Attack Experiment Against Vehicle Bluetooth via BlueBorne Vulnerability
2.8.4.1 What is BlueBorne?
2.8.4.2 Process of BlueBorne
2.8.5 Attack Experiment Against Road Navigation System
2.8.5.1 Goals of Road Navigation System
2.8.5.2 Detailed Attacking Process
2.8.5.3 Experiments and Results
3 Unmanned Driving Security and Navigation Deception
3.1 Basic Introduction to Unmanned Driving
3.1.1 What is an Unmanned Vehicle?
3.1.2 Core Functional Modules of Unmanned Driving
3.1.2.1 Perception
3.1.2.2 Planning
3.1.2.3 Control
3.2 Ultrasonic Radar Security
3.2.1 Overview of Ultrasonic Radar
3.2.2 Basic Principle of Ultrasonic Radar
3.2.3 Attack Technique Analysis of Ultrasonic Radar
3.2.3.1 Jamming Attack
3.2.3.2 Spoofing Attack
3.3 Millimeter Wave Radar Security
3.3.1 Overview of Millimeter Wave Radar
3.3.2 Basic Principle of Millimeter Wave Radar
3.3.2.1 Ranging Principle
3.3.2.2 Velocity Measuring Principle
3.3.2.3 Target Recognition
3.3.3 Attack Technique Analysis of Millimeter Wave Radar
3.3.3.1 Jamming Attack
3.3.3.2 Spoofing Attack
3.3.3.3 Relay Attack
3.4 Hi-Definition Camera Security
3.4.1 Overview of Hi-Definition Camera
3.4.2 Basic Principle of Hi-Definition Camera
3.4.3 Attack Technique Analysis of Hi-Definition Camera
3.4.3.1 Blinding Attack
3.5 LiDAR Security
3.5.1 Overview of LiDAR
3.5.2 Basic Principle of LiDAR
3.5.3 Attack Technique Analysis of LiDAR
3.5.3.1 Relay Attack
3.5.3.2 Spoofing Attack
3.6 Experiments
3.6.1 Attack Experiment Against Ultrasonic Radar
3.6.1.1 Jamming Attack
3.6.1.2 Spoofing Attack
3.6.2 Attack Experiment Against Millimeter Wave Radar
3.6.2.1 Jamming Attack
3.6.3 Attack Experiment Against Hi-Definition Camera
3.6.3.1 Blinding Attack
3.6.4 Attack Experiment Against LiDAR
3.6.4.1 Relay Attack
3.6.4.2 Spoofing Attack
Bibliography
Index
About the Authors
Back Cover


πŸ“œ SIMILAR VOLUMES


Intelligent and Connected Vehicle Securi
✍ Jiajia Liu (editor), Abderrahim Benslimane (editor) πŸ“‚ Library πŸ“… 2021 πŸ› River Publishers 🌐 English

<p>Intelligent and Connected Vehicles (ICVs) are moving into the mainstream of the worldwide automotive industry. A lot of advanced technologies, like artificial intelligence, big data, millimeter wave radar, LiDAR and high-definition camera based real-time environmental perception, etc., are increa

Connected Vehicles: Intelligent Transpor
✍ Radovan Miucic πŸ“‚ Library πŸ“… 2018 πŸ› Springer 🌐 English

This book introduces concepts and technologies of Intelligent Transportation Systems (ITS). It describes state of the art safety communication protocol called Dedicated Short Range Communication (DSRC), currently being considered for adoption by the USDOT and automotive industry in the US. However,

Emerging Technologies for Connected Inte
✍ Mohamed Elhoseny, Aboul Ella Hassanien πŸ“‚ Library πŸ“… 2020 πŸ› Springer International Publishing 🌐 English

<p><p>This book discusses vehicular communication systems, IoT, intelligent transportation systems and the Internet of Vehicles, and also introduces destination marketing in a structured manner. It is primarily intended for research students interested in emerging technologies for connected Internet

Handbook of Human Factors for Automated,
✍ Donald L. Fisher (Editor); William J. Horrey (Editor); John D. Lee (Editor); Mic πŸ“‚ Library πŸ“… 2020 πŸ› CRC Press

<p><em><strong>Handbook of Human Factors for Automated, Connected, and Intelligent Vehicles</strong></em></p><p><p><em><strong>Subject Guide: Ergonomics & Human Factors</strong></em> </p><p><p>Automobile crashes are the seventh leading cause of death worldwide, resulting in over 1.25 million deaths

The Intelligent Environment Friendly Veh
✍ Keqiang Li, Mingyuan Bian, Yugong Luo, Jianqiang Wang πŸ“‚ Library πŸ“… 2023 πŸ› Springer-CMP 🌐 English

<span>This book elaborates the fundamentals,Β new conceptsΒ and key technologies of the Intelligent Environment Friendly Vehicle (i-EFV), and theΒ engineering implementation of these technologies such as structure sharing, data fusion and control coordination. With lots of illustrations, it summaries t

Intelligent Control of Connected Plug-in
✍ Amir Taghavipour, Mahyar Vajedi, Nasser L. Azad πŸ“‚ Library πŸ“… 2019 πŸ› Springer International Publishing 🌐 English

<p><i>Intelligent Control of Connected Plug-in Hybrid Electric Vehicles </i>presents the development of real-time intelligent control systems for plug-in hybrid electric vehicles, which involves control-oriented modelling, controller design, and performance evaluation. The controllers outlined in th