Intelligent and connected vehicle security /
Intelligent and Connected Vehicles (ICVs) are moving into the mainstream of the worldwide automotive industry. A lot of advanced technologies, like artificial intelligence, big data, millimeter wave radar, LiDAR and high-definition camera based real-time environmental perception, etc., are increasin...
Clasificación: | Libro Electrónico |
---|---|
Autores principales: | , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
[United States] :
River Publishers,
[2021]
|
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Preface xi List of Figures xiii List of Tables xix List of Abbreviations xxi 1 Vehicle Bus Security 1 1.1 Vehicle Bus 1 1.1.1 Overview of Vehicle Bus 1 1.1.2 Categories of Vehicle Bus 2 1.1.2.1 LIN Bus 3 1.1.2.2 CAN Bus 5 1.1.2.3 FlexRay Bus 8 1.1.2.4 MOST Bus 9 1.1.2.5 Automotive Ethernet Bus 11 1.1.3 Threat Analysis of Vehicle Bus 12 1.2 CAN Bus Vulnerability and Analysis 13 1.2.1 CAN Bus Architecture 13 1.2.2 On-Board CAN Bus Access 17 1.2.3 Reverse CAN Bus Communication 19 1.2.4 Analysis of CAN Message Data 21 1.2.5 Fuzz Testing of CAN Bus 22 1.3 Analysis of OBD-II Interface Attack Technology 24 1.3.1 Overview of OBD-II 24 1.3.2 Attack Technique Analysis of OBD Box 26 1.3.2.1 Attack Surface Analysis 27 1.3.2.2 Attack Process Analysis 29 1.3.2.3 Invade Car CAN Bus 35 1.4 Attack Experiment Against Vehicle Bus 35 1.4.1 Control of the Display of Vehicle Dashboard 36 1.4.2 Vehicle Status Tampering via Body Control Module 39 1.4.2.1 Control the Door Lock Switch 40 1.4.2.2 Car Lights and Wiper Attacks 41 1.4.3 CAN Bus Overload via Flood Attack 42 1.5 Experiment of Driving Behaviour Analysis 43 1.5.1 A Novel Scheme About Driving Behaviour Extraction 43 1.5.1.1 Extraction and Processing of Driving Data 44 1.5.1.2 Grade Regulation and Label Design 45 1.5.1.3 Establishment of MTL Network 46 1.5.2 Experimental and Numerical Results 47 1.5.2.1 Volunteer Recruitment and Experiment Route 47 1.5.2.2 Illegal Driver Detection Results 47 1.5.2.3 Legal Driver Identification Results 49 1.5.2.4 Driving Behaviour Evaluation Results 49 2 Intra-Vehicle Communication Security 53 2.1 Basic Introduction to Intra-Vehicle Communication 53 2.1.1 Overview of Intra-Vehicle Communication 53 2.1.2 Module Threat Analysis 54 2.1.2.1 Threat Analysis of Keyless Entry 54 2.1.2.2 Threat Analysis of TPMS 54 2.1.2.3 Threat Analysis of Wi-Fi 55 2.1.2.4 Threat Analysis of Bluetooth 55 2.1.2.5 Threat Analysis of FM 57 2.1.2.6 Threat Analysis of GPS 57 2.2 RKE/PKE Security 58 2.2.1 Overview of RKE 58 2.2.2 Overview of PKE 60 2.2.3 Attack Technique Analysis of RKE/PKE 62 2.2.3.1 Security Technology of RKE/PKE System 62 2.2.3.2 Summary of Common Attacks of RKE/PKE System 64 2.3 TPMS Security 66 2.3.1 Overview of TPMS 66 2.3.2 Attack Technique Analysis of TPMS 70 2.4 On-Board Wi-Fi Security 72 2.4.1 Overview of On-Board Wi-Fi 72 2.4.2 Attack Technique Analysis of On-Board Wi-Fi 74 2.4.2.1 WEP Protocol 74 2.4.2.2 WPA/WPA2 Protocol 76 2.4.2.3 WPA3 Protocol 81 2.5 On-Board Bluetooth Security 82 2.5.1 Overview of On-Board Bluetooth 82 2.5.2 Attack Technique Analysis of On-Board Bluetooth 84 2.5.2.1 Status of Bluetooth Security Mechanism 86 2.6 FM Security 91 2.6.1 Overview of Radio 91 2.6.2 Attack Technique Analysis of FM 93 2.6.2.1 Introduction of FM Radio 94 2.6.2.2 Attack Process of FM Radio 94 2.7 GPS Security 96 2.7.1 Overview of GPS 96 2.7.2 Attack Technique Analysis of GPS 99 2.8 Experiments 101 2.8.1 Attack Experiment Against RKE 101 2.8.1.1 Experimental Environment 101 2.8.1.2 Experimental Method 102 2.8.2 Attack Experiment Against TSP 103 2.8.2.1 TSP Attack Process 104 2.8.2.2 Experimental Results of TSP Attack 105 2.8.3 Attack Experiment Against TPMS 106 2.8.3.1 Structure of TPMS 107 2.8.3.2 Reverse Engineering TPMS Communication Protocols 108 2.8.4 Attack Experiment Against Vehicle Bluetooth via BlueBorne Vulnerability 109 2.8.4.1 What is BlueBorne? 110 2.8.4.2 Process of BlueBorne 111 2.8.5 Attack Experiment Against Road Navigation System 111 2.8.5.1 Goals of Road Navigation System 112 2.8.5.2 Detailed Attacking Process 113 2.8.5.3 Experiments and Results 114 3 Unmanned Driving Security and Navigation Deception 117 3.1 Basic Introduction to Unmanned Driving 117 3.1.1 What is an Unmanned Vehicle? 117 3.1.2 Core Functional Modules of Unmanned Driving 118 3.1.2.1 Perception 119 3.1.2.2 Planning 121 3.1.2.3 Control 123 3.2 Ultrasonic Radar Security 126 3.2.1 Overview of Ultrasonic Radar 126 3.2.2 Basic Principle of Ultrasonic Radar 130 3.2.3 Attack Technique Analysis of Ultrasonic Radar 131 3.2.3.1 Jamming Attack 132 3.2.3.2 Spoofing Attack 133 3.3 Millimeter Wave Radar Security 133 3.3.1 Overview of Millimeter Wave Radar 133 3.3.2 Basic Principle of Millimeter Wave Radar 135 3.3.2.1 Ranging Principle 136 3.3.2.2 Velocity Measuring Principle 137 3.3.2.3 Target Recognition 138 3.3.3 Attack Technique Analysis of Millimeter Wave Radar 138 3.3.3.1 Jamming Attack 139 3.3.3.2 Spoofing Attack 139 3.3.3.3 Relay Attack 140 3.4 Hi-Definition Camera Security 140 3.4.1 Overview of Hi-Definition Camera 140 3.4.2 Basic Principle of Hi-Definition Camera 143 3.4.3 Attack Technique Analysis of Hi-Definition Camera 144 3.4.3.1 Blinding Attack 145 3.5 LiDAR Security 145 3.5.1 Overview of LiDAR 145 3.5.2 Basic Principle of LiDAR 147 3.5.3 Attack Technique Analysis of LiDAR 151 3.5.3.1 Relay Attack 151 3.5.3.2 Spoofing Attack 152 3.6 Experiments 152 3.6.1 Attack Experiment Against Ultrasonic Radar 152 3.6.1.1 Jamming Attack 153 3.6.1.2 Spoofing Attack 154 3.6.2 Attack Experiment Against Millimeter Wave Radar 155 3.6.2.1 Jamming Attack 155 3.6.3 Attack Experiment Against Hi-Definition Camera 157 3.6.3.1 Blinding Attack 157 3.6.4 Attack Experiment Against LiDAR 160 3.6.4.1 Relay Attack 160 3.6.4.2 Spoofing Attack 162 Bibliography 167 Index 169 About the Authors 171.