A Survey of Intrusion Detection for In-Vehicle Networks
Top Cited Papers
- 11 April 2019
- journal article
- research article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Intelligent Transportation Systems
- Vol. 21 (3), 919-933
- https://doi.org/10.1109/tits.2019.2908074
Abstract
The development of the complexity and connectivity of modern automobiles has caused a massive rise in the security risks of in-vehicle networks (IVNs). Nevertheless, existing IVN designs (e.g., controller area network) lack cybersecurity consideration. Intrusion detection, an effective method for defending against cyberattacks on IVNs while providing functional safety and real-time communication guarantees, aims to address this issue. Therefore, the necessity of its research has risen. In this paper, an IVN environment is introduced, and the constraints and characteristics of an intrusion detection system (IDS) design for IVNs are presented. A survey of the proposed IDS designs for the IVNs is conducted, and the corresponding drawbacks are highlighted. Various optimization objectives are considered and comprehensively compared. Lastly, the trend, open issues, and emerging research directions are described.Keywords
Funding Information
- National Key Research and Development Plan of China (2016YFB0200405)
- National Natural Science Foundation of China (61702172, 61672217, 61502405, 61370097, 61502162)
- Natural Science Foundation of Hunan Province (2018JJ3076, 2018JJ2063)
- China Postdoctoral Science Foundation (2016M592422)
- CCF-NSFOCUS Open Research Fund (CCF-NSFOCUS2018009)
- Fundamental Research Funds for the Central Universities
This publication has 58 references indexed in Scilit:
- Design Optimization of Mixed-Criticality Real-Time Embedded SystemsACM Transactions on Embedded Computing Systems, 2015
- CPS approach to checking norm operation of a brake-by-wire systemPublished by Association for Computing Machinery (ACM) ,2015
- Potential Cyberattacks on Automated VehiclesIEEE Transactions on Intelligent Transportation Systems, 2014
- A Practical Wireless Attack on the Connected Car and Security Protocol for In-Vehicle CANIEEE Transactions on Intelligent Transportation Systems, 2014
- A survey of intrusion detection techniques for cyber-physical systemsACM Computing Surveys, 2014
- Automotive Ethernet: In-vehicle Networking and Smart MobilityPublished by EDAA ,2013
- Security threats to automotive CAN networks—Practical examples and selected short-term countermeasuresReliability Engineering & System Safety, 2011
- Design and Implementation of High Interaction Client Honeypot for Drive-by-Download AttacksIEICE Transactions on Communications, 2010
- Controller Area Network (CAN) schedulability analysis: Refuted, revisited and revisedReal-Time Systems, 2007
- State of the Art: Embedding Security in VehiclesEURASIP Journal on Embedded Systems, 2007