An Approach to using Honeypots in In-Vehicle Networks
Paper i proceeding, 2008

An emerging trend among automobile manufacturers is to introduce wireless technology in the vehicles. By allowing wireless communication, real-time information exchange between vehicles as well as between infrastructure and vehicles becomes a reality. This communication allows for road condition reporting, decision making, and remote diagnostics and firmware updates over-the-air, creating a complex critical infrastructure involving vehicles, road-side equipment, and firmware issuers. Allowing external parties wireless access to the vehicle creates a potential entry-point for cyber attacks. Since the safety of the driver depends on correct vehicle operation it is of utmost importance that the in-vehicle network is sufficiently protected against attacks. If we can learn the attackers' preferences, techniques, and weaknesses in existing systems, we can use this information to design security solutions for the in-vehicle network. In this paper, we present and discuss the use of honeypots as a means of collecting such attacker information. We show how to design a vehicle honeypot, how to gather data from attackers, and discuss how to process and analyze the gathered data. Furthermore, we provide a discussion where we highlight important issues related to using honeypots in vehicles.

Vehicle

wireless

attacks

honeypot

in-vehicle network

Författare

Vilhelm Verendel

Chalmers, Data- och informationsteknik, Datorteknik

Dennis Nilsson

Chalmers, Data- och informationsteknik, Datorteknik

Ulf Larson

Chalmers, Data- och informationsteknik, Datorteknik

Erland Jonsson

Chalmers, Data- och informationsteknik, Datorteknik

68th Semi-Annual IEEE Vehicular Technology, VTC 2008-Fall, Conference; Calgary, AB; Canada; 21 September 2008 through 24 September 2008

1550-2252 (ISSN)

Ämneskategorier

Datorteknik

DOI

10.1109/VETECF.2008.260

ISBN

9781424417223

Mer information

Skapat

2017-10-06