This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Abbas, Q. E. and Sung-Bong, J. 2019. A survey of blockchain and its applications. International Conference on Artificial Intelligence in Information and Communication, 001–003.AbbasQ. E. and Sung-BongJ.2019A survey of blockchain and its applicationsInternational Conference on Artificial Intelligence in Information and Communication001–003Search in Google Scholar
Ashibani, Y. and Mahmoud, Q. H. 2017. Cyber physical systems security: analysis, challenges and solutions. Computers and Security 68: 81–97.AshibaniY. and MahmoudQ. H.2017Cyber physical systems security: analysis, challenges and solutionsComputers and Security6881–9710.1016/j.cose.2017.04.005Search in Google Scholar
Aust, S. 2018. Software downloads in trusted zones with wake-up sensors for connected vehicles. IEEE Vehicular Technology Conference, 1–5.AustS.2018Software downloads in trusted zones with wake-up sensors for connected vehiclesIEEE Vehicular Technology Conference1–5Search in Google Scholar
Avizienis, A., Laprie, J.-., Randell, B. and Landwehr, C. 2004. Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing 11: 11–33.AvizienisA.LaprieJ.-.RandellB. and LandwehrC.2004Basic concepts and taxonomy of dependable and secure computingIEEE Transactions on Dependable and Secure Computing1111–3310.1109/TDSC.2004.2Search in Google Scholar
Cebe, M., Erdin, E., Akkaya, K., Aksu, H. and Uluagac, S. 2018. Block4Forensic: an integrated lightweight blockchain framework for forensics applications of connected vehicles. IEEE Communications Magazine 5610: 50–57.CebeM.ErdinE.AkkayaK.AksuH. and UluagacS.2018Block4Forensic: an integrated lightweight blockchain framework for forensics applications of connected vehiclesIEEE Communications Magazine561050–5710.1109/MCOM.2018.1800137Search in Google Scholar
Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S., Koscher, K., Czeskis, A., Roesner, F. and Kohno, T. 2011. Comprehensive experimental analyses of automotive attack surfaces. In Proceedings of USENIX Security Symposium, 77–92.CheckowayS.McCoyD.KantorB.AndersonD.ShachamH.SavageS.KoscherK.CzeskisA.RoesnerF. and KohnoT.2011Comprehensive experimental analyses of automotive attack surfacesIn Proceedings of USENIX Security Symposium77–92Search in Google Scholar
Dhakal, S., Jaafar, F. and Zavarsky, P. 2019. Private blockchain network for IoT device firmware integrity verification and update. IEEE International Symposium on High Assurance Systems Engineering, 164–170.DhakalS.JaafarF. and ZavarskyP.2019Private blockchain network for IoT device firmware integrity verification and updateIEEE International Symposium on High Assurance Systems Engineering164–170Search in Google Scholar
Doddapaneni, K., Lakkundi, R., Rao, S., Kulkarni, S. G. and Bhat, B. 2017. Secure FoTA object for IoT. IEEE Conference on Local Computer Networks Workshops, 154–159.DoddapaneniK.LakkundiR.RaoS.KulkarniS. G. and BhatB.2017Secure FoTA object for IoTIEEE Conference on Local Computer Networks Workshops154–159Search in Google Scholar
Fongen, A. 2012. Identity management and integrity protection in the internet of things. International Conference on Emerging Security Technologies, Lisbon, Portugal, September 5-7.FongenA.2012Identity management and integrity protection in the internet of thingsInternational Conference on Emerging Security Technologies, Lisbon, Portugal, September 5-7Search in Google Scholar
Ford. Available at: www.ford.com.ph/engineering/sync/FordAvailable at:https://www.ford.com.ph/engineering/sync/Search in Google Scholar
Fraga-Lamas, P. and Fernández-Caramés, T. M. 2019. A review on blockchain technologies for an advanced and cyber-resilient automotive industry. IEEE Access 7: 17578–17598.Fraga-LamasP. and Fernández-CaramésT. M.2019A review on blockchain technologies for an advanced and cyber-resilient automotive industryIEEE Access717578–1759810.1109/ACCESS.2019.2895302Search in Google Scholar
Gao, W., Hatcher, W. G. and Yu, W. 2018. A survey of blockchain: techniques, applications, and challenges. International Conference on Computer Communication and Networks, 1–11.GaoW.HatcherW. G. and YuW.2018A survey of blockchain: techniques, applications, and challengesInternational Conference on Computer Communication and Networks1–11Search in Google Scholar
Halder, S., Ghosal, A. and Conti, M. 2019. Secure OTA software updates in connected vehicles: a survey. ArXiv, available at: https://arxiv.org/abs/1904.00685HalderS.GhosalA. and ContiM.2019Secure OTA software updates in connected vehicles: a surveyArXiv, available at:https://arxiv.org/abs/1904.0068510.1016/j.comnet.2020.107343Search in Google Scholar
Idrees, M. S., Schweppe, H., Roudier, Y., Wolf, M., Scheuermann, D. and Henniger, O. 2011. Secure automotive on-board protocols: a case of over-the-air firmware updates. Lecture Notes in Computer Science 6596: 224–238.IdreesM. S.SchweppeH.RoudierY.WolfM.ScheuermannD. and HennigerO.2011Secure automotive on-board protocols: a case of over-the-air firmware updatesLecture Notes in Computer Science6596:224–23810.1007/978-3-642-19786-4_20Search in Google Scholar
Jo, H. J., Choi, W., Na, S. Y., Woo, S. and Lee, D. H. 2017. Vulnerabilities of android OS-based telematics system. Wireless Personal Communications 924: 1511–1530.JoH. J.ChoiW.NaS. Y.WooS. and LeeD. H.2017Vulnerabilities of android OS-based telematics systemWireless Personal Communications9241511–153010.1007/s11277-016-3618-9Search in Google Scholar
Khodari, M., Rawat, A., Asplund, M. and Gurtov, A. 2019. Decentralized firmware attestation for in-vehicle networks. In Proceedings of the 5th on Cyber-Physical System Security Workshop–CPSS ‘19, Auckland, New Zealand, July 8.KhodariM.RawatA.AsplundM. and GurtovA.2019.Decentralized firmware attestation for in-vehicle networksIn Proceedings of the 5th on Cyber-Physical System Security Workshop–CPSS ‘19, Auckland, New Zealand, July 8Search in Google Scholar
Khurram, M., Kumar, H., Chandak, A., Sarwade, V., Arora, N. and Quach, T. 2016. Enhancing connected car adoption: security and over the air update framework. IEEE World Forum on Internet of Things, Reston, VA, December 12-14, pp. 194–198, available at: https://ieeexplore.ieee.org/document/7845430KhurramM.KumarH.ChandakA.SarwadeV.AroraN. and QuachT.2016Enhancing connected car adoption: security and over the air update frameworkIEEE World Forum on Internet of Things, Reston, VA, December 12-14,pp.194–198available athttps://ieeexplore.ieee.org/document/784543010.1109/WF-IoT.2016.7845430Search in Google Scholar
Knockel, J. and Crandall, J. R. 2012. Protecting free and open communications on the internet against man-in-the-middle attacks on third-party software: we’re FOCI’d. USENIX Workshop on Free and Open Communications on the Internet, Bellevue, WA, August 6.KnockelJ. and CrandallJ. R.2012Protecting free and open communications on the internet against man-in-the-middle attacks on third-party software: we’re FOCI’dUSENIX Workshop on Free and Open Communications on the Internet, Bellevue, WA, August 6Search in Google Scholar
Kong, H., Kim, T. and Hong, M. 2016. A security risk assessment framework for smart car. International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 102–108.KongH.KimT. and HongM.2016A security risk assessment framework for smart carInternational Conference on Innovative Mobile and Internet Services in Ubiquitous Computing102–108Search in Google Scholar
Kuppusamy, T. K., DeLong, L. A. and Cappos, J. 2018. Uptane: security and customizability of software updates for vehicles. IEEE Vehicular Technology Magazine 131: 66–73.KuppusamyT. K.DeLongL. A. and CapposJ.2018Uptane: security and customizability of software updates for vehiclesIEEE Vehicular Technology Magazine13166–7310.1109/MVT.2017.2778751Search in Google Scholar
Kuppusamy, T. K., Torres-Arias, S., Diaz, V. and Cappos, J. 2016. Diplomat: using delegations to protect community repositories. USENIX Symposium on Networked Systems Design and Implementation, 567–581.KuppusamyT. K.Torres-AriasS.DiazV. and CapposJ.2016Diplomat: using delegations to protect community repositoriesUSENIX Symposium on Networked Systems Design and Implementation567–581Search in Google Scholar
Kuppusamy, T. K., Brown, A., Awwad, S., McCoy, D., Bielawski, R., Mott, C., Lauzon, A., Weimerskirch, S. and Cappos, J. 2016. Uptane: securing software updates for automobiles. In Proceedings of International Conference on Embedded Security in Car Europe, 1–11.KuppusamyT. K.BrownA.AwwadS.McCoyD.BielawskiR.MottC.LauzonA.WeimerskirchS. and CapposJ.2016Uptane: securing software updates for automobilesIn Proceedings of International Conference on Embedded Security in Car Europe1–11Search in Google Scholar
Le, V. H., Hartog, J. D. and Zannone, N. 2018. Security and privacy for innovative automotive applications a survey. Computer Communications 132: 17–41.LeV. H.HartogJ. D. and ZannoneN.2018Security and privacy for innovative automotive applications a surveyComputer Communications13217–4110.1016/j.comcom.2018.09.010Search in Google Scholar
Mahmud, S. M., Shanker, S. and Hossain, I. 2005. Secure software upload in an intelligent vehicle via wireless communication links. In Proceedings of IEEE Intelligent Vehicles Symposium, 588–593.MahmudS. M.ShankerS. and HossainI.2005Secure software upload in an intelligent vehicle via wireless communication linksIn Proceedings of IEEE Intelligent Vehicles Symposium588–593Search in Google Scholar
Mathur, R., Agarwal, S. and Sharma, V. 2015. Solving security issues in mobile computing using cryptography techniques–a survey. International Conference on Computing, Communication and Automation, 492–497.MathurR.AgarwalS. and SharmaV.2015Solving security issues in mobile computing using cryptography techniques–a surveyInternational Conference on Computing, Communication and Automation492–497Search in Google Scholar
Mayilsamy, K., Ramachandran, N. and Raj, V. S. 2018. An integrated approach for data security in vehicle diagnostics over internet protocol and software update over the air. Computers & Electrical Engineering 71: 578–593.MayilsamyK.RamachandranN. and RajV. S.2018An integrated approach for data security in vehicle diagnostics over internet protocol and software update over the airComputers & Electrical Engineering71578–59310.1016/j.compeleceng.2018.08.002Search in Google Scholar
Nilsson, D. K. and Larson, U. E. 2008. Secure firmware updates over the air in intelligent vehicles. IEEE International Conference on Communications Workshops, 380–384.NilssonD. K. and LarsonU. E.2008Secure firmware updates over the air in intelligent vehiclesIEEE International Conference on Communications Workshops380–384Search in Google Scholar
Nilsson, D. K., Phung, P. H. and Larson, U. E. 2008. Vehicle ECU classification based on safety-security characteristics. IET Road Transport Information and Control and ITS United Kingdom Members’ Conference, 1–7.NilssonD. K.PhungP. H. and LarsonU. E.2008Vehicle ECU classification based on safety-security characteristicsIET Road Transport Information and Control and ITS United Kingdom Members’ Conference1–7Search in Google Scholar
Nilsson, D. K., Sun, L. and Nakajima, T. 2008. A framework for self-verification of firmware updates over the air in vehicle ECUs. IEEE GLOBECOM Workshops, 1–5.NilssonD. K.SunL. and NakajimaT.2008A framework for self-verification of firmware updates over the air in vehicle ECUsIEEE GLOBECOM Workshops1–5Search in Google Scholar
Odat, H. A. and Ganesan, S. 2014. Firmware over the air for automotive, fotamotive. In Proceedings of IEEE International Conference on Electro/Information Technology, 130–139.OdatH. A. and GanesanS.2014Firmware over the air for automotive, fotamotiveIn Proceedings of IEEE International Conference on Electro/Information Technology130–139Search in Google Scholar
Petri, R., Springer, M., Zelle, D., McDonald, I., Fuchs, A. and Kraub, C. 2016. Evaluation of lightweight TPMS for automotive software updates over the air. In Proceedings of International Conference on Embedded Security in Car, 1–15.PetriR.SpringerM.ZelleD.McDonaldI.FuchsA. and KraubC.2016Evaluation of lightweight TPMS for automotive software updates over the airIn Proceedings of International Conference on Embedded Security in Car1–15Search in Google Scholar
Riggs, C., Rigaud, C., Beard, R., Douglas, T. and Elish, K. 2019. A survey on connected vehicles vulnerabilities and countermeasures. Journal of Traffic and Logistics Engineering 61: 11–16.RiggsC.RigaudC.BeardR.DouglasT. and ElishK.2019A survey on connected vehicles vulnerabilities and countermeasuresJournal of Traffic and Logistics Engineering6111–1610.18178/jtle.6.1.11-16Search in Google Scholar
Steger, M., Boano, C. A., Niedermayr, T., Karner, M., Jillebrand, J., Roemer, K. and Rom, W. 2018. An efficient and secure automotive wireless software update framework. IEEE Transactions on Industrial Informatics 145: 2181–2193.StegerM.BoanoC. A.NiedermayrT.KarnerM.JillebrandJ.RoemerK. and RomW.2018An efficient and secure automotive wireless software update frameworkIEEE Transactions on Industrial Informatics1452181–219310.1109/TII.2017.2776250Search in Google Scholar
Stević, S., Lazić, V., Bjelica, M. Z. and Lukić, N. 2018. IoT-based software update proposal for next generation automotive middleware stacks. IEEE International Conference on Consumer Electronics, 1–4.StevićS.LazićV.BjelicaM. Z. and LukićN.2018IoT-based software update proposal for next generation automotive middleware stacksIEEE International Conference on Consumer Electronics1–4Search in Google Scholar
Tesla. Software updates, available at: www.tesla.com/support/software-updates. (accessed December 6, 2019).TeslaSoftware updates, available at:https://www.tesla.com/support/software-updates(accessed December 6, 2019)Search in Google Scholar