Cite

Abbas, Q. E. and Sung-Bong, J. 2019. A survey of blockchain and its applications. International Conference on Artificial Intelligence in Information and Communication, 001–003. Abbas Q. E. and Sung-Bong J. 2019 A survey of blockchain and its applications International Conference on Artificial Intelligence in Information and Communication 001 003 Search in Google Scholar

Ashibani, Y. and Mahmoud, Q. H. 2017. Cyber physical systems security: analysis, challenges and solutions. Computers and Security 68: 81–97. Ashibani Y. and Mahmoud Q. H. 2017 Cyber physical systems security: analysis, challenges and solutions Computers and Security 68 81 97 10.1016/j.cose.2017.04.005 Search in Google Scholar

Aust, S. 2018. Software downloads in trusted zones with wake-up sensors for connected vehicles. IEEE Vehicular Technology Conference, 1–5. Aust S. 2018 Software downloads in trusted zones with wake-up sensors for connected vehicles IEEE Vehicular Technology Conference 1 5 Search in Google Scholar

Avizienis, A., Laprie, J.-., Randell, B. and Landwehr, C. 2004. Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing 11: 11–33. Avizienis A. Laprie J.-. Randell B. and Landwehr C. 2004 Basic concepts and taxonomy of dependable and secure computing IEEE Transactions on Dependable and Secure Computing 1 1 11 33 10.1109/TDSC.2004.2 Search in Google Scholar

Cebe, M., Erdin, E., Akkaya, K., Aksu, H. and Uluagac, S. 2018. Block4Forensic: an integrated lightweight blockchain framework for forensics applications of connected vehicles. IEEE Communications Magazine 5610: 50–57. Cebe M. Erdin E. Akkaya K. Aksu H. and Uluagac S. 2018 Block4Forensic: an integrated lightweight blockchain framework for forensics applications of connected vehicles IEEE Communications Magazine 56 10 50 57 10.1109/MCOM.2018.1800137 Search in Google Scholar

Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S., Koscher, K., Czeskis, A., Roesner, F. and Kohno, T. 2011. Comprehensive experimental analyses of automotive attack surfaces. In Proceedings of USENIX Security Symposium, 77–92. Checkoway S. McCoy D. Kantor B. Anderson D. Shacham H. Savage S. Koscher K. Czeskis A. Roesner F. and Kohno T. 2011 Comprehensive experimental analyses of automotive attack surfaces In Proceedings of USENIX Security Symposium 77 92 Search in Google Scholar

Dhakal, S., Jaafar, F. and Zavarsky, P. 2019. Private blockchain network for IoT device firmware integrity verification and update. IEEE International Symposium on High Assurance Systems Engineering, 164–170. Dhakal S. Jaafar F. and Zavarsky P. 2019 Private blockchain network for IoT device firmware integrity verification and update IEEE International Symposium on High Assurance Systems Engineering 164 170 Search in Google Scholar

Doddapaneni, K., Lakkundi, R., Rao, S., Kulkarni, S. G. and Bhat, B. 2017. Secure FoTA object for IoT. IEEE Conference on Local Computer Networks Workshops, 154–159. Doddapaneni K. Lakkundi R. Rao S. Kulkarni S. G. and Bhat B. 2017 Secure FoTA object for IoT IEEE Conference on Local Computer Networks Workshops 154 159 Search in Google Scholar

Fongen, A. 2012. Identity management and integrity protection in the internet of things. International Conference on Emerging Security Technologies, Lisbon, Portugal, September 5-7. Fongen A. 2012 Identity management and integrity protection in the internet of things International Conference on Emerging Security Technologies, Lisbon, Portugal, September 5-7 Search in Google Scholar

Ford. Available at: www.ford.com.ph/engineering/sync/ Ford Available at: https://www.ford.com.ph/engineering/sync/ Search in Google Scholar

Fraga-Lamas, P. and Fernández-Caramés, T. M. 2019. A review on blockchain technologies for an advanced and cyber-resilient automotive industry. IEEE Access 7: 17578–17598. Fraga-Lamas P. and Fernández-Caramés T. M. 2019 A review on blockchain technologies for an advanced and cyber-resilient automotive industry IEEE Access 7 17578 17598 10.1109/ACCESS.2019.2895302 Search in Google Scholar

Gao, W., Hatcher, W. G. and Yu, W. 2018. A survey of blockchain: techniques, applications, and challenges. International Conference on Computer Communication and Networks, 1–11. Gao W. Hatcher W. G. and Yu W. 2018 A survey of blockchain: techniques, applications, and challenges International Conference on Computer Communication and Networks 1 11 Search in Google Scholar

Halder, S., Ghosal, A. and Conti, M. 2019. Secure OTA software updates in connected vehicles: a survey. ArXiv, available at: https://arxiv.org/abs/1904.00685 Halder S. Ghosal A. and Conti M. 2019 Secure OTA software updates in connected vehicles: a survey ArXiv, available at: https://arxiv.org/abs/1904.00685 10.1016/j.comnet.2020.107343 Search in Google Scholar

Idrees, M. S., Schweppe, H., Roudier, Y., Wolf, M., Scheuermann, D. and Henniger, O. 2011. Secure automotive on-board protocols: a case of over-the-air firmware updates. Lecture Notes in Computer Science 6596: 224–238. Idrees M. S. Schweppe H. Roudier Y. Wolf M. Scheuermann D. and Henniger O. 2011 Secure automotive on-board protocols: a case of over-the-air firmware updates Lecture Notes in Computer Science 6596: 224 238 10.1007/978-3-642-19786-4_20 Search in Google Scholar

Jo, H. J., Choi, W., Na, S. Y., Woo, S. and Lee, D. H. 2017. Vulnerabilities of android OS-based telematics system. Wireless Personal Communications 924: 1511–1530. Jo H. J. Choi W. Na S. Y. Woo S. and Lee D. H. 2017 Vulnerabilities of android OS-based telematics system Wireless Personal Communications 92 4 1511 1530 10.1007/s11277-016-3618-9 Search in Google Scholar

Khodari, M., Rawat, A., Asplund, M. and Gurtov, A. 2019. Decentralized firmware attestation for in-vehicle networks. In Proceedings of the 5th on Cyber-Physical System Security Workshop–CPSS ‘19, Auckland, New Zealand, July 8. Khodari M. Rawat A. Asplund M. and Gurtov A. 2019. Decentralized firmware attestation for in-vehicle networks In Proceedings of the 5th on Cyber-Physical System Security Workshop–CPSS ‘19, Auckland, New Zealand, July 8 Search in Google Scholar

Khurram, M., Kumar, H., Chandak, A., Sarwade, V., Arora, N. and Quach, T. 2016. Enhancing connected car adoption: security and over the air update framework. IEEE World Forum on Internet of Things, Reston, VA, December 12-14, pp. 194–198, available at: https://ieeexplore.ieee.org/document/7845430 Khurram M. Kumar H. Chandak A. Sarwade V. Arora N. and Quach T. 2016 Enhancing connected car adoption: security and over the air update framework IEEE World Forum on Internet of Things, Reston, VA, December 12-14, pp. 194 198 available at https://ieeexplore.ieee.org/document/7845430 10.1109/WF-IoT.2016.7845430 Search in Google Scholar

Knockel, J. and Crandall, J. R. 2012. Protecting free and open communications on the internet against man-in-the-middle attacks on third-party software: we’re FOCI’d. USENIX Workshop on Free and Open Communications on the Internet, Bellevue, WA, August 6. Knockel J. and Crandall J. R. 2012 Protecting free and open communications on the internet against man-in-the-middle attacks on third-party software: we’re FOCI’d USENIX Workshop on Free and Open Communications on the Internet, Bellevue, WA, August 6 Search in Google Scholar

Kong, H., Kim, T. and Hong, M. 2016. A security risk assessment framework for smart car. International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 102–108. Kong H. Kim T. and Hong M. 2016 A security risk assessment framework for smart car International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing 102 108 Search in Google Scholar

Kuppusamy, T. K., DeLong, L. A. and Cappos, J. 2018. Uptane: security and customizability of software updates for vehicles. IEEE Vehicular Technology Magazine 131: 66–73. Kuppusamy T. K. DeLong L. A. and Cappos J. 2018 Uptane: security and customizability of software updates for vehicles IEEE Vehicular Technology Magazine 13 1 66 73 10.1109/MVT.2017.2778751 Search in Google Scholar

Kuppusamy, T. K., Torres-Arias, S., Diaz, V. and Cappos, J. 2016. Diplomat: using delegations to protect community repositories. USENIX Symposium on Networked Systems Design and Implementation, 567–581. Kuppusamy T. K. Torres-Arias S. Diaz V. and Cappos J. 2016 Diplomat: using delegations to protect community repositories USENIX Symposium on Networked Systems Design and Implementation 567 581 Search in Google Scholar

Kuppusamy, T. K., Brown, A., Awwad, S., McCoy, D., Bielawski, R., Mott, C., Lauzon, A., Weimerskirch, S. and Cappos, J. 2016. Uptane: securing software updates for automobiles. In Proceedings of International Conference on Embedded Security in Car Europe, 1–11. Kuppusamy T. K. Brown A. Awwad S. McCoy D. Bielawski R. Mott C. Lauzon A. Weimerskirch S. and Cappos J. 2016 Uptane: securing software updates for automobiles In Proceedings of International Conference on Embedded Security in Car Europe 1 11 Search in Google Scholar

Le, V. H., Hartog, J. D. and Zannone, N. 2018. Security and privacy for innovative automotive applications a survey. Computer Communications 132: 17–41. Le V. H. Hartog J. D. and Zannone N. 2018 Security and privacy for innovative automotive applications a survey Computer Communications 132 17 41 10.1016/j.comcom.2018.09.010 Search in Google Scholar

Mahmud, S. M., Shanker, S. and Hossain, I. 2005. Secure software upload in an intelligent vehicle via wireless communication links. In Proceedings of IEEE Intelligent Vehicles Symposium, 588–593. Mahmud S. M. Shanker S. and Hossain I. 2005 Secure software upload in an intelligent vehicle via wireless communication links In Proceedings of IEEE Intelligent Vehicles Symposium 588 593 Search in Google Scholar

Mathur, R., Agarwal, S. and Sharma, V. 2015. Solving security issues in mobile computing using cryptography techniques–a survey. International Conference on Computing, Communication and Automation, 492–497. Mathur R. Agarwal S. and Sharma V. 2015 Solving security issues in mobile computing using cryptography techniques–a survey International Conference on Computing, Communication and Automation 492 497 Search in Google Scholar

Mayilsamy, K., Ramachandran, N. and Raj, V. S. 2018. An integrated approach for data security in vehicle diagnostics over internet protocol and software update over the air. Computers & Electrical Engineering 71: 578–593. Mayilsamy K. Ramachandran N. and Raj V. S. 2018 An integrated approach for data security in vehicle diagnostics over internet protocol and software update over the air Computers & Electrical Engineering 71 578 593 10.1016/j.compeleceng.2018.08.002 Search in Google Scholar

Nilsson, D. K. and Larson, U. E. 2008. Secure firmware updates over the air in intelligent vehicles. IEEE International Conference on Communications Workshops, 380–384. Nilsson D. K. and Larson U. E. 2008 Secure firmware updates over the air in intelligent vehicles IEEE International Conference on Communications Workshops 380 384 Search in Google Scholar

Nilsson, D. K., Phung, P. H. and Larson, U. E. 2008. Vehicle ECU classification based on safety-security characteristics. IET Road Transport Information and Control and ITS United Kingdom Members’ Conference, 1–7. Nilsson D. K. Phung P. H. and Larson U. E. 2008 Vehicle ECU classification based on safety-security characteristics IET Road Transport Information and Control and ITS United Kingdom Members’ Conference 1 7 Search in Google Scholar

Nilsson, D. K., Sun, L. and Nakajima, T. 2008. A framework for self-verification of firmware updates over the air in vehicle ECUs. IEEE GLOBECOM Workshops, 1–5. Nilsson D. K. Sun L. and Nakajima T. 2008 A framework for self-verification of firmware updates over the air in vehicle ECUs IEEE GLOBECOM Workshops 1 5 Search in Google Scholar

Odat, H. A. and Ganesan, S. 2014. Firmware over the air for automotive, fotamotive. In Proceedings of IEEE International Conference on Electro/Information Technology, 130–139. Odat H. A. and Ganesan S. 2014 Firmware over the air for automotive, fotamotive In Proceedings of IEEE International Conference on Electro/Information Technology 130 139 Search in Google Scholar

Petri, R., Springer, M., Zelle, D., McDonald, I., Fuchs, A. and Kraub, C. 2016. Evaluation of lightweight TPMS for automotive software updates over the air. In Proceedings of International Conference on Embedded Security in Car, 1–15. Petri R. Springer M. Zelle D. McDonald I. Fuchs A. and Kraub C. 2016 Evaluation of lightweight TPMS for automotive software updates over the air In Proceedings of International Conference on Embedded Security in Car 1 15 Search in Google Scholar

Riggs, C., Rigaud, C., Beard, R., Douglas, T. and Elish, K. 2019. A survey on connected vehicles vulnerabilities and countermeasures. Journal of Traffic and Logistics Engineering 61: 11–16. Riggs C. Rigaud C. Beard R. Douglas T. and Elish K. 2019 A survey on connected vehicles vulnerabilities and countermeasures Journal of Traffic and Logistics Engineering 6 1 11 16 10.18178/jtle.6.1.11-16 Search in Google Scholar

Steger, M., Boano, C. A., Niedermayr, T., Karner, M., Jillebrand, J., Roemer, K. and Rom, W. 2018. An efficient and secure automotive wireless software update framework. IEEE Transactions on Industrial Informatics 145: 2181–2193. Steger M. Boano C. A. Niedermayr T. Karner M. Jillebrand J. Roemer K. and Rom W. 2018 An efficient and secure automotive wireless software update framework IEEE Transactions on Industrial Informatics 14 5 2181 2193 10.1109/TII.2017.2776250 Search in Google Scholar

Stević, S., Lazić, V., Bjelica, M. Z. and Lukić, N. 2018. IoT-based software update proposal for next generation automotive middleware stacks. IEEE International Conference on Consumer Electronics, 1–4. Stević S. Lazić V. Bjelica M. Z. and Lukić N. 2018 IoT-based software update proposal for next generation automotive middleware stacks IEEE International Conference on Consumer Electronics 1 4 Search in Google Scholar

Tesla. Software updates, available at: www.tesla.com/support/software-updates. (accessed December 6, 2019). Tesla Software updates, available at: https://www.tesla.com/support/software-updates (accessed December 6, 2019) Search in Google Scholar

eISSN:
1178-5608
Idioma:
Inglés
Calendario de la edición:
Volume Open
Temas de la revista:
Engineering, Introductions and Overviews, other