Automotive Intrusion Detection Methodologies (TU Denmark)


A new technical paper titled “Intrusion Detection in the Automotive Domain: A Comprehensive Review” was published by researchers at DTU Compute Technical University of Denmark

“The automotive domain has realized amazing advancements in communication, connectivity, and automation— and at a breakneck pace. Such advancements come with ample benefits, such as the reduction of traffic accidents and the refinement of transit efficiency. However, these new developments were not necessarily made with security in mind. Researchers have unearthed a number of security vulnerabilities in paradigms such as in-vehicle networks (IVNs), the Internet of Vehicles (IoV), and intelligent transportation systems (ITSs). As automotive technologies continue to evolve, it would be realistic to expect new vulnerabilities to arise—both vulnerabilities that are identified and vulnerabilities that are not. If—or more pragmatically, when—these vulnerabilities are exploited, intrusion detection will be paramount. Therefore, we find it prudent to review intrusion detection in the automotive domain. We explore a myriad of threats and intrusion detection techniques—from the boundaries of the vehicles own network to the wider Internet of Vehicles (IoV). Intrusion detection, while not a panacea, can be a costeffective solution to many automotive security issues. Generally, such intrusion detection systems (IDSs) do not disrupt existing hardware, infrastructure, or communications; rather, they merely tap into the network and monitor for suspicious traffic. Given the very reasonable price tag, the implementation of intrusion detection systems would be an auspicious step by the automotive industry to assure the security—and safety—of the modern automobile. This paper volunteers a comprehensive review of intrusion detection technologies in the automotive domain.”

Find the technical paper here.Published August 2023.

B. Lampe and W. Meng, “Intrusion Detection in the Automotive Domain: A Comprehensive Review,” in IEEE Communications Surveys & Tutorials, doi: 10.1109/COMST.2023.3309864.

Related Reading
Curbing Automotive Cybersecurity Attacks
A growing number of standards and regulations within the automotive ecosystem promises to save developments costs by fending off cyberattacks
Creating IP In The Shadow Of ISO 26262
In a field that demands safety compliance and specialized standards, IP and EDA tools must be certified; it’s a long and complex process.
Why It’s So Difficult To Ensure System Safety Over Time
Gaps in tools and uncertainties in methodologies leave the door open for unexpected failures.

Leave a Reply

(Note: This name will be displayed publicly)