Intrusion Detection in the Automotive Domain: A Comprehensive Review

23Citations
Citations of this article
55Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

The automotive domain has realized amazing advancements in communication, connectivity, and automation - and at a breakneck pace. Such advancements come with ample benefits, such as the reduction of traffic accidents and the refinement of transit efficiency. However, these new developments were not necessarily made with security in mind. Researchers have unearthed a number of security vulnerabilities in paradigms such as in-vehicle networks (IVNs), the Internet of Vehicles (IoV), and intelligent transportation systems (ITSs). As automotive technologies continue to evolve, it would be realistic to expect new vulnerabilities to arise - both vulnerabilities that are identified and vulnerabilities that are not. If - or more pragmatically, when - these vulnerabilities are exploited, intrusion detection will be paramount. Therefore, we find it prudent to review intrusion detection in the automotive domain. We explore a myriad of threats and intrusion detection techniques - from the boundaries of the vehicle's own network to the wider Internet of Vehicles (IoV). Intrusion detection, while not a panacea, can be a cost-effective solution to many automotive security issues. Generally, such intrusion detection systems (IDSs) do not disrupt existing hardware, infrastructure, or communications; rather, they merely tap into the network and monitor for suspicious traffic. Given the very reasonable price tag, the implementation of intrusion detection systems would be an auspicious step by the automotive industry to assure the security - and safety - of the modern automobile. This paper volunteers a comprehensive review of intrusion detection technologies in the automotive domain.

Cite

CITATION STYLE

APA

Lampe, B., & Meng, W. (2023). Intrusion Detection in the Automotive Domain: A Comprehensive Review. IEEE Communications Surveys and Tutorials, 25(4), 2356–2426. https://doi.org/10.1109/COMST.2023.3309864

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free