This article investigates cybersecurity issues related to in-vehicle communication networks. In-vehicle communication network security is evaluated based on the protection characteristics of the network components and the topology of the network. The automotive communication network topologies are represented as undirected weighted graphs, and their vulnerability is estimated based on the specific characteristics of the generated graph. Thirteen different vehicle models have been investigated to compare the vulnerability levels of the in-vehicle network using the Dijkstra's shortest route algorithm. An important advantage of the proposed method is that it is in accordance with the most relevant security evaluation models. On the other hand, the newly introduced approach considers the Secure-by-Design concept principles.
CITATION STYLE
Petho, Z., Khan, I., & Torok, Á. (2021). Analysis of Security Vulnerability Levels of In-Vehicle Network Topologies Applying Graph Representations. Journal of Electronic Testing: Theory and Applications (JETTA), 37(5–6), 613–621. https://doi.org/10.1007/s10836-021-05973-x
Mendeley helps you to discover research relevant for your work.