Abstract
Intelligent and Connected Vehicles (ICVs), which are equipped with various wireless communication technologies and many smart systems, significantly improve the driving experience. Nevertheless, due to the potential vulnerabilities in their advanced cyber physical features and growing numbers of interfaces, malicious attacks can be easily implemented toward ICVs, in particular by utilizing the interfaces of wireless telematics systems. Remote vehicle attacks can even be launched by a malicious application or a smart connected device. Toward this end, we provide in this article an essential tutorial summarizing the threats, attacking methodologies, and promising solutions specifically for wireless telematics systems in the emerging ICVs.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.