Intrusion Detection in the Automotive Domain: A Comprehensive Review

Research output: Contribution to journalReviewpeer-review

51 Downloads (Pure)

Abstract

The automotive domain has realized amazing advancements in communication, connectivity, and automation—and at a breakneck pace. Such advancements come with ample benefits, such as the reduction of traffic accidents and the refinement of transit efficiency. However, these new developments were not necessarily made with security in mind. Researchers have unearthed a number of security vulnerabilities in paradigms such as in-vehicle networks (IVNs), the Internet of Vehicles (IoV), and intelligent transportation systems (ITSs). As automotive technologies continue to evolve, it would be realistic to expect new vulnerabilities to arise—both vulnerabilities that are identified and vulnerabilities that are not. If—or more pragmatically, when—these vulnerabilities are exploited, intrusion detection will be paramount. Therefore, we find it prudent to review intrusion detection in the automotive domain. We explore a myriad of threats and intrusion detection techniques—from the boundaries of the vehicle’s own network to the wider Internet of Vehicles (IoV). Intrusion detection, while not a panacea, can be a costeffective solution to many automotive security issues. Generally, such intrusion detection systems (IDSs) do not disrupt existing hardware, infrastructure, or communications; rather, they merely tap into the network and monitor for suspicious traffic. Given the very reasonable price tag, the implementation of intrusion detection systems would be an auspicious step by the automotive industry to assure the security—and safety—of the modern automobile. This paper volunteers a comprehensive review of intrusion detection technologies in the automotive domain.
Original languageEnglish
JournalI E E E Communications Surveys and Tutorials
Volume25
Issue number4
Pages (from-to)2356-2426
ISSN1553-877X
DOIs
Publication statusPublished - 2023

Fingerprint

Dive into the research topics of 'Intrusion Detection in the Automotive Domain: A Comprehensive Review'. Together they form a unique fingerprint.

Cite this