This paper discusses the security challenges faced by the IoT network implemented in the automobile industry and provides solutions to overcome them. It explores the impact of IoT on the automotive sector and the need for secure implementation. The assignment analyzes various research studies on IoT security in the automobile industry.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
IoT in Automobile Industry Student Name – Student ID Masters in IT – Networking
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
ABSTRACT–Internet of things can be defined as a specific concept that would help in connecting numerous devices in a specific network. This paper discusses regarding the security challenges faced by the IoT network implemented in the automobile industry. In the times of digital media, internet of things plays a vital role of data warehouse and information servers. This assignment discusses regarding the studies carried out by various researchers as well as IoT security. Internet of things allows the transformational change and there is no question that automotive sector has been changing at a rapid rate. Technologies that are related to internet of things would draw the map for that particular industry for following. 1.ANALYSIS This particular report aims in focusing on the application of a specific technology in a certain industry. The technology chosen for thisparticularreport includesInternetof Thingsandtheindustrychosenis Automobile industry (Wang, Chaudhry & Li, 2016). This report presents the analysis of the topic and the future discussions that would be carried out. On the basis of the topic chosen, IoT in automobile industry, a problem statement has been figured out for this assignment. The problem statement of the assignment is the security issues faced by the industry of automobiles due to the implementation of IoT. 2.ANNOTATED BIBLIOGRAPHY Krasniqi, X., & Hajrizi, E. (2016). Use of IoT technology to drive the automotive industryfromconnectedtofull autonomousvehicles.IFAC- PapersOnLine,49(29), 269-274. This article describes regarding the fact that security issues in the implementation of the internetofthingsintheindustryof automobilesmightcauseduetovarious instances. These instances include ethical, technology as well as privacy concerns. This particulararticlefocusesmoreonthe securityissuesthatarefacedbythe automobile industry when internet of things is implemented to it. It presents the fact the securityissuesfacedbytheautomobiles might result in causing harm to the vehicles, drivers and to the industry as a whole. The main strength of the article is that it reflects on the issues faced by the implementation of IoT in the industry of automobiles and the weakness of the article is that it does not discuss regarding recommendations to solve them. Majeed,A.A.,&Rupasinghe,T.D. (2017). Internet of things (IoT) embedded future supply chains for industry 4.0: An assessment from an ERP-based fashion apparelandfootwear industry.International Journal of Supply Chain Management,6(1), 25-40. This particular article reflects on the fact that when internet of things is implemented in connected cars there are various security issuesthatmightoccur.Someimportant componentsinvolvedinthesecurity concernsofthismatterincludes authentication, data channel access control and data encryption. Concentrating on data channel access control, which has a fine grainpublishaswellaspermissionto subscribe to a particular channel or a user proves to an important tool for the security of internet of things. Tian, J., Chin, A., & Karg, M. (2016). Digitalservicesintheautomotive industry.IT Professional,18(5), 4-6. Thisparticulararticleconcentrateson describing various security issues along with otherissuesfacedbytheautomobile industrywheninternetofthingsis implemented in it. it further mentions that the authentication of users help people to restrict,createaswellascloseopen channelsbetweenclientapplications, servers and connected vehicles. Along with connected vehicles developers of IoT are able to build applications that are point to point and where various data streams that
are bidirectional between various devices. It providestheabilitytograntaswellas revoke the access to user connections is a different security layer on the top of AES as well as SSL encryption. This article focuses moreontheencryptionofdatainthis context, though it does not focus much on other topics. Aris, I. B., Sahbusdin, R. K. Z., & Amin, A. F. M. (2015, May). Impacts of IoT and big data to automotive industry. In2015 10thAsianControlConference (ASCC)(pp. 1-5). IEEE. Thisarticledescribesregardingthe specificationsofvehiclesthathaveIoT implementedinthem,itfocusesonthe technical issues that might take place and hence the security issues might occur. It furtherdiscussesregardingthetesting procedures that can be carried out for the purposeofavoidingtheseissues.This articledescribesregardingthetechnical issueswhichhasnot been mentionedin other articles. Dhall, R., & Solanki, V. (2017). An IoT BasedPredictiveConnectedCar Maintenance.InternationalJournalof InteractiveMultimedia&Artificial Intelligence,4(3). This article has discussed regarding the fact that the connected revolution has reached the industry of automobiles as well as the internetpenetratesintovariousmodern vehicles.Thisacquiresdatafromthe vehicles and proves to be a tool of fleet managementsystem;thishandlesthe commercial vehicles as well. This further affects the data related to the users because the vehicles tend to share the data with their neighboring vehicles. This article focuses on the external issues that might cause security issues but it does not discuss regarding any other security issues. Weis, A., Strandskov, M., Yelamarthi, K., Aman, M. S., & Abdelgawad, A. (2017, May). Rapid deployment of IoT enabled system for automobile fuel range and gas price location. In2017 IEEE International ConferenceonElectroInformation Technology (EIT)(pp. 452-455). IEEE. This article represents the fact that in recent year’s connectivity had started to appear in thevehiclesofpassengersaswell.The initialfeatureshadbeeninfotainmentas well as navigation, and having less security needs that remains far from the vehicular networks.Thestrengthofthearticle includes the discussion regarding the issues in an elaborative manner. Thirunavukkarasu, G. S., Champion, B., Horan,B.,Seyedmahmoudian,M.,& Stojcevski, A. (2018, October). IoT-Based SystemHealthManagement InfrastructureasaService. InProceedings of the 2018 International ConferenceonCloudComputingand Internet of Things(pp. 55-61). ACM. This article discusses regarding the issues due to telemetric as well as remote controls like keyless entry that appeared and as well as created a newly imposed security threat in the vehicle. This articles does concentrate on the issues faced by the industry but does not describe them in details. LuÃs-Ferreira, F., Ghimire, S., Sarraipa, J.,&Jardim-Goncalves,R.(2016, November). IoT and Self-Driving Cars a RevolutionBeyondtheAutomobile Industry.InASME2016International MechanicalEngineeringCongressand Exposition(pp.V002T02A038- V002T02A038).AmericanSocietyof Mechanical Engineers. This article discusses on the ways using whichthe connected featureschange the vehicle and then present vulnerabilities of
everyelementinordertoshowthe importance of security design of cautious system. It further discusses regarding the factthatopensourcehasnotbeen automaticallysecuredcomparedtothe closed source. The strength includes the fact that it discusses regarding a unique topic whichisnotdiscussesinmanymore articles. Gong, W. (2016).The Internet of Things (IoT): What is the potential of the internet ofthings(IoT)asamarketingtool? (Bachelor's thesis, University of Twente). Thisparticulararticlediscussesonthe security issues that are faced by the issues in vehicle electronics as well as engine control units. These issues include engine control module, brake control module, transmission control module, power train control module and many more. Some of the vehicles have around 80 ECUs whereas the new features have been added. Some new features have then been added in the existing systems. Thismakesthesystemevenmore vulnerable. Along with this the addition of the IVI systems, vehicle telemetric, smart phone links and similar technologies make thevehiclesevenmorevulnerable.This article describes the issues created due to other devices, it does not discuss regarding common issues. Huo, Y., Tu, W., Sheng, Z., & Leung, V. C.(2015,December).Asurveyofin- vehiclecommunications:Requirements, solutionsandopportunitiesinIoT. In2015IEEE2ndWorldForumon InternetofThings(WF-IoT)(pp.132- 137). IEEE. This particular attacks describes regarding varioustypesofsecurityattacks,these include front door attacks, back door attacks andexploits.Thefrontdoorattacks commander the access mechanism of actual equipmentsmanufacturer.Thebackdoor attacks apply more hardware that functions traditionally and hence results in providing hacking approaches. The exploits discover unintentional access to various mechanisms. The strength of this particular article is that it describes regarding the types of attacks thatmighttakeplacein theindustry of automobilesaftertheimplementationof internet of things. A weakness includes the fact that it covers all the attacks in short but does not discuss regarding a specific issue in details. It also does not discuss regarding the unique issues faced by the industry. 3.LITERATURE REVIEW In this particular section, the privacy as well as security challenges that are faced by the automobile industry due to implementation of internet of things are mentioned (Yerpude & Singhal, 2018). In this particularcase,thevehiclesmightdisseminate various confidential data that re related to various important events like conditions of road, congestion on roads due to traffic, notifications of accidents as well as distributed management of traffic. Vehicles accessthissortofdatafromnumerous neighbouringvehiclesandsometimesfromthe environment for detecting the collision or traffic congestion.AccordingtoSowmya,Kumarand Srinivasa (2017)in various conditions, the presence ofnumerousmaliciousaswellasmisbehaving nodes because falsified as well as fabricated data dissemination of the network, thus has high chances of leading into drastic situations. This compromises thesecurity,safetyaswellasprivacyofthe potential users (Mohandas & Aravindhar, 2017). As perthe implementation of internet of things in the automobile industry does not have any centralized administrationoranycontrol.Varioussecurity protocols that need a third party that is trusted and centralized or needs time connectivity like public keyinfrastructuremightnotbeused.This automatically gives chances t hackers for causing serious attacks at numerous levels. According toZhou, Liu and Liang (2016),in the caseofimplementinginternetofthingsin automobile industry, the absence of proper identity management system results in making the vehicles
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
a target for numerous identity attacks. An example of these kinds of attacks includes Sybil attacks. A particular Sybil attacker is able to create as well as manage numerous phony identities that are allowed to share fake data in the network. This is done for craftingaspecificfalseimpressionofthenon existing events. As perOgawa (2017),an example of Sybil attacks include, the dissemination of faked informationthathasbeengeneratedbySybil attackers regarding nonexistent road congestion as well as accidents has the chance to maliciously diverttraffic;thisisdoneinordertoattempt robbery, car stealth purpose and kidnapping. These incidents are detrimental to the drivers as well as vehicles security and safety. According toKodama (2018),a particular attacker is allowed to steal others innocent nodes credentials for the purpose of enjoying maliciously the privileges and rights that is associated with the stolen identities or commit malicious and misbehaving activities like denial of service attacks and many more similar activities. These malicious activities are performed without beingresponsiblefor theseacts.Thisseriesof activities that harm the vehicle as well as the drivers is called impersonation and masquerading attack. Theimplementationofinternetofthingsin automobile industry is very much vulnerable to the attacks that are packet dropping in nature like black hole, wormhole attacks, gray hole attacks and some more similar attacks (Pawar & Rizvi, 2018). These attacks cause denial of service attacks for various vehiclesthatareindividualorthegroupsof numerous vehicles. In numerous cases, the vehicles are connected in links and they communicate to various other vehicles in a specific network. This makes them vulnerable towards numerous sort of attackslikeanalysisoftraffic,eavesdropping attacksand jammingattacks(Srinivasan, 2018). Theseattackshavebeenlaunchedagainstthe automobiles.Theabovementionedattacksare called inter vehicle attacks. Nowadays the modern vehicles includes a specific set of sensors that are responsibleforperformingnumeroustaskslike checking the distance between the vehicles as well asroadconditions,fireandsmokedetection, acceleration and deceleration of vehicles, detection radar of obstacles and many more. As perGhosh, Martin & Stelmach (2017),intra vehicle attacks are very much detrimental to the safety as well as securityofthedriversandthevehiclewhich misleads a sensor and might result n harming the vehicle as well as the driver. An example of this has beenprovidedbyRao,RajeswariandKumar (2018), disabling the system of braking or steering wheelbyaparticularattackerinaspecific autonomous vehicle might endanger the life of the driver. 4.INTRODUCTION Internetoftingsortheconceptof connectingdevicesoveraparticular network is not a fancy technology for the purpose of using it in the future. It has been changing the way people live as well as lead their live. In the sector of automobiles, the implementation of IoT has allowed a greater rateofefficiencyinthemodesof transportation (Gupta & Rakesh, 2018). It also provides efficiency in the concept of managing the transport facilities provided to people. This has been leading people to a particular future of intelligent autonomous vehicles. The global automotive internet of things market has been expected to reach around $106.32 billion within the year 2023 and driven by the increasing need for the purpose of saving time (Kodama & Shibata, 2017).Aswellasprovidemaximum productivity in the world that paces at a rapid speed. The introduction of high speed network of mobiletechnologyinthehorizonwould catalyse the growth at a rapid rate. This would be catalysed with the help of faster transfer of rate, response times as well as enhanced communication between vehicles (Kanishkar, Pandit & Bhat, 2018). Internet ofthingshasadoptedthegreatrateof adoptioninnumerousareaswithinthe sector of automobiles. Some most important interesting applicationsof the internet of things in the industry of automobiles might be categorized into various parts, these parts include in vehicle infotainment, predictive maintenance,security,safetyand
surveillance, dashboard reporting and data analytics, real timing monitoring, cognitive insights for the purpose of management and many more (Wang, Chaudhry & Li, 2016). The ability to track and code objects has been enabled for various organizations and thishashelpedtheminbecomingmore efficient.Thisparticularassignment discusses regarding various security issues that is faced by the industry of automobiles by the implementation of internet of things (Dhall & Solanki, 2017). Some of the issues includeexposingthedriver’sdataand making them accessible to the hackers and manymore.Theseissueshavebeen discussed in details in several parts of this assignment, the assignment further discusses regarding various recommendations that can be implemented for the purpose of avoiding these issues in the automobile industry. 5.RECOMMENDATIONS Inspite of various benefits provided by internet of things in the industry of automobiles, the security concerns prove to a major drawback for the system. ThemainconcernistheautomotiveIoT applications that are considered to be a very easy target for various cyber attacks that might lead to a seriouslevelofnegativeconsequences(Weis, Strandskov&Yelamarthi,2017).Thereare numerous techniques that can be used in preventing these hacks or any kind of security issue in this particular field. These ways are as follows Paying attention to the authorization process of theapplication:Thistechniqueusuallysounds obvious but it is not followed by most of the users. Theusersmustnotsetpasswordsthatcanbe cracked without any hard work, or that are very easytoaccess,theusersmustsetverystrong password such as limiting the minimum needed number of symbols or introduce the rules which require a particular set of symbols that the password must contain such as letters, symbols and numbers (Pawar & Rizvi, 2018). One more efficient method which adds one more layer of security includes two-factorauthentication.Therearenumerous readymade solutions which can be easily integrated into the applications. With the help of this, the users would be able to address some major security risks of internet of things with very less or almost no effort. Applying basic techniques of data privacy:when dataprotectionisconsidered,tokenization, encryption and anonymization must be considered the most. Since a connected device handles a huge amount of sensitive information, the solutions of IoT security must also include various techniques (Thirunavukkarasu, Champion and Horan, 2018). Hencethedataoftheuserswouldbeentirely anonymous,safelystoredandencryptedinthe user’s database. Carrying out regular security updates:the longer aproductstaysunchanged,themorechances hackersgetinordertocrackitscodes.The applications must be made a moving target and the users must look for various techniques with which theycansecuretheirapplication(LuÃs-Ferreira, Ghimire & Sarraipa, 2016). There are numerous techniques that can be introduced in order to make connected driving an enjoyable and safe experience. Users must also be aware of certain basic security policies while using their vehicles connected to internet. An example of this is that users are not suggested to connect sort of unauthorized devices or any sort of applications with their vehicle; they mustalsonotmakeuseofanysortofpublic networks (Huo, Sheng & Leung, 2015). Usage of public networks might result in providing a chance to hacker, they might get some data related to the users and the vehicles, this data might be used by the hackers for the purpose of illegal activities. 6.CONCLUSION From the above assignment it can be concluded that internetofthingscanbedefinedasaspecific concept that would help in connecting numerous devices in a specific network. This paper discusses regarding the security challenges faced by the IoT network implemented in the automobile industry. In the times of digital media, internet of things plays a vitalroleofdatawarehouseandinformation servers. Network of internet of things are utilized in various industries. There are numerous loop holes
that exist in the IoT based security network. This particularassignmentdiscussesregardingthe securityaspectsinthenetworksofIoT.This assignment discusses regarding the studies carried out by various researchers as well as IoT security. Internetofthingsallowsthetransformational change and there has been no change when sector of automobiles has been changing at a rapid rate. Technologies that are related to internet of things would draw the map for that particular industry for following. The connected vehicle would play a vital role in the roads as well as in economy of future. The struggleamongthe automakersaswellas softwaredeveloperscanbeconsideredasa symptom of ongoing transformation such as birth pangs because the industry tends to reinvent its operations. In order to strengthen the position of the organizations producing vehicles they can undergo various steps, these steps include aligning a vision of a specific role that would be played by the business in the process of understanding as well as accepting the transformational impacts that would becreatedonthebusinessaswellasonthe traditional ways of thinking. The development of a clean mapping of where the data is originated as well as who owns it for every servicethathasbeendeliveredinorderto understand where the data is being captured. One more step includes developing a roadmap for the purpose of shifting to an approach that is service- oriented in nature as a particular organization not only in the vehicle divisions that are connected, for the purpose of enabling ongoing interaction with various customers of the organization all over their lifecycle.Theorganizationmustalsoaccept various capabilities which need to be built using an internalprocessoracquireusinganexternal method.Itmustalsoseekagoodlevelof involvement in the ownership of the in vehicle platform of software development. This particular assignmentdescribesregardingtheconceptof implementation of internet of things in the industry of automobiles, it further discusses regarding the security issues that are faced by the automakers as well as passengers in the implementation of internet of things. These aspects have been discussed in the discussion part of the assignment in details. 7.REFERENCES Aris, I. B., Sahbusdin, R. K. Z., & Amin, A. F. M. (2015, May). Impacts of IoT and big data to automotive industry. In2015 10th Asian Control Conference (ASCC)(pp. 1-5). IEEE. Dhall, R., & Solanki, V. (2017). An IoT Based Predictive Connected Car Maintenance.International Journal of Interactive Multimedia & Artificial Intelligence,4(3). Ghosh, S., Martin, S., & Stelmach, S. (2017, September). Reliability for IoT and Automotive markets. In2017 30th IEEE International System-on-Chip Conference (SOCC)(pp. 1-3). IEEE. Gong, W. (2016).The Internet of Things (IoT): What is the potential of the internet of things (IoT) as a marketing tool?(Bachelor's thesis, University of Twente). Gupta, K., & Rakesh, N. (2018, January). IoT Based Automobile Air Pollution Monitoring System. In2018 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence)(pp. 14-15). IEEE. Huo, Y., Tu, W., Sheng, Z., & Leung, V. C. (2015, December). A survey of in-vehicle communications: Requirements, solutions and opportunities in IoT. In2015 IEEE 2nd World Forum on Internet of Things (WF- IoT)(pp. 132-137). IEEE. Kanishkar, P., SA, S. K., Pandit, K., & Bhat, G. (2018). 3D Vibration Monitoring Sensor for Automobiles Using Internet of Things (IoT). Kodama, F. (2018). An Empirical Study of Contrasting IoT with IT: Evidences of Differences Drawn from Japanese Experiences.American Journal of Industrial and Business Management,8(01), 27. Kodama, F., & Shibata, T. (2017). Beyond fusion towards IoT by way of open innovation: an investigation based on the Japanese machine tool industry 1975- 2015.Journal of Open Innovation: Technology, Market, and Complexity,3(4), 23.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Krasniqi, X., & Hajrizi, E. (2016). Use of IoT technology to drive the automotive industry from connected to full autonomous vehicles.IFAC-PapersOnLine,49(29), 269- 274. LuÃs-Ferreira, F., Ghimire, S., Sarraipa, J., & Jardim-Goncalves, R. (2016, November). IoT and Self-Driving Cars a Revolution Beyond the Automobile Industry. InASME 2016 International Mechanical Engineering Congress and Exposition(pp. V002T02A038-V002T02A038). American Society of Mechanical Engineers. Majeed, A. A., & Rupasinghe, T. D. (2017). Internet of things (IoT) embedded future supply chains for industry 4.0: An assessment from an ERP-based fashion apparel and footwear industry.International Journal of Supply Chain Management,6(1), 25-40. Mohandas, R., & Aravindhar, D. J. (2017). A survey on IoT: business perspective predictions, trends and marketing.Advances in Natural and Applied Sciences,11(7), 222-229. Ogawa, K. (2017). Special Contribution Business Innovation in IoT Era: Rebuilding Business Model for Monozukuri.FUJITSU Sci. Tech. J,53(4), 3-9. Pawar, M. R., & Rizvi, I. (2018, May). Face Authentication and IOT-Based Automobile Security and Driver Surveillance System. InInternational Conference on ISMAC in Computational Vision and Bio- Engineering(pp. 679-686). Springer, Cham. Rao, A. T., Rajeswari, K., Kumar, K. S., Devi, K. U., Deepika, M. M., & Prakash, D. S. (2018, April). Multi Purpose Security System in Automobile Industry. In2018 International Conference on Communication and Signal Processing (ICCSP)(pp. 0728-0732). IEEE. Sowmya, B. J., Kumar, D. P., & Srinivasa, K. G. (2017). Paving the Future of Vehicle Maintenance, Breakdown Assistance and Weather Prediction Using IoT in Automobiles. InProceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications(pp. 693-702). Springer, Singapore. Srinivasan, A. (2018, September). IoT Cloud Based Real Time Automobile Monitoring System. In2018 3rd IEEE International Conference on Intelligent Transportation Engineering (ICITE)(pp. 231-235). IEEE. Thirunavukkarasu, G. S., Champion, B., Horan, B., Seyedmahmoudian, M., & Stojcevski, A. (2018, October). IoT-Based System Health Management Infrastructure as a Service. InProceedings of the 2018 International Conference on Cloud Computing and Internet of Things(pp. 55-61). ACM. Tian, J., Chin, A., & Karg, M. (2016). Digital services in the automotive industry.IT Professional,18(5), 4-6. Wang, P., Chaudhry, S., & Li, L. (2016). Introduction: advances in IoT research and applications.Internet Research,26(2). Weis, A., Strandskov, M., Yelamarthi, K., Aman, M. S., & Abdelgawad, A. (2017, May). Rapid deployment of IoT enabled system for automobile fuel range and gas price location. In2017 IEEE International Conference on Electro Information Technology (EIT)(pp. 452-455). IEEE. Yerpude, S., & Singhal, T. (2018). Customer Service Enhancement through On-Road Vehicle Assistance Enabled with Internet of Things (IoT) Solutions and Frameworks: A Futuristic Perspective.International Journal of Applied Business and Economic Research,15(16), 551-565. Zhou, K., Liu, T., & Liang, L. (2016). From cyber-physical systems to Industry 4.0: Make future manufacturing become possible.International Journal of Manufacturing Research,11(2), 167-188.