Analysis of IoT Security Challenges in the Automobile Industry

Verified

Added on  2023/01/23

|8
|5004
|29
Report
AI Summary
This report, focusing on the application of IoT in the automobile industry, addresses the security challenges arising from its implementation. The report begins with an abstract defining IoT and its role in data management, followed by an analysis of the problem statement: security issues in automobiles due to IoT. An annotated bibliography reviews several research articles, highlighting concerns such as ethical, technological, and privacy issues. The literature review delves into security threats like front door, back door, and Sybil attacks, along with packet dropping attacks. It discusses the vulnerabilities associated with data dissemination, identity management, and impersonation. The report emphasizes the need for robust security measures, addressing the potential for data breaches, malicious data dissemination, and denial-of-service attacks, ultimately impacting driver safety and vehicle security.
Document Page
IoT in Automobile Industry
Student Name – Student ID
Masters in IT – Networking
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
ABSTRACT Internet of things can be defined as a specific concept that would help in connecting numerous devices in a
specific network. This paper discusses regarding the security challenges faced by the IoT network implemented in the
automobile industry. In the times of digital media, internet of things plays a vital role of data warehouse and information
servers. This assignment discusses regarding the studies carried out by various researchers as well as IoT security. Internet of
things allows the transformational change and there is no question that automotive sector has been changing at a rapid rate.
Technologies that are related to internet of things would draw the map for that particular industry for following.
1. ANALYSIS
This particular report aims in focusing on
the application of a specific technology in a
certain industry. The technology chosen for
this particular report includes Internet of
Things and the industry chosen is
Automobile industry (Wang, Chaudhry &
Li, 2016). This report presents the analysis
of the topic and the future discussions that
would be carried out. On the basis of the
topic chosen, IoT in automobile industry, a
problem statement has been figured out for
this assignment. The problem statement of
the assignment is the security issues faced
by the industry of automobiles due to the
implementation of IoT.
2. ANNOTATED BIBLIOGRAPHY
Krasniqi, X., & Hajrizi, E. (2016). Use of
IoT technology to drive the automotive
industry from connected to full
autonomous vehicles. IFAC-
PapersOnLine, 49(29), 269-274.
This article describes regarding the fact that
security issues in the implementation of the
internet of things in the industry of
automobiles might cause due to various
instances. These instances include ethical,
technology as well as privacy concerns. This
particular article focuses more on the
security issues that are faced by the
automobile industry when internet of things
is implemented to it. It presents the fact the
security issues faced by the automobiles
might result in causing harm to the vehicles,
drivers and to the industry as a whole. The
main strength of the article is that it reflects
on the issues faced by the implementation of
IoT in the industry of automobiles and the
weakness of the article is that it does not
discuss regarding recommendations to solve
them.
Majeed, A. A., & Rupasinghe, T. D.
(2017). Internet of things (IoT) embedded
future supply chains for industry 4.0: An
assessment from an ERP-based fashion
apparel and footwear
industry. International Journal of Supply
Chain Management, 6(1), 25-40.
This particular article reflects on the fact
that when internet of things is implemented
in connected cars there are various security
issues that might occur. Some important
components involved in the security
concerns of this matter includes
authentication, data channel access control
and data encryption. Concentrating on data
channel access control, which has a fine
grain publish as well as permission to
subscribe to a particular channel or a user
proves to an important tool for the security
of internet of things.
Tian, J., Chin, A., & Karg, M. (2016).
Digital services in the automotive
industry. IT Professional, 18(5), 4-6.
This particular article concentrates on
describing various security issues along with
other issues faced by the automobile
industry when internet of things is
implemented in it. it further mentions that
the authentication of users help people to
restrict, create as well as close open
channels between client applications,
servers and connected vehicles. Along with
connected vehicles developers of IoT are
able to build applications that are point to
point and where various data streams that
Document Page
are bidirectional between various devices. It
provides the ability to grant as well as
revoke the access to user connections is a
different security layer on the top of AES as
well as SSL encryption. This article focuses
more on the encryption of data in this
context, though it does not focus much on
other topics.
Aris, I. B., Sahbusdin, R. K. Z., & Amin,
A. F. M. (2015, May). Impacts of IoT and
big data to automotive industry. In 2015
10th Asian Control Conference
(ASCC) (pp. 1-5). IEEE.
This article describes regarding the
specifications of vehicles that have IoT
implemented in them, it focuses on the
technical issues that might take place and
hence the security issues might occur. It
further discusses regarding the testing
procedures that can be carried out for the
purpose of avoiding these issues. This
article describes regarding the technical
issues which has not been mentioned in
other articles.
Dhall, R., & Solanki, V. (2017). An IoT
Based Predictive Connected Car
Maintenance. International Journal of
Interactive Multimedia & Artificial
Intelligence, 4(3).
This article has discussed regarding the fact
that the connected revolution has reached
the industry of automobiles as well as the
internet penetrates into various modern
vehicles. This acquires data from the
vehicles and proves to be a tool of fleet
management system; this handles the
commercial vehicles as well. This further
affects the data related to the users because
the vehicles tend to share the data with their
neighboring vehicles. This article focuses on
the external issues that might cause security
issues but it does not discuss regarding any
other security issues.
Weis, A., Strandskov, M., Yelamarthi, K.,
Aman, M. S., & Abdelgawad, A. (2017,
May). Rapid deployment of IoT enabled
system for automobile fuel range and gas
price location. In 2017 IEEE International
Conference on Electro Information
Technology (EIT) (pp. 452-455). IEEE.
This article represents the fact that in recent
year’s connectivity had started to appear in
the vehicles of passengers as well. The
initial features had been infotainment as
well as navigation, and having less security
needs that remains far from the vehicular
networks. The strength of the article
includes the discussion regarding the issues
in an elaborative manner.
Thirunavukkarasu, G. S., Champion, B.,
Horan, B., Seyedmahmoudian, M., &
Stojcevski, A. (2018, October). IoT-Based
System Health Management
Infrastructure as a Service.
In Proceedings of the 2018 International
Conference on Cloud Computing and
Internet of Things (pp. 55-61). ACM.
This article discusses regarding the issues
due to telemetric as well as remote controls
like keyless entry that appeared and as well
as created a newly imposed security threat
in the vehicle. This articles does concentrate
on the issues faced by the industry but does
not describe them in details.
Luís-Ferreira, F., Ghimire, S., Sarraipa,
J., & Jardim-Goncalves, R. (2016,
November). IoT and Self-Driving Cars a
Revolution Beyond the Automobile
Industry. In ASME 2016 International
Mechanical Engineering Congress and
Exposition (pp. V002T02A038-
V002T02A038). American Society of
Mechanical Engineers.
This article discusses on the ways using
which the connected features change the
vehicle and then present vulnerabilities of
Document Page
every element in order to show the
importance of security design of cautious
system. It further discusses regarding the
fact that open source has not been
automatically secured compared to the
closed source. The strength includes the fact
that it discusses regarding a unique topic
which is not discusses in many more
articles.
Gong, W. (2016). The Internet of Things
(IoT): What is the potential of the internet
of things (IoT) as a marketing tool?
(Bachelor's thesis, University of Twente).
This particular article discusses on the
security issues that are faced by the issues in
vehicle electronics as well as engine control
units. These issues include engine control
module, brake control module, transmission
control module, power train control module
and many more. Some of the vehicles have
around 80 ECUs whereas the new features
have been added. Some new features have
then been added in the existing systems.
This makes the system even more
vulnerable. Along with this the addition of
the IVI systems, vehicle telemetric, smart
phone links and similar technologies make
the vehicles even more vulnerable. This
article describes the issues created due to
other devices, it does not discuss regarding
common issues.
Huo, Y., Tu, W., Sheng, Z., & Leung, V.
C. (2015, December). A survey of in-
vehicle communications: Requirements,
solutions and opportunities in IoT.
In 2015 IEEE 2nd World Forum on
Internet of Things (WF-IoT) (pp. 132-
137). IEEE.
This particular attacks describes regarding
various types of security attacks, these
include front door attacks, back door attacks
and exploits. The front door attacks
commander the access mechanism of actual
equipments manufacturer. The back door
attacks apply more hardware that functions
traditionally and hence results in providing
hacking approaches. The exploits discover
unintentional access to various mechanisms.
The strength of this particular article is that
it describes regarding the types of attacks
that might take place in the industry of
automobiles after the implementation of
internet of things. A weakness includes the
fact that it covers all the attacks in short but
does not discuss regarding a specific issue in
details. It also does not discuss regarding the
unique issues faced by the industry.
3. LITERATURE REVIEW
In this particular section, the privacy as well as
security challenges that are faced by the automobile
industry due to implementation of internet of things
are mentioned (Yerpude & Singhal, 2018). In this
particular case, the vehicles might disseminate
various confidential data that re related to various
important events like conditions of road, congestion
on roads due to traffic, notifications of accidents as
well as distributed management of traffic. Vehicles
access this sort of data from numerous
neighbouring vehicles and sometimes from the
environment for detecting the collision or traffic
congestion. According to Sowmya, Kumar and
Srinivasa (2017) in various conditions, the presence
of numerous malicious as well as misbehaving
nodes because falsified as well as fabricated data
dissemination of the network, thus has high chances
of leading into drastic situations. This compromises
the security, safety as well as privacy of the
potential users (Mohandas & Aravindhar, 2017). As
per the implementation of internet of things in the
automobile industry does not have any centralized
administration or any control. Various security
protocols that need a third party that is trusted and
centralized or needs time connectivity like public
key infrastructure might not be used. This
automatically gives chances t hackers for causing
serious attacks at numerous levels.
According to Zhou, Liu and Liang (2016), in the
case of implementing internet of things in
automobile industry, the absence of proper identity
management system results in making the vehicles
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
a target for numerous identity attacks. An example
of these kinds of attacks includes Sybil attacks. A
particular Sybil attacker is able to create as well as
manage numerous phony identities that are allowed
to share fake data in the network. This is done for
crafting a specific false impression of the non
existing events. As per Ogawa (2017), an example
of Sybil attacks include, the dissemination of faked
information that has been generated by Sybil
attackers regarding nonexistent road congestion as
well as accidents has the chance to maliciously
divert traffic; this is done in order to attempt
robbery, car stealth purpose and kidnapping. These
incidents are detrimental to the drivers as well as
vehicles security and safety. According to Kodama
(2018), a particular attacker is allowed to steal
others innocent nodes credentials for the purpose of
enjoying maliciously the privileges and rights that
is associated with the stolen identities or commit
malicious and misbehaving activities like denial of
service attacks and many more similar activities.
These malicious activities are performed without
being responsible for these acts. This series of
activities that harm the vehicle as well as the drivers
is called impersonation and masquerading attack.
The implementation of internet of things in
automobile industry is very much vulnerable to the
attacks that are packet dropping in nature like black
hole, wormhole attacks, gray hole attacks and some
more similar attacks (Pawar & Rizvi, 2018). These
attacks cause denial of service attacks for various
vehicles that are individual or the groups of
numerous vehicles. In numerous cases, the vehicles
are connected in links and they communicate to
various other vehicles in a specific network. This
makes them vulnerable towards numerous sort of
attacks like analysis of traffic, eavesdropping
attacks and jamming attacks (Srinivasan, 2018).
These attacks have been launched against the
automobiles. The above mentioned attacks are
called inter vehicle attacks. Nowadays the modern
vehicles includes a specific set of sensors that are
responsible for performing numerous tasks like
checking the distance between the vehicles as well
as road conditions, fire and smoke detection,
acceleration and deceleration of vehicles, detection
radar of obstacles and many more. As per Ghosh,
Martin & Stelmach (2017), intra vehicle attacks are
very much detrimental to the safety as well as
security of the drivers and the vehicle which
misleads a sensor and might result n harming the
vehicle as well as the driver. An example of this has
been provided by Rao, Rajeswari and Kumar
(2018), disabling the system of braking or steering
wheel by a particular attacker in a specific
autonomous vehicle might endanger the life of the
driver.
4. INTRODUCTION
Internet of tings or the concept of
connecting devices over a particular
network is not a fancy technology for the
purpose of using it in the future. It has been
changing the way people live as well as lead
their live. In the sector of automobiles, the
implementation of IoT has allowed a greater
rate of efficiency in the modes of
transportation (Gupta & Rakesh, 2018). It
also provides efficiency in the concept of
managing the transport facilities provided to
people. This has been leading people to a
particular future of intelligent autonomous
vehicles. The global automotive internet of
things market has been expected to reach
around $106.32 billion within the year 2023
and driven by the increasing need for the
purpose of saving time (Kodama & Shibata,
2017). As well as provide maximum
productivity in the world that paces at a
rapid speed.
The introduction of high speed network of
mobile technology in the horizon would
catalyse the growth at a rapid rate. This
would be catalysed with the help of faster
transfer of rate, response times as well as
enhanced communication between vehicles
(Kanishkar, Pandit & Bhat, 2018). Internet
of things has adopted the great rate of
adoption in numerous areas within the
sector of automobiles. Some most important
interesting applications of the internet of
things in the industry of automobiles might
be categorized into various parts, these parts
include in vehicle infotainment, predictive
maintenance, security, safety and
Document Page
surveillance, dashboard reporting and data
analytics, real timing monitoring, cognitive
insights for the purpose of management and
many more (Wang, Chaudhry & Li, 2016).
The ability to track and code objects has
been enabled for various organizations and
this has helped them in becoming more
efficient. This particular assignment
discusses regarding various security issues
that is faced by the industry of automobiles
by the implementation of internet of things
(Dhall & Solanki, 2017). Some of the issues
include exposing the driver’s data and
making them accessible to the hackers and
many more. These issues have been
discussed in details in several parts of this
assignment, the assignment further discusses
regarding various recommendations that can
be implemented for the purpose of avoiding
these issues in the automobile industry.
5. RECOMMENDATIONS
Inspite of various benefits provided by internet of
things in the industry of automobiles, the security
concerns prove to a major drawback for the system.
The main concern is the automotive IoT
applications that are considered to be a very easy
target for various cyber attacks that might lead to a
serious level of negative consequences (Weis,
Strandskov & Yelamarthi, 2017). There are
numerous techniques that can be used in preventing
these hacks or any kind of security issue in this
particular field. These ways are as follows
Paying attention to the authorization process of
the application: This technique usually sounds
obvious but it is not followed by most of the users.
The users must not set passwords that can be
cracked without any hard work, or that are very
easy to access, the users must set very strong
password such as limiting the minimum needed
number of symbols or introduce the rules which
require a particular set of symbols that the password
must contain such as letters, symbols and numbers
(Pawar & Rizvi, 2018). One more efficient method
which adds one more layer of security includes
two-factor authentication. There are numerous
readymade solutions which can be easily integrated
into the applications. With the help of this, the users
would be able to address some major security risks
of internet of things with very less or almost no
effort.
Applying basic techniques of data privacy: when
data protection is considered, tokenization,
encryption and anonymization must be considered
the most. Since a connected device handles a huge
amount of sensitive information, the solutions of
IoT security must also include various techniques
(Thirunavukkarasu, Champion and Horan, 2018).
Hence the data of the users would be entirely
anonymous, safely stored and encrypted in the
user’s database.
Carrying out regular security updates: the longer
a product stays unchanged, the more chances
hackers get in order to crack its codes. The
applications must be made a moving target and the
users must look for various techniques with which
they can secure their application (Luís-Ferreira,
Ghimire & Sarraipa, 2016). There are numerous
techniques that can be introduced in order to make
connected driving an enjoyable and safe experience.
Users must also be aware of certain basic security
policies while using their vehicles connected to
internet. An example of this is that users are not
suggested to connect sort of unauthorized devices
or any sort of applications with their vehicle; they
must also not make use of any sort of public
networks (Huo, Sheng & Leung, 2015). Usage of
public networks might result in providing a chance
to hacker, they might get some data related to the
users and the vehicles, this data might be used by
the hackers for the purpose of illegal activities.
6. CONCLUSION
From the above assignment it can be concluded that
internet of things can be defined as a specific
concept that would help in connecting numerous
devices in a specific network. This paper discusses
regarding the security challenges faced by the IoT
network implemented in the automobile industry. In
the times of digital media, internet of things plays a
vital role of data warehouse and information
servers. Network of internet of things are utilized in
various industries. There are numerous loop holes
Document Page
that exist in the IoT based security network. This
particular assignment discusses regarding the
security aspects in the networks of IoT. This
assignment discusses regarding the studies carried
out by various researchers as well as IoT security.
Internet of things allows the transformational
change and there has been no change when sector
of automobiles has been changing at a rapid rate.
Technologies that are related to internet of things
would draw the map for that particular industry for
following. The connected vehicle would play a vital
role in the roads as well as in economy of future.
The struggle among the automakers as well as
software developers can be considered as a
symptom of ongoing transformation such as birth
pangs because the industry tends to reinvent its
operations. In order to strengthen the position of the
organizations producing vehicles they can undergo
various steps, these steps include aligning a vision
of a specific role that would be played by the
business in the process of understanding as well as
accepting the transformational impacts that would
be created on the business as well as on the
traditional ways of thinking.
The development of a clean mapping of where the
data is originated as well as who owns it for every
service that has been delivered in order to
understand where the data is being captured. One
more step includes developing a roadmap for the
purpose of shifting to an approach that is service-
oriented in nature as a particular organization not
only in the vehicle divisions that are connected, for
the purpose of enabling ongoing interaction with
various customers of the organization all over their
life cycle. The organization must also accept
various capabilities which need to be built using an
internal process or acquire using an external
method. It must also seek a good level of
involvement in the ownership of the in vehicle
platform of software development. This particular
assignment describes regarding the concept of
implementation of internet of things in the industry
of automobiles, it further discusses regarding the
security issues that are faced by the automakers as
well as passengers in the implementation of internet
of things. These aspects have been discussed in the
discussion part of the assignment in details.
7. REFERENCES
Aris, I. B., Sahbusdin, R. K. Z., & Amin, A. F.
M. (2015, May). Impacts of IoT and big
data to automotive industry. In 2015 10th
Asian Control Conference (ASCC) (pp. 1-5).
IEEE.
Dhall, R., & Solanki, V. (2017). An IoT Based
Predictive Connected Car
Maintenance. International Journal of
Interactive Multimedia & Artificial
Intelligence, 4(3).
Ghosh, S., Martin, S., & Stelmach, S. (2017,
September). Reliability for IoT and
Automotive markets. In 2017 30th IEEE
International System-on-Chip Conference
(SOCC) (pp. 1-3). IEEE.
Gong, W. (2016). The Internet of Things (IoT):
What is the potential of the internet of things
(IoT) as a marketing tool?(Bachelor's thesis,
University of Twente).
Gupta, K., & Rakesh, N. (2018, January). IoT
Based Automobile Air Pollution Monitoring
System. In 2018 8th International
Conference on Cloud Computing, Data
Science & Engineering (Confluence) (pp.
14-15). IEEE.
Huo, Y., Tu, W., Sheng, Z., & Leung, V. C.
(2015, December). A survey of in-vehicle
communications: Requirements, solutions
and opportunities in IoT. In 2015 IEEE 2nd
World Forum on Internet of Things (WF-
IoT) (pp. 132-137). IEEE.
Kanishkar, P., SA, S. K., Pandit, K., & Bhat, G.
(2018). 3D Vibration Monitoring Sensor for
Automobiles Using Internet of Things (IoT).
Kodama, F. (2018). An Empirical Study of
Contrasting IoT with IT: Evidences of
Differences Drawn from Japanese
Experiences. American Journal of Industrial
and Business Management, 8(01), 27.
Kodama, F., & Shibata, T. (2017). Beyond
fusion towards IoT by way of open
innovation: an investigation based on the
Japanese machine tool industry 1975-
2015. Journal of Open Innovation:
Technology, Market, and Complexity, 3(4),
23.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Krasniqi, X., & Hajrizi, E. (2016). Use of IoT
technology to drive the automotive industry
from connected to full autonomous
vehicles. IFAC-PapersOnLine, 49(29), 269-
274.
Luís-Ferreira, F., Ghimire, S., Sarraipa, J., &
Jardim-Goncalves, R. (2016, November).
IoT and Self-Driving Cars a Revolution
Beyond the Automobile Industry. In ASME
2016 International Mechanical Engineering
Congress and Exposition (pp.
V002T02A038-V002T02A038). American
Society of Mechanical Engineers.
Majeed, A. A., & Rupasinghe, T. D. (2017).
Internet of things (IoT) embedded future
supply chains for industry 4.0: An
assessment from an ERP-based fashion
apparel and footwear industry. International
Journal of Supply Chain Management, 6(1),
25-40.
Mohandas, R., & Aravindhar, D. J. (2017). A
survey on IoT: business perspective
predictions, trends and marketing. Advances
in Natural and Applied Sciences, 11(7),
222-229.
Ogawa, K. (2017). Special Contribution
Business Innovation in IoT Era: Rebuilding
Business Model for Monozukuri. FUJITSU
Sci. Tech. J, 53(4), 3-9.
Pawar, M. R., & Rizvi, I. (2018, May). Face
Authentication and IOT-Based Automobile
Security and Driver Surveillance System.
In International Conference on ISMAC in
Computational Vision and Bio-
Engineering (pp. 679-686). Springer, Cham.
Rao, A. T., Rajeswari, K., Kumar, K. S., Devi,
K. U., Deepika, M. M., & Prakash, D. S.
(2018, April). Multi Purpose Security
System in Automobile Industry. In 2018
International Conference on
Communication and Signal Processing
(ICCSP) (pp. 0728-0732). IEEE.
Sowmya, B. J., Kumar, D. P., & Srinivasa, K.
G. (2017). Paving the Future of Vehicle
Maintenance, Breakdown Assistance and
Weather Prediction Using IoT in
Automobiles. In Proceedings of the 5th
International Conference on Frontiers in
Intelligent Computing: Theory and
Applications(pp. 693-702). Springer,
Singapore.
Srinivasan, A. (2018, September). IoT Cloud
Based Real Time Automobile Monitoring
System. In 2018 3rd IEEE International
Conference on Intelligent Transportation
Engineering (ICITE)(pp. 231-235). IEEE.
Thirunavukkarasu, G. S., Champion, B., Horan,
B., Seyedmahmoudian, M., & Stojcevski, A.
(2018, October). IoT-Based System Health
Management Infrastructure as a Service.
In Proceedings of the 2018 International
Conference on Cloud Computing and
Internet of Things (pp. 55-61). ACM.
Tian, J., Chin, A., & Karg, M. (2016). Digital
services in the automotive industry. IT
Professional, 18(5), 4-6.
Wang, P., Chaudhry, S., & Li, L. (2016).
Introduction: advances in IoT research and
applications. Internet Research, 26(2).
Weis, A., Strandskov, M., Yelamarthi, K.,
Aman, M. S., & Abdelgawad, A. (2017,
May). Rapid deployment of IoT enabled
system for automobile fuel range and gas
price location. In 2017 IEEE International
Conference on Electro Information
Technology (EIT) (pp. 452-455). IEEE.
Yerpude, S., & Singhal, T. (2018). Customer
Service Enhancement through On-Road
Vehicle Assistance Enabled with Internet of
Things (IoT) Solutions and Frameworks: A
Futuristic Perspective. International Journal
of Applied Business and Economic
Research, 15(16), 551-565.
Zhou, K., Liu, T., & Liang, L. (2016). From
cyber-physical systems to Industry 4.0:
Make future manufacturing become
possible. International Journal of
Manufacturing Research, 11(2), 167-188.
chevron_up_icon
1 out of 8
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]