Akıllı ulaşım araçlarında siber güvenlik ve çok katmanlı güvenlik önlemi
Yıl 2022,
Cilt: 5 Sayı: 1, 22 - 35, 28.04.2022
İsa Avcı
,
Cevat Özarpa
,
Muammer Özdemir
,
Bahadır Furkan Kınacı
,
Seyit Ali Kara
Öz
Teknolojide yaşanan hızlı gelişmelerle günümüzde kullanımı hızlı artan akıllı ulaşım araçları, artan talep ve sağladıkları kolaylıklar sebebiyle kısa zamanda dünya çapında önemli bir yere sahip olacaktır. Akıllı ve otonom ulaşım araçları alanındaki teknolojik gelişmeler söz konusu olduğunda hızlı bir ivme kazanıldığı göz ardı edilemez. Gelişmiş makine öğrenimi ve yapay zekâ tekniklerinden yararlanan yarı otonom ve otonom arabaların ortaya çıkmasıyla birlikte potansiyel riskler ve siber güvenlik zorlukları artmaktadır. Dahası, akıllı ulaşım sistemlerinin ve otonom araçların konuşlandırılması için gerekli Araçtan Araca (V2V) ve Araçtan Altyapıya (V2I) ara yüzler, potansiyel saldırı yüzeyini ve saldırı vektörlerini büyük ölçüde genişlettikleri için güvenlik risklerini daha da artırmaktadır. Yapay zekâ ve yazılımla çalışan bu araçlar her ne kadar sürücü güvenliği ve konforunu artırsa da dışarıdan gelebilecek siber saldırılardan dolayı büyük ölçekte can ve mal kaybına da sebep olabilmektedir. Bu nedenle, akıllı ulaşım araçları ile ilgili tehditleri ve siber güvenlik risklerini analiz etmek ve bu son derece karmaşık, heterojen ve değişken ortamın özelliklerini dikkate alarak bu riskleri ele almak için güvenlik önlemleri ortaya koymak son derece önemli hale gelmektedir. Bu çalışmada akıllı ulaşım araçlarına yapılan siber güvenlik saldırıları, doğabilecek sonuçlar ve alınabilecek güvenlik önlemleri açıklanmaya ve analiz edilmeye çalışılacaktır. Ayrıca bu sistemlerde kullanılan çok katmanlı savunma sistemi incelenerek değerlendirilmiştir.
Kaynakça
- Abdollahi, B., Zoleikha, S. D., and Pierluigi, P., (2018). “Real-Time Detection and Estimation of Denial of Service Attack in Connected Vehicle Systems.” IEEE Transactions on Intelligent Transportation Systems, 19(12): 3893–3902.
- Al-Khateeb, H. et al., (2018). “Proactive Threat Detection for Connected Cars Using Recursive Bayesian Estimation.” IEEE Sensors Journal, 18(12): 4822–31.
- Alex, K., (2021). “Self Driving Car Statistics for 2021| Policy Advice.” Erişim: 04 Nisan 2021,https://policyadvice.net/insurance/insights/self-driving-car-statistics/.
- Amoozadeh, M. et al., (2015). “Security Vulnerabilities of Connected Vehicle Streams and Their Impact on Cooperative Driving.” IEEE Communications Magazine, 53(6): 126–32.
- Astarita, V., Giofrè, V. P., Mirabelli, G., & Solina, V. (2020). A review of blockchain-based systems in transportation. Information, 11(1): 21.https://doi.org/10.3390/info11010021
- AUS, Akıllı Ulaşım Sistemleri Strateji Belgesi 2020,https://www.utikad.org.tr/Images/Duyuru/05082020ulusalakilliulasimsistemleristratejibelgesive20202023eylemplani1610274.pdf, 08.01.2022.
- Birnie, A., and Timo, V. R., (2016). “A Multi-Layer Vehicle Security Framework.” NXP White Paper: 1–18.
- Chen, A. Q. (2021). Towards Secure and Robust Autonomy Software in Autonomous Driving and Smart Transportation. Association for Computing Machinery, New York, NY, USA:1.https://doi= 10.1145/3457339.3457978,
- Denman, S., (2012). “Why Multi-Layered Security Is Still the Best Defence.” Network Security 2012,(3): 5–7.
- Dibaei, M. et al., (2019). “An Overview of Attacks and Defences on Intelligent Connected Vehicles.” arXiv (July).
- Eisenbarth, T., Kasper, T., Moradi, A. and Paar, C., (2009). 5677 On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme. ed. Shai Halevi. Berlin, Heidelberg: Springer Berlin Heidelberg.
- Eiza, M. H., and Ni, Q., (2017). “Driving with Sharks: Rethinking Connected Vehicles with Vehicle Cybersecurity.” IEEE Vehicular Technology Magazine, 12(2): 45–51.
- El-Rewini, Z. et al., (2020). “Cybersecurity Attacks in Vehicular Sensors.” IEEE Sensors Journal, 20(22): 13752–67.
- Fraiji, Y., Lamia Ben Azzouz, L. B., Trojet, W., and Azouz, S. L., (2018). “Cyber Security Issues of Internet of Electric Vehicles.” IEEE Wireless Communications and Networking Conference, WCNC 2018-April: 1–6.
- Gupta, M., Benson, J., Patwa, F., and Sandhu, R., (2020). “Secure V2V and V2I Communication in Intelligent Transportation Using Cloudlets.” IEEE Transactions on Services Computing, 1374(c): 1–1.
- Huq, N., Gibson, C., and Rainer Vosseler, R., (2020). “Driving Security Into Connected Cars: Threat Model and Recommendations.” Trend Micro.
- Limbasiya, T., & Das, D., Sahay, S. K. (2019). Secure communication protocol for smart transportation based on vehicular cloud. In Adjunct Proceedings of the 2019 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2019 ACM International Symposium on Wearable Computers: 372-376.
- Mhafuzul, I, Chowdhury, M., Hongda Li, H., and Hu, H., (2018). “Cybersecurity Attacks in Vehicle-to-Infrastructure Applications and Their Prevention.” Transportation Research Record, 2672(19): 66–78.
- Jakobsson, M., Wetzel, S., and Yener, B.,(2003). “Stealth Attacks on Ad-Hoc Wireless Networks.” IEEE Vehicular Technology Conference, 58(3): 2103–11.
- Mollah, M. B. et al., (2021). “Blockchain for the Internet of Vehicles towards Intelligent Transportation Systems: A Survey.” IEEE Internet of Things Journal, 8(6): 4157–85.
- Nanda, A., Puthal, D., Joel J.P.C. Rodrigues, and Kozlov, S. A., (2019). “Internet of Autonomous Vehicles Communications Security: Overview, Issues, and Directions.” IEEE Wireless Communications, 26(4): 60–65.
- Ohira, S. et al., (2020). “Normal and Malicious Sliding Windows Similarity Analysis Method for Fast and Accurate IDS against DoS Attacks on In-Vehicle Networks.” IEEE Access, 8: 42422–35.
- Okul, Ş., (2018). “Akıllı Araçlarda Güvenlik Ataklarının Analizi.” İstanbul Üniversitesi Fen Bilimleri Enstitüsü, Yüksek Lisans Tezi.
- Parkinson, S., Ward, P. Wilson, K., and Miller, J., (2017). “Cyber Threats Facing Autonomous and Connected Vehicles: Future Challenges.” IEEE Transactions on Intelligent Transportation Systems, 18(11): 2898–2915.
- Payne, B. R., (2019). “Car Hacking : Accessing and Exploiting the CAN Bus Protocol Car Hacking : Accessing and Exploiting the CAN Bus Protocol.” Journal of Cybersecurity Education, Research and Practice, 2019(1): 5.
- Petit, J., and Shladover, S. E., (2015). “Potential Cyberattacks on Automated Vehicles.” IEEE Transactions on Intelligent Transportation Systems, 16(2): 546–56.
- “Processors Tackle Cybersecurity in Connected Cars - Electronic Products.” Erişim: 03 Nisan 2021, https://www.electronicproducts.com/processors-tackle-cybersecurity-in-connected-cars/#
- Sakız, F., and Şen, S., (2017). “A Survey of Attacks and Detection Mechanisms on Intelligent Transportation Systems: VANETs and IoV.” Ad Hoc Networks, 61(March): 33–50.
- Sun, X., Yu, F. R., and Peng Zhang, P., (2021). “A Survey on Cyber-Security of Connected and Autonomous Vehicles (CAVs ).”: 1–20.
- Tektaş, M., and Tektaş, N., (2019). “Akıllı Ulaşım Sistemleri(AUS) Uygulamalarının Sektörlere Göre Dağılımı.” Akıllı Ulaşım Sistemleri ve Uygulamaları Degisi, 2(1): 2.
- Wang, Y. et al. (2021). “Detection and Isolation of Sensor Attacks for Autonomous Vehicles: Framework, Algorithms, and Validation.” IEEE Transactions on Intelligent Transportation Systems, 1–13.
- Xu, W. et al. (2018). “Analyzing and Enhancing the Security of Ultrasonic Sensors for Autonomous Vehicles.” IEEE Internet of Things Journal, 5(6): 5015–29.
- Yağdereli, E., Gemci, C., and Aktaş, A. Z., (2015). “A Study on Cyber-Security of Autonomous and Unmanned Vehicles.” Journal of Defense Modeling and Simulation,12(4): 369–81.
- Zeadally, S., Guerrero, J. and Contreras, J., (2020). “A Tutorial Survey on Vehicle-to-Vehicle Communications.”Telecommunication Systems, 73(3): 469–89.
Cyber security and multi-layered security measures in smart transportation vehicles
Yıl 2022,
Cilt: 5 Sayı: 1, 22 - 35, 28.04.2022
İsa Avcı
,
Cevat Özarpa
,
Muammer Özdemir
,
Bahadır Furkan Kınacı
,
Seyit Ali Kara
Öz
Smart transportation vehicles are increasing rapidly today with the rapid developments in technology. It will soon have an important place in the world due to the increasing demand and the convenience they provide. When it comes to technological developments in the field of smart and autonomous vehicles, it cannot be ignored that rapid acceleration has been gained. With the advent of semi-autonomous and autonomous cars that leverage advanced machine learning and artificial intelligence techniques, the potential risks and cybersecurity challenges are increasing. Moreover, the Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) interfaces required for the deployment of intelligent transportation systems and autonomous vehicles further increase security risks as they greatly expand the potential attack surface and attack vectors. Although these vehicles, working with artificial intelligence and software, increase driver safety and comfort, they can also cause large-scale loss of life and property due to cyber attacks that may come from outside. Therefore, it becomes extremely important to analyze the threats and cybersecurity risks related to smart vehicles and to put forward security measures to address these risks by taking into account the characteristics of this highly complex, heterogeneous, and variable environment. In this study, cyber security attacks against smart vehicles and the consequences that may arise are examined. In addition, the security measures that can be taken are explained and analyzed. The Multi-Layer Defense System used in these systems was examined and evaluated in detail.
Kaynakça
- Abdollahi, B., Zoleikha, S. D., and Pierluigi, P., (2018). “Real-Time Detection and Estimation of Denial of Service Attack in Connected Vehicle Systems.” IEEE Transactions on Intelligent Transportation Systems, 19(12): 3893–3902.
- Al-Khateeb, H. et al., (2018). “Proactive Threat Detection for Connected Cars Using Recursive Bayesian Estimation.” IEEE Sensors Journal, 18(12): 4822–31.
- Alex, K., (2021). “Self Driving Car Statistics for 2021| Policy Advice.” Erişim: 04 Nisan 2021,https://policyadvice.net/insurance/insights/self-driving-car-statistics/.
- Amoozadeh, M. et al., (2015). “Security Vulnerabilities of Connected Vehicle Streams and Their Impact on Cooperative Driving.” IEEE Communications Magazine, 53(6): 126–32.
- Astarita, V., Giofrè, V. P., Mirabelli, G., & Solina, V. (2020). A review of blockchain-based systems in transportation. Information, 11(1): 21.https://doi.org/10.3390/info11010021
- AUS, Akıllı Ulaşım Sistemleri Strateji Belgesi 2020,https://www.utikad.org.tr/Images/Duyuru/05082020ulusalakilliulasimsistemleristratejibelgesive20202023eylemplani1610274.pdf, 08.01.2022.
- Birnie, A., and Timo, V. R., (2016). “A Multi-Layer Vehicle Security Framework.” NXP White Paper: 1–18.
- Chen, A. Q. (2021). Towards Secure and Robust Autonomy Software in Autonomous Driving and Smart Transportation. Association for Computing Machinery, New York, NY, USA:1.https://doi= 10.1145/3457339.3457978,
- Denman, S., (2012). “Why Multi-Layered Security Is Still the Best Defence.” Network Security 2012,(3): 5–7.
- Dibaei, M. et al., (2019). “An Overview of Attacks and Defences on Intelligent Connected Vehicles.” arXiv (July).
- Eisenbarth, T., Kasper, T., Moradi, A. and Paar, C., (2009). 5677 On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme. ed. Shai Halevi. Berlin, Heidelberg: Springer Berlin Heidelberg.
- Eiza, M. H., and Ni, Q., (2017). “Driving with Sharks: Rethinking Connected Vehicles with Vehicle Cybersecurity.” IEEE Vehicular Technology Magazine, 12(2): 45–51.
- El-Rewini, Z. et al., (2020). “Cybersecurity Attacks in Vehicular Sensors.” IEEE Sensors Journal, 20(22): 13752–67.
- Fraiji, Y., Lamia Ben Azzouz, L. B., Trojet, W., and Azouz, S. L., (2018). “Cyber Security Issues of Internet of Electric Vehicles.” IEEE Wireless Communications and Networking Conference, WCNC 2018-April: 1–6.
- Gupta, M., Benson, J., Patwa, F., and Sandhu, R., (2020). “Secure V2V and V2I Communication in Intelligent Transportation Using Cloudlets.” IEEE Transactions on Services Computing, 1374(c): 1–1.
- Huq, N., Gibson, C., and Rainer Vosseler, R., (2020). “Driving Security Into Connected Cars: Threat Model and Recommendations.” Trend Micro.
- Limbasiya, T., & Das, D., Sahay, S. K. (2019). Secure communication protocol for smart transportation based on vehicular cloud. In Adjunct Proceedings of the 2019 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2019 ACM International Symposium on Wearable Computers: 372-376.
- Mhafuzul, I, Chowdhury, M., Hongda Li, H., and Hu, H., (2018). “Cybersecurity Attacks in Vehicle-to-Infrastructure Applications and Their Prevention.” Transportation Research Record, 2672(19): 66–78.
- Jakobsson, M., Wetzel, S., and Yener, B.,(2003). “Stealth Attacks on Ad-Hoc Wireless Networks.” IEEE Vehicular Technology Conference, 58(3): 2103–11.
- Mollah, M. B. et al., (2021). “Blockchain for the Internet of Vehicles towards Intelligent Transportation Systems: A Survey.” IEEE Internet of Things Journal, 8(6): 4157–85.
- Nanda, A., Puthal, D., Joel J.P.C. Rodrigues, and Kozlov, S. A., (2019). “Internet of Autonomous Vehicles Communications Security: Overview, Issues, and Directions.” IEEE Wireless Communications, 26(4): 60–65.
- Ohira, S. et al., (2020). “Normal and Malicious Sliding Windows Similarity Analysis Method for Fast and Accurate IDS against DoS Attacks on In-Vehicle Networks.” IEEE Access, 8: 42422–35.
- Okul, Ş., (2018). “Akıllı Araçlarda Güvenlik Ataklarının Analizi.” İstanbul Üniversitesi Fen Bilimleri Enstitüsü, Yüksek Lisans Tezi.
- Parkinson, S., Ward, P. Wilson, K., and Miller, J., (2017). “Cyber Threats Facing Autonomous and Connected Vehicles: Future Challenges.” IEEE Transactions on Intelligent Transportation Systems, 18(11): 2898–2915.
- Payne, B. R., (2019). “Car Hacking : Accessing and Exploiting the CAN Bus Protocol Car Hacking : Accessing and Exploiting the CAN Bus Protocol.” Journal of Cybersecurity Education, Research and Practice, 2019(1): 5.
- Petit, J., and Shladover, S. E., (2015). “Potential Cyberattacks on Automated Vehicles.” IEEE Transactions on Intelligent Transportation Systems, 16(2): 546–56.
- “Processors Tackle Cybersecurity in Connected Cars - Electronic Products.” Erişim: 03 Nisan 2021, https://www.electronicproducts.com/processors-tackle-cybersecurity-in-connected-cars/#
- Sakız, F., and Şen, S., (2017). “A Survey of Attacks and Detection Mechanisms on Intelligent Transportation Systems: VANETs and IoV.” Ad Hoc Networks, 61(March): 33–50.
- Sun, X., Yu, F. R., and Peng Zhang, P., (2021). “A Survey on Cyber-Security of Connected and Autonomous Vehicles (CAVs ).”: 1–20.
- Tektaş, M., and Tektaş, N., (2019). “Akıllı Ulaşım Sistemleri(AUS) Uygulamalarının Sektörlere Göre Dağılımı.” Akıllı Ulaşım Sistemleri ve Uygulamaları Degisi, 2(1): 2.
- Wang, Y. et al. (2021). “Detection and Isolation of Sensor Attacks for Autonomous Vehicles: Framework, Algorithms, and Validation.” IEEE Transactions on Intelligent Transportation Systems, 1–13.
- Xu, W. et al. (2018). “Analyzing and Enhancing the Security of Ultrasonic Sensors for Autonomous Vehicles.” IEEE Internet of Things Journal, 5(6): 5015–29.
- Yağdereli, E., Gemci, C., and Aktaş, A. Z., (2015). “A Study on Cyber-Security of Autonomous and Unmanned Vehicles.” Journal of Defense Modeling and Simulation,12(4): 369–81.
- Zeadally, S., Guerrero, J. and Contreras, J., (2020). “A Tutorial Survey on Vehicle-to-Vehicle Communications.”Telecommunication Systems, 73(3): 469–89.