Loading…

Vulnerabilities Exploitation in Automative Hacking using Hardware and Software Implementation

Technological advancements in automobile industry has hit its peak by visualizing cars as giant moving computers connected to cloud and providing data instantly. There is a massive increase in automotive hacking for the past five years. In this paper, a thorough analysis and survey has been made on...

Full description

Saved in:
Bibliographic Details
Main Authors: A., Jesudoss, Helen, Suji, A., Christy, S., Meena, Theresa, Mercy, Rajesh, Sudha
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Technological advancements in automobile industry has hit its peak by visualizing cars as giant moving computers connected to cloud and providing data instantly. There is a massive increase in automotive hacking for the past five years. In this paper, a thorough analysis and survey has been made on how the connected cars are compromised and how they can be prevented from such malicious attacks. Each and every possibility for hacking has been scrutinized and explored. The reliable and effective solutions for avoiding these vehicle attacks have been proposed efficiently. The future design considerations are also suggested so to mitigate the number of attacks and to provide a robust and secured framework for connected vehicles.
ISSN:2768-5330
DOI:10.1109/ICICCS53718.2022.9788268