Loading…
Vulnerabilities Exploitation in Automative Hacking using Hardware and Software Implementation
Technological advancements in automobile industry has hit its peak by visualizing cars as giant moving computers connected to cloud and providing data instantly. There is a massive increase in automotive hacking for the past five years. In this paper, a thorough analysis and survey has been made on...
Saved in:
Main Authors: | , , , , , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Technological advancements in automobile industry has hit its peak by visualizing cars as giant moving computers connected to cloud and providing data instantly. There is a massive increase in automotive hacking for the past five years. In this paper, a thorough analysis and survey has been made on how the connected cars are compromised and how they can be prevented from such malicious attacks. Each and every possibility for hacking has been scrutinized and explored. The reliable and effective solutions for avoiding these vehicle attacks have been proposed efficiently. The future design considerations are also suggested so to mitigate the number of attacks and to provide a robust and secured framework for connected vehicles. |
---|---|
ISSN: | 2768-5330 |
DOI: | 10.1109/ICICCS53718.2022.9788268 |