{"id":"https://openalex.org/W3091747028","doi":"https://doi.org/10.1109/ice/itmc49519.2020.9198458","title":"IT security challenges for continuously connected near-autonomous vehicles","display_name":"IT security challenges for continuously connected near-autonomous vehicles","publication_year":2020,"publication_date":"2020-06-01","ids":{"openalex":"https://openalex.org/W3091747028","doi":"https://doi.org/10.1109/ice/itmc49519.2020.9198458","mag":"3091747028"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/ice/itmc49519.2020.9198458","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5052871589","display_name":"David Virag","orcid":null},"institutions":[],"countries":["NL"],"is_corresponding":false,"raw_author_name":"David Virag","raw_affiliation_strings":["Accenture Security, Accenture Netherlands, Amsterdam, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Accenture Security, Accenture Netherlands, Amsterdam, The Netherlands","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059496850","display_name":"Tyron Offerman","orcid":"https://orcid.org/0009-0006-9341-2419"},"institutions":[{"id":"https://openalex.org/I121797337","display_name":"Leiden University","ror":"https://ror.org/027bh9e22","country_code":"NL","type":"education","lineage":["https://openalex.org/I121797337"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Tyron Offerman","raw_affiliation_strings":["Leiden Institute of Advanced Computer Science, Leiden University, Leiden, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Leiden Institute of Advanced Computer Science, Leiden University, Leiden, The Netherlands","institution_ids":["https://openalex.org/I121797337"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110715182","display_name":"Bart de Jong","orcid":null},"institutions":[],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Bart de Jong","raw_affiliation_strings":["Accenture Security, Accenture Netherlands, Amsterdam, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Accenture Security, Accenture Netherlands, Amsterdam, The Netherlands","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5062774048","display_name":"Mike Preu\u00df","orcid":"https://orcid.org/0000-0003-4681-1346"},"institutions":[{"id":"https://openalex.org/I121797337","display_name":"Leiden University","ror":"https://ror.org/027bh9e22","country_code":"NL","type":"education","lineage":["https://openalex.org/I121797337"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Mike Preuss","raw_affiliation_strings":["Leiden Institute of Advanced Computer Science, Leiden University, Leiden, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Leiden Institute of Advanced Computer Science, Leiden University, Leiden, The Netherlands","institution_ids":["https://openalex.org/I121797337"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.296063,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":61,"max":69},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11099","display_name":"Autonomous Vehicle Technology and Safety","score":0.9948,"subfield":{"id":"https://openalex.org/subfields/2203","display_name":"Automotive Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.976,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/desk","display_name":"Desk","score":0.6439971},{"id":"https://openalex.org/keywords/security-through-obscurity","display_name":"Security through obscurity","score":0.5390005}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6756087},{"id":"https://openalex.org/C2776545233","wikidata":"https://www.wikidata.org/wiki/Q1064858","display_name":"Desk","level":2,"score":0.6439971},{"id":"https://openalex.org/C526921623","wikidata":"https://www.wikidata.org/wiki/Q190117","display_name":"Automotive industry","level":2,"score":0.59792525},{"id":"https://openalex.org/C114869243","wikidata":"https://www.wikidata.org/wiki/Q133735","display_name":"Security through obscurity","level":5,"score":0.5390005},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.52491176},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.46757275},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.390132},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.37500906},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.3523665},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.33558494},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.2663655},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.17767736},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.126106},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/ice/itmc49519.2020.9198458","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":12,"referenced_works":["https://openalex.org/W133259797","https://openalex.org/W1445294979","https://openalex.org/W1524616492","https://openalex.org/W1558912087","https://openalex.org/W1881619864","https://openalex.org/W1992900191","https://openalex.org/W2116520617","https://openalex.org/W2530179903","https://openalex.org/W2597561986","https://openalex.org/W2611814963","https://openalex.org/W4242609399","https://openalex.org/W87635799"],"related_works":["https://openalex.org/W3195904671","https://openalex.org/W293735344","https://openalex.org/W2495229164","https://openalex.org/W2372674753","https://openalex.org/W2353177111","https://openalex.org/W2345270111","https://openalex.org/W2336014427","https://openalex.org/W2092708554","https://openalex.org/W2065250680","https://openalex.org/W139145738"],"abstract_inverted_index":{"Connected":[0],"cars":[1,12,34],"are":[2,19,36],"becoming":[3],"more":[4,196,222],"prominent":[5],"and":[6,30,78,81,103,118,126,134,170,188,216],"will":[7],"be":[8],"the":[9,14,40,44,53,98,106,124,135,138,211,225],"standard":[10],"for":[11,129,168],"in":[13,59,92,132,174],"near":[15],"future.":[16],"These":[17],"vehicles":[18],"equipped":[20],"with":[21,72,230],"advanced":[22],"functionalities":[23],"such":[24],"as":[25],"near-full":[26],"autonomous":[27],"driving":[28],"capabilities,":[29],"over-the-air":[31],"updates.":[32],"However,":[33],"that":[35,193,228],"always":[37],"connected":[38,61,93,109,175],"to":[39,201,209,220],"Internet":[41],"also":[42],"raise":[43],"question":[45],"of":[46,56,89,108,115,146,158,179,214,224,234],"security.":[47],"In":[48,64],"this":[49,65],"paper,":[50],"we":[51,67,82,96,122,142],"analyze":[52],"current":[54],"challenges":[55,125],"IT":[57,130,172,197,212],"security":[58,73,91,131,147,173,180,198,205,213],"continuously":[60],"near-autonomous":[62],"cars.":[63,94,110,176,236],"study,":[66],"conducted":[68,83],"10":[69],"qualitative":[70],"interviews":[71],"experts":[74],"from":[75],"consulting,":[76],"manufacturing,":[77],"software":[79],"engineering,":[80],"desk":[84],"research":[85],"on":[86,101,112,150],"case":[87],"studies":[88],"failing":[90],"Additionally,":[95],"surveyed":[97],"general":[99],"public":[100],"understanding":[102],"awareness":[104,136],"concerning":[105],"risks":[107],"Based":[111],"351":[113],"minutes":[114],"recorded":[116],"audio":[117],"100":[119],"survey":[120],"responses,":[121],"discuss":[123],"potential":[127],"improvements":[128],"automotive":[133],"about":[137],"possible":[139,226],"vulnerabilities.":[140],"Furthermore,":[141],"provide":[143],"an":[144],"analysis":[145],"breaches":[148],"based":[149],"five":[151],"p":[152],"ublished":[153],"cases.":[154],"As":[155],"a":[156,182],"result":[157],"our":[159],"findings,":[160],"w":[161],"e":[162,163],"mphasize":[164],"t":[165],"he":[166],"need":[167,195,208,219],"better":[169],"integrated":[171],"The":[177],"improvement":[178],"is":[181],"joint":[183],"effort":[184],"by":[185],"manufacturers,":[186],"governments,":[187],"car":[189,217],"users.":[190],"We":[191],"recommend":[192],"manufacturers":[194],"expert":[199],"knowledge":[200],"further":[202],"develop":[203],"appropriate":[204],"measures,":[206],"governments":[207],"regulate":[210],"cars,":[215],"users":[218],"become":[221],"aware":[223],"threats":[227],"come":[229],"continuous":[231],"online":[232],"connectivity":[233],"their":[235]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W3091747028","counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2024-12-10T05:50:16.073781","created_date":"2020-10-08"}