Research Topic

Automotive Cyber Security

About this Research Topic

Information technology is the driving force behind most innovations in the automotive industry. Today, even compact vehicles have a few tens of interconnected microprocessors with up to several hundred megabytes of software and integrated communication capabilities to the outside world. The situation is similar for commercial vehicles such as trucks and off-highway vehicles.

One crucial aspect of many IT applications in vehicles is IT security. Whereas IT safety is a relatively well established (if not necessarily well understood) field, the protection of automotive IT systems against manipulation has started to emerge more recently. At the same time, security will be an enabling technology for many – perhaps most – future automotive IT applications. IT security will increase both,reliability and safety, while enabling and protecting various new business models.

The research topic of automotive cyber security has been treated intensively at the escar Europe conference 2019, which is a premier platform for information, discussion and exchange of ideas between academia and industry. Topics include:

• Security in the automotive life cycle, e.g., security engineering, safety & security co-design, formal methods, development & validation tools, security standardization and security economics for automotive domain
• Security technologies for automotive components and networks such as hardware security, OTA, sensors, microkernels, security architectures for automotive platforms, biometrics, CAN-bus security, gateways, immobilizer, access, V2X, tolling, intrusion detection, monitoring, automotive SIEM, etc.
• Future security technologies with application to automotive, e.g., distributed ledger technology, PUFs, AI, post quantum algorithms, etc.
• Proof-of-concepts and architectures for security of automotive systems and subsystems, e.g., automotive ECUs and platforms, handling big data, highly-automated and autonomous vehicles, electric vehicles and their back-end infrastructures, cloud connection, etc.
• Security Analysis, e.g., car hacking, protocol analysis, risk analysis, etc.
• Further topics such as usability design, legal aspects, privacy and data protection, security for other transport systems like railway or aerospace


Keywords: automotive security, information security, cyber security, safety & security, security analysis, security engineering process


Important Note: All contributions to this Research Topic must be within the scope of the section and journal to which they are submitted, as defined in their mission statements. Frontiers reserves the right to guide an out-of-scope manuscript to a more suitable section or journal at any stage of peer review.

Information technology is the driving force behind most innovations in the automotive industry. Today, even compact vehicles have a few tens of interconnected microprocessors with up to several hundred megabytes of software and integrated communication capabilities to the outside world. The situation is similar for commercial vehicles such as trucks and off-highway vehicles.

One crucial aspect of many IT applications in vehicles is IT security. Whereas IT safety is a relatively well established (if not necessarily well understood) field, the protection of automotive IT systems against manipulation has started to emerge more recently. At the same time, security will be an enabling technology for many – perhaps most – future automotive IT applications. IT security will increase both,reliability and safety, while enabling and protecting various new business models.

The research topic of automotive cyber security has been treated intensively at the escar Europe conference 2019, which is a premier platform for information, discussion and exchange of ideas between academia and industry. Topics include:

• Security in the automotive life cycle, e.g., security engineering, safety & security co-design, formal methods, development & validation tools, security standardization and security economics for automotive domain
• Security technologies for automotive components and networks such as hardware security, OTA, sensors, microkernels, security architectures for automotive platforms, biometrics, CAN-bus security, gateways, immobilizer, access, V2X, tolling, intrusion detection, monitoring, automotive SIEM, etc.
• Future security technologies with application to automotive, e.g., distributed ledger technology, PUFs, AI, post quantum algorithms, etc.
• Proof-of-concepts and architectures for security of automotive systems and subsystems, e.g., automotive ECUs and platforms, handling big data, highly-automated and autonomous vehicles, electric vehicles and their back-end infrastructures, cloud connection, etc.
• Security Analysis, e.g., car hacking, protocol analysis, risk analysis, etc.
• Further topics such as usability design, legal aspects, privacy and data protection, security for other transport systems like railway or aerospace


Keywords: automotive security, information security, cyber security, safety & security, security analysis, security engineering process


Important Note: All contributions to this Research Topic must be within the scope of the section and journal to which they are submitted, as defined in their mission statements. Frontiers reserves the right to guide an out-of-scope manuscript to a more suitable section or journal at any stage of peer review.

About Frontiers Research Topics

With their unique mixes of varied contributions from Original Research to Review Articles, Research Topics unify the most influential researchers, the latest key findings and historical advances in a hot research area! Find out more on how to host your own Frontiers Research Topic or contribute to one as an author.

Topic Editors

Loading..

Submission Deadlines

31 May 2020 Manuscript

Participating Journals

Manuscripts can be submitted to this Research Topic via the following journals:

Loading..

Topic Editors

Loading..

Submission Deadlines

31 May 2020 Manuscript

Participating Journals

Manuscripts can be submitted to this Research Topic via the following journals:

Loading..
Loading..

total views article views article downloads topic views

}
 
Top countries
Top referring sites
Loading..