Wireless Security Within New Model Vehicles

Abstract:

Vehicles currently on the market are more like computers on wheels than most consumers would even begin to imagine. In fact, consumers rarely consider whether their new vehicles could be hacked in a fashion similar to their home PCs. Recently, attacks on vehicles have been brought into the spotlight, a reality that is making vehicle cyber security a priority with both vehicle manufacturers and politicians, and through both manufacturers’ designs and U.S. Senate bills. This paper explores the means by which a vehicle could potentially be hacked, what ramifications come from a hacking attack, and how a vehicle could be protected against attacks.


AUTHORS

Image of Jennifer Halahan

Department of Math, Computer Science & Information Systems California University of Pennsylvania
California, PA, U.S.A.

Jennifer Halahan is a student in the Professional Science Master’s in Cybersecurity program at the California University of Pennsylvania. She earned a bachelor’s degree from Duquesne University. She is currently working as a Workflow Technician for Allegheny County.   She is interested in the broad area of cyber security.

Image of Dr. Weifeng Chen

Department of Math, Computer Science & Information Systems California University of Pennsylvania
California, PA, U.S.A.

Dr. Weifeng Chen is a Professor in the Department of Math, Computer Science & Information Systems at the California University of Pennsylvania. He is also the coordinator of the Professional Science Master’s in Cybersecurity program. He earned a doctorate in Computer Science from the University of Massachusetts Amherst.  His research interests include network security and privacy.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.

Subscribe

Keywords

C

C2
C2S
CDX
CIA
CIP
CPS

I

IA
ICS

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

  • Journal of Information Warfare
    114 Ballard Street
    Yorktown, VA
    23690
  • 757.871.3949
  • jiw@gbpts.com