Cybersecurity Research Considerations for Heavy Vehicles
dc.contributor.author | Stachowski, Stephen | |
dc.contributor.author | Bielawski, Russ | |
dc.contributor.author | Weimerskirch, Andre | |
dc.date.accessioned | 2019-10-01T16:38:01Z | |
dc.date.available | 2019-10-01T16:38:01Z | |
dc.date.issued | 2019-10 | |
dc.identifier.govdoc | DOT HS 812 636 | |
dc.identifier.uri | https://hdl.handle.net/2027.42/151379 | |
dc.description.abstract | The intent of this research is to investigate cybersecurity aspects of medium-duty/heavy-duty (MD/HD) trucks (classes 1 to 8) and compare those aspects to passenger vehicles. Information collected had a significant bias towards HD vehicles (class 7/8), as opposed to MD vehicles. This was due to the discovery process yielding very limited data on MD vehicles (class 3 to 6). This directly correlates to the types of responses provided by industry experts and their cybersecurity concerns (mainly by heavy truck OEMs and suppliers). Much focus was centered around their higher electronic content products that typically occur on class 7/8 vehicle platforms. Often, stakeholder feedback indicated that MD trucks have similar vulnerabilities to either light-duty or heavy-duty trucks but not necessarily anything particularly unique to that segment. This generality likely originates from the similarities between MD truck architectures/designs and HD truck architectures. The objective is to develop a framework to understand common features and differences between passenger vehicle and heavy-duty vehicle cybersecurity in terms of lifecycle, threats and risks, electrical/electronic architectures, control applications, security countermeasures, and industry aspects. Considering recent public awareness of passenger vehicle cybersecurity vulnerabilities, NHTSA undertook this research to understand potential impacts in the heavy-truck vehicle domain. This task started with the investigation of heavy-vehicle cybersecurity practices by contrasting the passenger vehicle cybersecurity knowledge-base to that of heavy vehicles. The project next considered risks in a more generic manner, and identified possible mitigation mechanisms. The comparison framework developed in this document was leveraged to help indemnify the possible mitigation mechanisms. The investigation and data gathering concentrated efforts on issues that affect vehicle safety, but not necessarily asset protection. | en_US |
dc.description.sponsorship | National Highway Traffic Safety Administration | en_US |
dc.language.iso | en_US | en_US |
dc.publisher | University of Michigan, Ann Arbor, Transportation Research Institute | en_US |
dc.subject | heavy vehicles, cybersecurity, threat vectors, network architecture, intrusion detection | en_US |
dc.title | Cybersecurity Research Considerations for Heavy Vehicles | en_US |
dc.type | Technical Report | en_US |
dc.subject.hlbsecondlevel | Transportation | |
dc.subject.hlbtoplevel | Engineering | |
dc.contributor.affiliationumcampus | Ann Arbor | en_US |
dc.description.bitstreamurl | https://deepblue.lib.umich.edu/bitstream/2027.42/151379/1/UMTRI-2018-10.pdf | |
dc.description.filedescription | Description of UMTRI-2018-10.pdf : Technical Report | |
dc.owningcollname | Transportation Research Institute (UMTRI) - UMTRI Research Review |
Files in this item
Remediation of Harmful Language
The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.
Accessibility
If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.