{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,26]],"date-time":"2025-12-26T07:13:13Z","timestamp":1766733193916,"version":"3.37.3"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"5-6","license":[{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,1,10]],"date-time":"2022-01-10T00:00:00Z","timestamp":1641772800000},"content-version":"vor","delay-in-days":40,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"New National Excellence Programme Bolyai+"},{"name":"Autonomous Systems National Laboratory Programme"},{"DOI":"10.13039\/100009567","name":"Budapest University of Technology and Economics","doi-asserted-by":"crossref","id":[{"id":"10.13039\/100009567","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Electron Test"],"published-print":{"date-parts":[[2021,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>This article investigates cybersecurity issues related to in-vehicle communication networks. In-vehicle communication network security is evaluated based on the protection characteristics of the network components and the topology of the network. The automotive communication network topologies are represented as undirected weighted graphs, and their vulnerability is estimated based on the specific characteristics of the generated graph. Thirteen different vehicle models have been investigated to compare the vulnerability levels of the in-vehicle network using the Dijkstra's shortest route algorithm. An important advantage of the proposed method is\u00a0that it is in accordance with the most relevant security evaluation models. On the other hand, the newly introduced approach considers the Secure-by-Design concept principles.<\/jats:p>","DOI":"10.1007\/s10836-021-05973-x","type":"journal-article","created":{"date-parts":[[2022,1,10]],"date-time":"2022-01-10T02:02:25Z","timestamp":1641780145000},"page":"613-621","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Analysis of Security Vulnerability Levels of In-Vehicle Network Topologies Applying Graph Representations"],"prefix":"10.1007","volume":"37","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3054-4669","authenticated-orcid":false,"given":"Zsombor","family":"Petho","sequence":"first","affiliation":[]},{"given":"Intiyaz","family":"Khan","sequence":"additional","affiliation":[]},{"given":"\u00c1rp\u00e1d","family":"Torok","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,10]]},"reference":[{"key":"5973_CR1","unstructured":"(2021) Vag self study program. http:\/\/www.volkspage.net\/technik\/ssp\/index4_eng.php"},{"key":"5973_CR2","doi-asserted-by":"crossref","unstructured":"Bajpai P, Enbody R (2020) Towards effective identification and rating of automotive vulnerabilities. In: Proceedings of the Second ACM Workshop on Automotive and Aerial Vehicle Security, pp. 37\u201344","DOI":"10.1145\/3375706.3380556"},{"issue":"3","key":"5973_CR3","doi-asserted-by":"publisher","first-page":"1231","DOI":"10.1016\/j.asoc.2011.11.011","volume":"12","author":"Y Deng","year":"2012","unstructured":"Deng Y, Chen Y, Zhang Y, Mahadevan S (2012) Fuzzy Dijkstra algorithm for shortest path problem under uncertain environment. Appl Soft Comput 12(3):1231\u20131237","journal-title":"Appl Soft Comput"},{"key":"5973_CR4","unstructured":"ETSI T (2017) 102 165-1 v5. 2.3 (2017-10) cyber; methods and protocols; part 1: Method and proforma for threat, vulnerability. Risk Analysis (TVRA) Standard, European Telecommunications Standards Institute (ETSI)"},{"key":"5973_CR5","doi-asserted-by":"crossref","unstructured":"Ghadi M, Sali \u00c1, Szalay Z, T\u00f6r\u00f6k \u00c1 (2020) A new methodology for analyzing vehicle network topologies for critical hacking. J Amb Int Humanized Comp pp. 1\u201312","DOI":"10.1007\/s12652-020-02522-w"},{"issue":"4","key":"5973_CR6","doi-asserted-by":"publisher","first-page":"2034","DOI":"10.1109\/TII.2013.2239301","volume":"9","author":"B Groza","year":"2013","unstructured":"Groza B, Murvay S (2013) Efficient protocols for secure broadcast in controller area networks. IEEE Trans Industr Inf 9(4):2034\u20132042","journal-title":"IEEE Trans Industr Inf"},{"issue":"3","key":"5973_CR7","doi-asserted-by":"publisher","first-page":"405","DOI":"10.7763\/IJCTE.2013.V5.719","volume":"5","author":"R Hegde","year":"2013","unstructured":"Hegde R, Kumar S, Gurumurthy K (2013) The impact of network topologies on the performance of the in-vehicle network. Int J Comput Theory Eng 5(3):405","journal-title":"International Journal of Computer Theory and Engineering"},{"key":"5973_CR8","unstructured":"Henniger O, Ruddle A, Seudi\u00e9 H. Weyl B, Wolf M, Wollinger T (2009) Securing vehicular on-board it systems: The evita project. In: VDI\/VW Automotive Security Conference, p.\u00a041"},{"key":"5973_CR9","doi-asserted-by":"crossref","unstructured":"Huang T, Zhou J, Wang Y, Cheng A (2017) On the security of in-vehicle hybrid network: Status and challenges. In: Proc. International Conference on Information Security Practice and Experience, pp. 621\u2013637. Springer","DOI":"10.1007\/978-3-319-72359-4_38"},{"issue":"5","key":"5973_CR10","doi-asserted-by":"publisher","first-page":"879","DOI":"10.1007\/s12239-018-0085-1","volume":"19","author":"Q Hu","year":"2018","unstructured":"Hu Q, Luo F (2018) Review of secure communication approaches for in-vehicle network. Int J Automot Technol 19(5):879\u2013894","journal-title":"Int J Automot Technol"},{"key":"5973_CR11","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1016\/j.ssci.2017.03.024","volume":"99","author":"S Khastgir","year":"2017","unstructured":"Khastgir S, Birrell S, Dhadyalla G, Sivencrona H, Jennings P (2017) Towards increased reliability by objectification of hazard analysis and risk assessment (hara) of automated automotive systems. Saf Sci 99:166\u2013177","journal-title":"Saf Sci"},{"issue":"1","key":"5973_CR12","doi-asserted-by":"publisher","first-page":"80","DOI":"10.3311\/PPtr.13785","volume":"49","author":"B Kocsis","year":"2021","unstructured":"Kocsis B, Vida G, Szalay Z, \u00c1goston G (2021) Novel approaches to evaluate the ability of vehicles for secured transportation. Period Polytech Transp Eng 49(1):80\u201388","journal-title":"Period Polytech Transp Eng"},{"issue":"3","key":"5973_CR13","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1007\/s12652-016-0442-8","volume":"9","author":"HK Kong","year":"2018","unstructured":"Kong HK, Hong MK, Kim TS (2018) Security risk assessment framework for smart car using the attack tree analysis. J Ambient Intell Humaniz Comput 9(3):531\u2013551","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"5973_CR14","doi-asserted-by":"crossref","unstructured":"Lukasiewycz M, Gla\u00df M, Haubelt C, Teich J, Regler R, Lang B (2008) Concurrent topology and routing optimization in automotive network integration. In: Proceedings of the 45th Annual Design Automation Conference, pp. 626\u2013629","DOI":"10.1145\/1391469.1391629"},{"key":"5973_CR15","doi-asserted-by":"crossref","unstructured":"Macher G, Armengaud E, Brenner E, Kreiner C (2016) A review of threat analysis and risk assessment methods in the automotive context. In: International Conference on Computer Safety, Reliability, and Security, pp. 130\u2013141. Springer","DOI":"10.1007\/978-3-319-45477-1_11"},{"key":"5973_CR16","doi-asserted-by":"crossref","unstructured":"Macher G, Sporer H, Berlach R, Armengaud E, Kreiner C (2015) Sahara: a security-aware hazard and risk analysis method. In: Proc. Design, Automation & Test in Europe Conference & Exhibition (DATE), pp. 621\u2013624","DOI":"10.7873\/DATE.2015.0622"},{"key":"5973_CR17","unstructured":"Miller C, Valasek C (2014) A survey of remote automotive attack surfaces. Black hat USA 2014, 94"},{"key":"5973_CR18","unstructured":"Miller C, Valasek C (2015) Remote exploitation of an unaltered passenger vehicle. Black Hat USA 2015(S 91)"},{"key":"5973_CR19","doi-asserted-by":"crossref","unstructured":"Moritz R, Ulrich T, Thiele L (2012) Evolutionary exploration of e\/e-architectures in automotive design. In: Operations Research Proceedings 2011, pp. 361\u2013366. Springer","DOI":"10.1007\/978-3-642-29210-1_58"},{"key":"5973_CR20","doi-asserted-by":"crossref","unstructured":"Neumann A, Mytych MJ, Wesemann D, Wisniewski L, Jasperneite J (2017) Approaches for in-vehicle communication\u2013an analysis and outlook. In: Proc. International Conference on Computer Networks, pp. 395\u2013411. Springer","DOI":"10.1007\/978-3-319-59767-6_31"},{"key":"5973_CR21","doi-asserted-by":"crossref","unstructured":"P\u00fcllen D, Anagnostopoulos NA, Arul T, Katzenbeisser S (2019) Security and safety co-engineering of the flexray bus in vehicular networks. In: Proceedings of the International Conference on Omni-Layer Intelligent Systems, pp. 31\u201337","DOI":"10.1145\/3312614.3312626"},{"issue":"6","key":"5973_CR22","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1109\/MDAT.2019.2929116","volume":"36","author":"M Shayan","year":"2019","unstructured":"Shayan M, Basu K, Karri R (2019) Hardware trojans inspired ip watermarks. IEEE Des Test 36(6):72\u201379","journal-title":"IEEE Design & Test"},{"key":"5973_CR23","doi-asserted-by":"crossref","unstructured":"Tandon R, Gupta P (2021) Sv2vcs: a secure vehicle-to-vehicle communication scheme based on lightweight authentication and concurrent data collection trees. J Amb Int Humanized Comp pp. 1\u201317","DOI":"10.1007\/s12652-020-02721-5"},{"issue":"4","key":"5973_CR24","doi-asserted-by":"publisher","first-page":"349","DOI":"10.3311\/PPtr.15850","volume":"48","author":"\u00c1 T\u00f6r\u00f6k","year":"2020","unstructured":"T\u00f6r\u00f6k \u00c1, Peth\u0151 Z (2020) Introducing safety and security co-engineering related research orientations in the field of automotive security. Period Polytech Transp Eng 48(4):349\u2013356","journal-title":"Period Polytech Transp Eng"},{"key":"5973_CR25","doi-asserted-by":"crossref","unstructured":"T\u00f6r\u00f6k \u00c1, Szalay Z, S\u00e1ghi B (2020) New aspects of integrity levels in automotive industry-cybersecurity of automated vehicles. IEEE Trans Intell Trans Syst 23(1):383\u2013391","DOI":"10.1109\/TITS.2020.3011523"},{"key":"5973_CR26","first-page":"5","volume":"81","author":"H Ueda","year":"2015","unstructured":"Ueda H, Kurachi R, Takada H, Mizutani T, Inoue M, Horihata S (2015) Security authentication system for in-vehicle network. SEI Tech Rev 81:5\u20139","journal-title":"SEI technical review"},{"key":"5973_CR27","unstructured":"Wolf M, Weimerskirch A, Paar C (2004) Security in automotive bus systems. In: Workshop on Embedded Security in Cars, pp. 1\u201313. Citeseer"},{"key":"5973_CR28","doi-asserted-by":"crossref","unstructured":"Zheng JX, Li D, Potkonjak M (2014) A secure and unclonable embedded system using instruction-level PUF authentication. In: Proc. 24th International Conference on Field Programmable Logic and Applications (FPL), pp. 1\u20134. IEEE","DOI":"10.1109\/FPL.2014.6927428"},{"key":"5973_CR29","doi-asserted-by":"crossref","unstructured":"Zheng JX, Potkonjak M (2014) A digital PUF-based ip protection architecture for network embedded systems. In: Proc. ACM\/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS), pp. 255\u2013256","DOI":"10.1145\/2658260.2661776"}],"container-title":["Journal of Electronic Testing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-021-05973-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10836-021-05973-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-021-05973-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,10]],"date-time":"2022-02-10T05:05:35Z","timestamp":1644469535000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10836-021-05973-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12]]},"references-count":29,"journal-issue":{"issue":"5-6","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["5973"],"URL":"https:\/\/doi.org\/10.1007\/s10836-021-05973-x","relation":{},"ISSN":["0923-8174","1573-0727"],"issn-type":[{"type":"print","value":"0923-8174"},{"type":"electronic","value":"1573-0727"}],"subject":[],"published":{"date-parts":[[2021,12]]},"assertion":[{"value":"23 April 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 October 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 January 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}