Threat Analysis of Wi-Fi Connected Dashboard Camera

Won Park, Dahee Choi, Kyungho Lee

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)

    Abstract

    Recently dashboard camera (dashcam) has a function of connecting Wi-Fi to a smartphone for usability. But, it has severe vulnerabilities that it doesn't have authentication process. We analyzed threats of overall functions of dashcam using Data Flow Diagram and STRIDE analysis. After that, we found that dashcam' s vulnerabilities are closely related to Wi-Fi function and lack of authentication process. We made sets of possible attacks and presented as attack trees. Attack Tree Analysis was used to categorize and prioritize among several ways of possible attacks. This research contributes to suggest vulnerabilities of a dashcam. This emphasizes the importance that information security standards of dashcam should be made and manufacturers of dashcam should apply the standards.

    Original languageEnglish
    Title of host publication2018 International Conference on Platform Technology and Service, PlatCon 2018
    PublisherInstitute of Electrical and Electronics Engineers Inc.
    ISBN (Electronic)9781538647103
    DOIs
    Publication statusPublished - 2018 Sept 25
    Event2018 International Conference on Platform Technology and Service, PlatCon 2018 - Jeju, Korea, Republic of
    Duration: 2018 Jan 292018 Jan 31

    Publication series

    Name2018 International Conference on Platform Technology and Service, PlatCon 2018

    Other

    Other2018 International Conference on Platform Technology and Service, PlatCon 2018
    Country/TerritoryKorea, Republic of
    CityJeju
    Period18/1/2918/1/31

    Bibliographical note

    Publisher Copyright:
    © 2018 IEEE.

    Keywords

    • Attack Tree
    • Dashboard Camera
    • Data Flow Diagram
    • STRIDE
    • Threat Analysis
    • Wi-Fi vulnerability

    ASJC Scopus subject areas

    • Safety, Risk, Reliability and Quality
    • Hardware and Architecture
    • Computer Networks and Communications
    • Computer Science Applications

    Fingerprint

    Dive into the research topics of 'Threat Analysis of Wi-Fi Connected Dashboard Camera'. Together they form a unique fingerprint.

    Cite this