III. SURVEY METHOD
To ensure reproducibility, our survey follows Wholin’s
snowballing method [14] as follows.
Scope definition: Following Chandola et al. [8] we define
anomaly detection as ”finding patterns in data that do not
conform to expected behavior.” A model is formed or learned
and then data are monitored for conformance.
Collecting initial set of studies: We identified an initial
set of papers by keyword search in Google scholar. We did so
to avoid publisher bias. The keywords used were: “Anomaly
detection”, “Connected vehicles”, “VANET”, “V2I”, “V2V”,
“Intrusion detection”, “Misbehavior detection”, “CAN bus”,
“In-Vehicle”, “safety”, “Security”.
Snowballing: The initial set collected through keyword
search might not be exhaustive. Therefore, we performed
backward and forward snowballing to collect all the ref-
erences that are cited by the initial set. Papers were then
included or excluded by reading the abstract followed by
a thorough reading with the scope in mind (thereby, elim-
inating papers that are out of our scope). This snowballing
process was iterated until no new relevant papers that were
added. There are 65 papers finally in our study.
Although Wholin [14] recommends contacting the promi-
nent researchers in the field for more relevant literature, we
omitted this step as we could not conclusively establish the
most important researchers, given the diversity of the field.
Data extraction and taxonomy development: Once
all the relevant papers were collected exhaustively through
Wholin’s survey methodology [14], we noted down the key
elements of each paper. We employed an open card sort
technique [15] with the collected key points to arrive at
the dimensions of our proposed taxonomy. The open card
sorting technique is the process of organizing key elements
into conceptual groups by consensus among the participants
in the process. We used this technique to arrive at our
38 dimensions (bottom-level). We then used a bottom-up
approach and grouped these dimensions into 9 sub-categories
(middle-level) which we later subsumed into 3 overarching
categories (top-level) based on multiple iterations of the
sorting. We carried out the process of open card sorting only
among the authors of this study, even though the process
typically involves a larger group [15]. Finally, we assigned
each of the collected papers into our taxonomy, by labeling
each with every assigned dimension it occupies.
IV. TAXONOMY
The process above yielded a taxonomy (see Figure 1) with
3 top-level categories, 9 sub-categories, and 38 dimensions.
The categories represent the higher level traits of the research
area. Our aim was to identify the addressed threat, solution,
and the research characteristics of each paper. Especially,
the captured the research characteristics, shine light on the
type and rigor of the conducted experiments.
Each of the proposed categories, in turn, comprises of
several sub-categories. The Threat Characteristics has 2
sub-categories, Solution Characteristics has 4, and research
characteristics has 3 each, that better capture the traits of
each category. The sub-categories further have dimensions
as illustrated in Figure 1, which capture and highlight the
technical differences that distinguish each sub-category, as
follows.
A. Threat Characteristics
This category concerns the threat addressed by each sur-
veyed paper. We divide it into two orthogonal sub-categories
as follows.
1) Attack surface: Attack surface identifies the potential
points of vulnerability in a connected vehicle. For instance,
a paper might be addressing CAN bus (Other Buses not
considered due to lack of sufficient literature) based attacks
whereas some other papers focus exclusively on attacks that
counterfeit a vehicle’s ECU (Electronic Control Unit) output.
2) Attack method: A paper may address more than
one attack method. We specifically call attention to the
Black/Grey/Worm hole attacks dimension in this sub-
category. These are routing based attacks that involve either
dropping, selectively forwarding or malicious rerouting of
communication packets in a VANET [16].
B. Solution Characteristics
This category represents the nature of the solution pro-
posed to counter the threat.
1) Motivation: Whether an anomaly detection technique
is used to detect a threat or to also provide a response to the
threat.
2) Deployment point: Which part of the connected vehicle
is the proposed solution deployed to. For instance, a solution
might be deployed in the ECU of a vehicle, or in the Central
Authority (CA) or the Road Side Unit (RSU) of a VANET.
3) Security goal: Whether the information security (in-
tegrity, confidentiality, availability) [17] and/or safety of a
connected vehicle is safeguarded. Physical security is out of
the scope of this work.
4) Anomaly detection method: Anomalies may be de-
tected in multiple ways. The taxonomy distinguishes the
anomaly detection method used. We draw attention to the
rule-based methods dimension here, which, represents only
research which infers rules automatically from vehicles op-
eration, rather than those eliciting rules from the experts.
C. Research Characteristics
While the above-mentioned categories distinguished prior
research based on the addressed threats and the solutions by
identified dimensions, this category addresses the research
methods and the data.
1) Scientific character: This sub-category records
whether a paper is a theoretical, experimental, empirical or
survey paper. A paper may be a combination of types.
2) Data source: This sub-category records if paper uses
authentic (real data) or simulated data.
422
评论