Reunalaskennan tietoturva nykyaikaisessa ajoneuvossa

Teknologian kehittymisen myötä arkipäiväiset laitteet, kuten kodinkoneet ja ajoneuvot, muuttuvat älykkäiksi esineiden internetin toimijoiksi. Siirrettävänä voi olla tietoja miljardeista laitteista, tai on käsiteltävä tietoa ilman merkittävää viivettä. Perinteisen datakeskusvetoisen pilvilaskennan tö...

Full description

Bibliographic Details
Main Author: Pasanen, Mauno
Other Authors: Informaatioteknologian tiedekunta, Faculty of Information Technology, Informaatioteknologia, Information Technology, Jyväskylän yliopisto, University of Jyväskylä
Format: Master's thesis
Language:fin
Published: 2022
Subjects:
Online Access: https://jyx.jyu.fi/handle/123456789/83831
_version_ 1826225753307480064
author Pasanen, Mauno
author2 Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_facet Pasanen, Mauno Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä Pasanen, Mauno Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_sort Pasanen, Mauno
datasource_str_mv jyx
description Teknologian kehittymisen myötä arkipäiväiset laitteet, kuten kodinkoneet ja ajoneuvot, muuttuvat älykkäiksi esineiden internetin toimijoiksi. Siirrettävänä voi olla tietoja miljardeista laitteista, tai on käsiteltävä tietoa ilman merkittävää viivettä. Perinteisen datakeskusvetoisen pilvilaskennan törmätessä haasteisiin näitä ratkomaan on kehittynyt pilvilaskennan osa-alue reunalaskenta, joka käsitteenä tuo tiedon käsittelyn laitteeseen tai laitteen lähelle. Reunalaskennan laajeneminen on kasvattanut myös reaalimaailman turvallisuusuhkia, ja esimerkkejä miljoonien laitteiden tai yksittäisten ajoneuvojen haltuunotosta on lukuisia. Tietoturvan toteutuneet haasteet vaikuttavat laajasti miljoonien ihmisten elämään, liiketoimintaan ja yhteiskunnan toimivuuteen. Tutkielmassa kootaan yhteen reunalaskennan tietoturvaan kohdistuvia haasteita ja käsitellään ongelmakohtiin kehitettyjä ratkaisuja keskittyen autoihin reunalaitteina. Moderni auto on monipuolinen reunatoimija, johon kohdistuneiden hyökkäysten määrä on Chattopadhyay, Lam ja Tavva (2021) mukaan yli kuusinkertaistunut viime vuosina. Tutkielmassa tehdään ajoneuvon hyökkäysrajapintojen läpikäynti ja uhka-analyysi. Löydösten perusteella analysoidaan tarkemmin kahden, osittain itseajavan ja verkottuneen, auton etähallintaohjelmisto ja jaettu verkkoyhteys suorittamalla sekä välimieshyökkäys että verkkoskannaus, ja analysoimalla verkkoliikenne. Tuloksista on nähtävissä, että valmistajat ovat huomioineet ilmiselvät riskit. Analyysissä paljastui kuitenkin haavoittuvaisuuksia ja heikkouksia, joihin tehtiin suosituksia, joilla yksityisyyden suojaa voitaisiin parantaa, hyökkäyslinjoja sulkea ja väärinkäytösten mahdollisuutta pienentää. Autojen ollessa pitkäikäisiä hyödykkeitä, niiden suojauksen pitää kestää sekä nykyiset että tulevaisuuden kehittyneemmät hyökkäystekniikat. With the development of technology, everyday devices, such as home appliances and vehicles, are becoming smart Internet of Things players. The data transfer amount can be large from billions of devices, or data must be processed without significant delay. As traditional data center-driven cloud computing faces challenges, the edge computing has evolved to bring data processing to or near the device. The expansion of edge computing has also increased real-world security threats, with numerous examples of hijacking millions of devices or individual vehicles. The realized challenges of information security have a far-reaching impact on the lives of millions of people, businesses and functioning of society. This thesis brings together the challenges of edge computing security and addresses the solutions developed to the problem areas, focusing on cars as edge devices. The modern car is a versatile edge device, and the number of attacks against them have grown over sixfold in recent years according the Chattopadhyay, Lam ja Tavva (2021). Thesis reviews the vehicle’s attack interfaces and performs a threat analysis. Based on the findings, the remote management software and shared network connection of the two self-driven and connected cars are analyzed in more detail by performing a man-in-the-middle attack and a network scan, and analyzing the network traffic. The results show that the manufacturers have taken into account the obvious risks. However, the analysis revealed vulnerabilities and weaknesses, which could be closed, privacy protection could be improved and potential for abuse significantly reduced with the thesis recommendations. As cars are long-lived commodities, their protection must withstand both current and future’s more advanced attack technologies.
first_indexed 2022-11-09T21:03:59Z
format Pro gradu
free_online_boolean 1
fullrecord [{"key": "dc.contributor.advisor", "value": "Frantti, Tapio", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Pasanen, Mauno", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2022-11-09T06:48:35Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2022-11-09T06:48:35Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2022", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/83831", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Teknologian kehittymisen my\u00f6t\u00e4 arkip\u00e4iv\u00e4iset laitteet, kuten kodinkoneet ja ajoneuvot, muuttuvat \u00e4lykk\u00e4iksi esineiden internetin toimijoiksi. Siirrett\u00e4v\u00e4n\u00e4 voi olla tietoja miljardeista laitteista, tai on k\u00e4sitelt\u00e4v\u00e4 tietoa ilman merkitt\u00e4v\u00e4\u00e4 viivett\u00e4. Perinteisen datakeskusvetoisen pilvilaskennan t\u00f6rm\u00e4tess\u00e4 haasteisiin n\u00e4it\u00e4 ratkomaan on kehittynyt pilvilaskennan osa-alue reunalaskenta, joka k\u00e4sitteen\u00e4 tuo tiedon k\u00e4sittelyn laitteeseen tai laitteen l\u00e4helle. Reunalaskennan laajeneminen on kasvattanut my\u00f6s reaalimaailman turvallisuusuhkia, ja esimerkkej\u00e4 miljoonien laitteiden tai yksitt\u00e4isten ajoneuvojen haltuunotosta on lukuisia. Tietoturvan toteutuneet haasteet vaikuttavat laajasti miljoonien ihmisten el\u00e4m\u00e4\u00e4n, liiketoimintaan ja yhteiskunnan\ntoimivuuteen.\n\nTutkielmassa kootaan yhteen reunalaskennan tietoturvaan kohdistuvia haasteita ja k\u00e4sitell\u00e4\u00e4n ongelmakohtiin kehitettyj\u00e4 ratkaisuja keskittyen autoihin reunalaitteina. Moderni auto on monipuolinen reunatoimija, johon kohdistuneiden hy\u00f6kk\u00e4ysten m\u00e4\u00e4r\u00e4 on Chattopadhyay, Lam ja Tavva (2021) mukaan yli kuusinkertaistunut viime vuosina. Tutkielmassa tehd\u00e4\u00e4n ajoneuvon hy\u00f6kk\u00e4ysrajapintojen l\u00e4pik\u00e4ynti ja uhka-analyysi. L\u00f6yd\u00f6sten perusteella analysoidaan\ntarkemmin kahden, osittain itseajavan ja verkottuneen, auton et\u00e4hallintaohjelmisto ja jaettu verkkoyhteys suorittamalla sek\u00e4 v\u00e4limieshy\u00f6kk\u00e4ys ett\u00e4 verkkoskannaus, ja analysoimalla verkkoliikenne. Tuloksista on n\u00e4ht\u00e4viss\u00e4, ett\u00e4 valmistajat ovat huomioineet ilmiselv\u00e4t riskit. Analyysiss\u00e4 paljastui kuitenkin haavoittuvaisuuksia ja heikkouksia, joihin tehtiin suosituksia, joilla yksityisyyden suojaa voitaisiin parantaa, hy\u00f6kk\u00e4yslinjoja sulkea ja v\u00e4\u00e4rink\u00e4yt\u00f6sten\nmahdollisuutta pienent\u00e4\u00e4. Autojen ollessa pitk\u00e4ik\u00e4isi\u00e4 hy\u00f6dykkeit\u00e4, niiden suojauksen pit\u00e4\u00e4 kest\u00e4\u00e4 sek\u00e4 nykyiset ett\u00e4 tulevaisuuden kehittyneemm\u00e4t hy\u00f6kk\u00e4ystekniikat.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "With the development of technology, everyday devices, such as home appliances and vehicles, are becoming smart Internet of Things players. The data transfer amount can be large from billions of devices, or data must be processed without significant delay. As traditional data center-driven cloud computing faces challenges, the edge computing has evolved to bring data processing to or near the device. The expansion of edge computing has also increased real-world security threats, with numerous examples of hijacking millions of devices or individual vehicles. The realized challenges of information security have a far-reaching impact on the lives of millions of people, businesses and functioning of society.\n\nThis thesis brings together the challenges of edge computing security and addresses the solutions developed to the problem areas, focusing on cars as edge devices. The modern car is a versatile edge device, and the number of attacks against them have grown over sixfold in recent years according the Chattopadhyay, Lam ja Tavva (2021). Thesis reviews the vehicle\u2019s attack interfaces and performs a threat analysis. Based on the findings, the remote\nmanagement software and shared network connection of the two self-driven and connected cars are analyzed in more detail by performing a man-in-the-middle attack and a network scan, and analyzing the network traffic. The results show that the manufacturers have taken into account the obvious risks. However, the analysis revealed vulnerabilities and weaknesses, which could be closed, privacy protection could be improved and potential for abuse\nsignificantly reduced with the thesis recommendations. As cars are long-lived commodities, their protection must withstand both current and future\u2019s more advanced attack technologies.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2022-11-09T06:48:35Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2022-11-09T06:48:35Z (GMT). No. of bitstreams: 0\n Previous issue date: 2022", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "88", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "sumulaskenta", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "pilvilaskenta. itseajava", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "Internet of Things", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "IoT", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "fog computing", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "edge computing", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "cloud computing", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "security", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "vehicle", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "car", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "self-driving", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Reunalaskennan tietoturva nykyaikaisessa ajoneuvossa", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202211095132", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietojenk\u00e4sittelytiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Computer Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "autot", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "esineiden internet", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "ajoneuvot", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "reunalaskenta", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "autot", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "riskianalyysi", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
id jyx.123456789_83831
language fin
last_indexed 2025-02-18T10:55:03Z
main_date 2022-01-01T00:00:00Z
main_date_str 2022
online_boolean 1
online_urls_str_mv {"url":"https:\/\/jyx.jyu.fi\/bitstreams\/7c1479e1-0baf-4cc5-9198-54a634813f48\/download","text":"URN:NBN:fi:jyu-202211095132.pdf","source":"jyx","mediaType":"application\/pdf"}
publishDate 2022
record_format qdc
source_str_mv jyx
spellingShingle Pasanen, Mauno Reunalaskennan tietoturva nykyaikaisessa ajoneuvossa sumulaskenta pilvilaskenta. itseajava Internet of Things IoT fog computing edge computing cloud computing security vehicle car self-driving Tietojenkäsittelytiede Computer Science 601 autot tietoturva esineiden internet ajoneuvot reunalaskenta riskianalyysi
title Reunalaskennan tietoturva nykyaikaisessa ajoneuvossa
title_full Reunalaskennan tietoturva nykyaikaisessa ajoneuvossa
title_fullStr Reunalaskennan tietoturva nykyaikaisessa ajoneuvossa Reunalaskennan tietoturva nykyaikaisessa ajoneuvossa
title_full_unstemmed Reunalaskennan tietoturva nykyaikaisessa ajoneuvossa Reunalaskennan tietoturva nykyaikaisessa ajoneuvossa
title_short Reunalaskennan tietoturva nykyaikaisessa ajoneuvossa
title_sort reunalaskennan tietoturva nykyaikaisessa ajoneuvossa
title_txtP Reunalaskennan tietoturva nykyaikaisessa ajoneuvossa
topic sumulaskenta pilvilaskenta. itseajava Internet of Things IoT fog computing edge computing cloud computing security vehicle car self-driving Tietojenkäsittelytiede Computer Science 601 autot tietoturva esineiden internet ajoneuvot reunalaskenta riskianalyysi
topic_facet 601 Computer Science Internet of Things IoT Tietojenkäsittelytiede ajoneuvot autot car cloud computing edge computing esineiden internet fog computing pilvilaskenta. itseajava reunalaskenta riskianalyysi security self-driving sumulaskenta tietoturva vehicle
url https://jyx.jyu.fi/handle/123456789/83831 http://www.urn.fi/URN:NBN:fi:jyu-202211095132
work_keys_str_mv AT pasanenmauno reunalaskennantietoturvanykyaikaisessaajoneuvossa