1. This article surveys attacks on Controller Area Networks (CANs) and the corresponding countermeasures.
2. It covers a range of topics, including the impact of cooperative adaptive cruise control on traffic-flow characteristics, experimental security analysis of modern automobiles, vulnerabilities of Android OS-based telematics systems, and automated cross-platform reverse engineering of CAN bus commands from mobile apps.
3. The article also discusses various security solutions for CANs, such as hardware/software co-design of an automotive embedded firewall, Novel OBU with three-level security architecture for Internet of vehicles, CANSentry: Securing CAN-based cyber-physical systems against denial and spoofing attacks, and Secure over-the-air software updates in connected vehicles.
The article is generally reliable and trustworthy. It provides a comprehensive overview of attacks on Controller Area Networks (CANs) and the corresponding countermeasures. The authors have done a thorough research to cover a wide range of topics related to CANs security issues. They have cited relevant sources from IEEE journals & magazines as well as other conferences & workshops to support their claims. Furthermore, they have discussed various security solutions for CANs such as hardware/software co-design of an automotive embedded firewall, Novel OBU with three-level security architecture for Internet of vehicles, CANSentry: Securing CAN-based cyber-physical systems against denial and spoofing attacks, and Secure over-the-air software updates in connected vehicles.
However, there are some potential biases in the article that should be noted. For example, the authors may be biased towards certain technologies or solutions due to their own experience or expertise in those areas. Additionally, some claims made by the authors may not be supported by sufficient evidence or data which could lead to one sided reporting or unsupported claims. Moreover, some points may be missing from consideration which could lead to partiality or lack of balance in presenting both sides equally. Finally, it is important to note that possible risks associated with certain technologies or solutions should also be discussed in order to provide a more comprehensive overview of the topic at hand.