Integration of Attribute-based Access Control into Automotive Architectures

被引:0
|
作者
Rumez, Marcel [1 ]
Duda, Alexander [1 ]
Gruender, Patrick [1 ]
Kriesten, Reiner [1 ]
Sax, Eric [2 ]
机构
[1] Karlsruhe Univ Appl Sci, IEEM, D-76646 Bruchsal, Germany
[2] KIT, Inst Informat Proc Technol ITIV, D-76131 Karlsruhe, Germany
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The transformation in the automotive industry continues and topics such as intelligent software applications and over-the-air connectivity push future vehicle innovations, which will lead to a further increase in the number of connected vehicles in the upcoming years. Many wireless connections between vehicles to the infrastructure or mobile devices arise. In order to protect this communication against security attacks, various protection mechanisms have to be integrated into the vehicle to ensure information security. One of these measures is the implementation of a distributed access control to protect different communication channels against unauthorized access attempts. This requires a well-defined assignment of access permissions for each communication node combined with certain environmental conditions such as location, time or vehicle state. However, current automotive systems do not have extensive access controls. Only for the execution of safety-critical diagnostic services an extended authorization level is available. In this publication, we present an attribute-based access control, which is specifically designed for an automotive E/E architecture with several domain controllers. Furthermore, we evaluate our approach with a proof-of-concept for an exemplary diagnostic service request.
引用
收藏
页码:1916 / 1922
页数:7
相关论文
共 50 条
  • [1] Attribute-Based Access Control Architectures with the eIDAS Protocols
    Morgner, Frank
    Bastian, Paul
    Fischlin, Marc
    [J]. SECURITY STANDARDISATION RESEARCH, SSR 2016, 2016, 10074 : 205 - 226
  • [2] Attribute-Based Access Control
    Hu, Vincent C.
    Kuhn, D. Richard
    Ferraiolo, David F.
    [J]. COMPUTER, 2015, 48 (02) : 85 - 88
  • [3] Using attribute-based access control to enable attribute-based messaging
    Bobba, Rakesh
    Fatemieh, Omid
    Khan, Fariba
    Gunter, Carl A.
    Khurana, Himanshu
    [J]. 22ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2006, : 403 - +
  • [4] Attribute-Based Oblivious Access Control
    Han, Jinguang
    Susilo, Willy
    Mu, Yi
    Yan, Jun
    [J]. COMPUTER JOURNAL, 2012, 55 (10): : 1202 - 1215
  • [5] DACAS: integration of attribute-based access control for northbound interface security in SDN
    Yifan Liu
    Bo Zhao
    Yang An
    Jiabao Guo
    [J]. World Wide Web, 2023, 26 : 2143 - 2173
  • [6] DACAS: integration of attribute-based access control for northbound interface security in SDN
    Liu, Yifan
    Zhao, Bo
    An, Yang
    Guo, Jiabao
    [J]. WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2023, 26 (04): : 2143 - 2173
  • [7] Mining Attribute-Based Access Control Policies
    Davari, Maryam
    Zulkernine, Mohammad
    [J]. INFORMATION SYSTEMS SECURITY, ICISS 2022, 2022, 13784 : 186 - 201
  • [8] Monotonicity and Completeness in Attribute-Based Access Control
    Crampton, Jason
    Morisset, Charles
    [J]. SECURITY AND TRUST MANAGEMENT (STM 2014), 2014, 8743 : 33 - 48
  • [9] ABACaaS: Attribute-Based Access Control as a Service
    Meshram, Augustee
    Das, Saptarshi
    Sural, Shamik
    Vaidya, Jaideep
    Atluri, Vijayalakshmi
    [J]. PROCEEDINGS OF THE NINTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY '19), 2019, : 153 - 155
  • [10] Mining Attribute-Based Access Control Policies
    Xu, Zhongyuan
    Stoller, Scott D.
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2015, 12 (05) : 533 - 545