Advanced security and privacy in connected vehicles

被引:2
|
作者
Kitayama, H. [1 ]
Munetoh, S. [2 ]
Ohnishi, K. [3 ]
Uramoto, N. [2 ]
Watanabe, Y. [2 ]
机构
[1] IBM Sales & Distribut Div, Chuou Ku, Tokyo 1038510, Japan
[2] Tokyo Res Lab, IBM Res Div, Kawasaki, Kanagawa 2120032, Japan
[3] IBM Global Technol Serv, Nishi Ku, Osaka 5500004, Japan
关键词
Designing secure vehicles is becoming increasingly important as a result of recent advances in potential cyber-attacks against vehicles. This security needs to be considered over the course of the product lifecycle and includes a consideration of requirements definitions; design; development; testing; and maintenance. Even though many technologies and guidelines have been proposed to address end-to-end security design problems for the IT (information technology) industry; there are often significant differences between securing IT equipment (such as servers and PCs) and securing vehicles. Thus; purely IT-based approaches often have limited applicability in the domain of vehicle security because human safety is a primary design consideration in the development of vehicles; while relatively less attention has been paid to IT security. In addition; the lifecycle of a vehicle is often much longer than the lifecycle of many PCs and related IT equipment. Security design tends to be performed in silos and is not well coordinated among all of the stakeholders who are involved in the development of a vehicle. We have devised a specialized approach for designing secure in-vehicle infotainment systems; including the electronic control system and software. Our approach is based on secure engineering; an established methodology used in the IT industry to cover the entire software lifecycle. © 2014 IBM;
D O I
10.1147/JRD.2013.2288061
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Designing secure vehicles is becoming increasingly important as a result of recent advances in potential cyber-attacks against vehicles. This security needs to be considered over the course of the product lifecycle and includes a consideration of requirements definitions, design, development, testing, and maintenance. Even though many technologies and guidelines have been proposed to address end-to-end security design problems for the IT (information technology) industry, there are often significant differences between securing IT equipment (such as servers and PCs) and securing vehicles. Thus, purely IT-based approaches often have limited applicability in the domain of vehicle security because human safety is a primary design consideration in the development of vehicles, while relatively less attention has been paid to IT security. In addition, the lifecycle of a vehicle is often much longer than the lifecycle of many PCs and related IT equipment. Security design tends to be performed in "silos" and is not well coordinated among all of the stakeholders who are involved in the development of a vehicle. We have devised a specialized approach for designing secure in-vehicle infotainment systems, including the electronic control system and software. Our approach is based on secure engineering, an established methodology used in the IT industry to cover the entire software lifecycle.
引用
下载
收藏
页数:9
相关论文
共 50 条
  • [1] Privacy and Security of Connected Vehicles in Intelligent Transportation System
    Jolfaei, Alireza
    Kant, Krishna
    2019 49TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS - SUPPLEMENTAL VOL (DSN-S), 2019, : 9 - 10
  • [2] The Internet of Vehicles (IoV) - Security, Privacy, Trust, and Reputation Management for Connected Vehicles
    Drobot, Adam
    Zhang, Tao
    Buonarosa, Mary Lynn
    Kargl, Frank
    Schwinke, Steve
    Sikdar, Biplab
    IEEE Internet of Things Magazine, 2023, 6 (02): : 6 - 16
  • [3] Internet of Vehicles and Autonomous Connected Car - Privacy and Security Issues
    Joy, Joshua
    Gerla, Mario
    2017 26TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN 2017), 2017,
  • [5] Future connected vehicles: Communications demands, privacy and cyber-security
    Olovsson, Tomas
    Svensson, Tommy
    Wu, Jiaming
    COMMUNICATIONS IN TRANSPORTATION RESEARCH, 2022, 2
  • [6] Security and privacy based access control model for internet of connected vehicles
    Habib, Muhammad Asif
    Ahmad, Mudassar
    Jabbar, Sohail
    Khalid, Shehzad
    Chaudhry, Junaid
    Saleem, Kashif
    Rodrigues, Joel J. P. C.
    Khalil, Muhammad Sayim
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 97 : 687 - 696
  • [7] Public concerns and connected and automated vehicles: safety, privacy, and data security
    Lee, Dasom
    Hess, David J.
    HUMANITIES & SOCIAL SCIENCES COMMUNICATIONS, 2022, 9 (01):
  • [8] Public concerns and connected and automated vehicles: safety, privacy, and data security
    Dasom Lee
    David J. Hess
    Humanities and Social Sciences Communications, 9
  • [9] The security and privacy of smart vehicles
    Hubaux, JP
    Capkun, S
    Luo, J
    IEEE SECURITY & PRIVACY, 2004, 2 (03) : 49 - 55
  • [10] Security and Privacy in the Internet of Vehicles
    Sun, Yunchuan
    Wu, Lei
    Wu, Shizhong
    Li, Shoupeng
    Zhang, Tao
    Zhang, Li
    Xu, Junfeng
    Xiong, Yongping
    2015 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION, AND KNOWLEDGE IN THE INTERNET OF THINGS (IIKI), 2015, : 116 - 121