Advanced security and privacy in connected vehicles

被引:2
|
作者
Kitayama, H. [1 ]
Munetoh, S. [2 ]
Ohnishi, K. [3 ]
Uramoto, N. [2 ]
Watanabe, Y. [2 ]
机构
[1] IBM Sales & Distribut Div, Chuou Ku, Tokyo 1038510, Japan
[2] Tokyo Res Lab, IBM Res Div, Kawasaki, Kanagawa 2120032, Japan
[3] IBM Global Technol Serv, Nishi Ku, Osaka 5500004, Japan
关键词
Designing secure vehicles is becoming increasingly important as a result of recent advances in potential cyber-attacks against vehicles. This security needs to be considered over the course of the product lifecycle and includes a consideration of requirements definitions; design; development; testing; and maintenance. Even though many technologies and guidelines have been proposed to address end-to-end security design problems for the IT (information technology) industry; there are often significant differences between securing IT equipment (such as servers and PCs) and securing vehicles. Thus; purely IT-based approaches often have limited applicability in the domain of vehicle security because human safety is a primary design consideration in the development of vehicles; while relatively less attention has been paid to IT security. In addition; the lifecycle of a vehicle is often much longer than the lifecycle of many PCs and related IT equipment. Security design tends to be performed in silos and is not well coordinated among all of the stakeholders who are involved in the development of a vehicle. We have devised a specialized approach for designing secure in-vehicle infotainment systems; including the electronic control system and software. Our approach is based on secure engineering; an established methodology used in the IT industry to cover the entire software lifecycle. © 2014 IBM;
D O I
10.1147/JRD.2013.2288061
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Designing secure vehicles is becoming increasingly important as a result of recent advances in potential cyber-attacks against vehicles. This security needs to be considered over the course of the product lifecycle and includes a consideration of requirements definitions, design, development, testing, and maintenance. Even though many technologies and guidelines have been proposed to address end-to-end security design problems for the IT (information technology) industry, there are often significant differences between securing IT equipment (such as servers and PCs) and securing vehicles. Thus, purely IT-based approaches often have limited applicability in the domain of vehicle security because human safety is a primary design consideration in the development of vehicles, while relatively less attention has been paid to IT security. In addition, the lifecycle of a vehicle is often much longer than the lifecycle of many PCs and related IT equipment. Security design tends to be performed in "silos" and is not well coordinated among all of the stakeholders who are involved in the development of a vehicle. We have devised a specialized approach for designing secure in-vehicle infotainment systems, including the electronic control system and software. Our approach is based on secure engineering, an established methodology used in the IT industry to cover the entire software lifecycle.
引用
下载
收藏
页数:9
相关论文
共 50 条
  • [21] On Privacy and Security Challenges in Smart Connected Homes
    Bugeja, Joseph
    Jacobsson, Andreas
    Davidsson, Paul
    2016 EUROPEAN INTELLIGENCE AND SECURITY INFORMATICS CONFERENCE (EISIC), 2016, : 172 - 175
  • [22] Privacy and Security in Internet-Connected Cameras
    Valente, Junia
    Koneru, Keerthi
    Cardenas, Alvaro A.
    2019 IEEE INTERNATIONAL CONGRESS ON INTERNET OF THINGS (IEEE ICIOT 2019), 2019, : 173 - 180
  • [23] Internet of Things: Security and privacy in a connected world
    Li, Jin
    Yan, Qiben
    Chang, Victor
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 : 931 - 932
  • [24] A Survey on Privacy-security in Internet of Vehicles
    Cheng, Wenzhi
    Luo, Entao
    Tang, Yayuan
    Wan, Li
    Wei, Meiyan
    2021 IEEE INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, INTL CONF ON CLOUD AND BIG DATA COMPUTING, INTL CONF ON CYBER SCIENCE AND TECHNOLOGY CONGRESS DASC/PICOM/CBDCOM/CYBERSCITECH 2021, 2021, : 644 - 650
  • [25] Towards Privacy in Geographic Message Dissemination for Connected Vehicles
    Ruehrup, Stefan
    Krenn, Stephan
    2019 8TH IEEE INTERNATIONAL CONFERENCE ON CONNECTED VEHICLES AND EXPO (IIEEE CCVE), 2019,
  • [26] Ensuring Situation-Aware Privacy for Connected Vehicles
    Li, Yunxuan
    Hirmer, Pascal
    Stach, Christoph
    Mitschang, Bernhard
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON THE INTERNET OF THINGS 2022, IOT 2022, 2022, : 135 - 138
  • [27] Towards a Security Assurance Framework for Connected Vehicles
    Pantazopoulos, Panagiotis
    Haddad, Sammy
    Lambrinoudakis, Costas
    Kalloniatis, Christos
    Maliatsos, Konstantinos
    Kanatas, Athanasios
    Varadi, Andras
    Gay, Matthieu
    Amditis, Angelos
    2018 IEEE 19TH INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS (WOWMOM), 2018,
  • [28] SECURITY STUDY AND CHALLENGES OF CONNECTED AUTONOMOUS VEHICLES
    Meryem, Sghiri
    Mazri, Tomader
    4TH INTERNATIONAL CONFERENCE ON SMART CITY APPLICATIONS (SCA' 19), 2019,
  • [29] Aspects of Cyber Security in Autonomous and Connected Vehicles
    Mudhivarthi, Bhavesh Raju
    Thakur, Prabhat
    Singh, Ghanshyam
    APPLIED SCIENCES-BASEL, 2023, 13 (05):
  • [30] Reducing Security Overhead in the Context of Connected Vehicles
    Boutahala, Ramzi
    Ayaida, Marwane
    Fouchal, Hacene
    2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 4304 - 4309