Advanced security and privacy in connected vehicles

被引:2
|
作者
Kitayama, H. [1 ]
Munetoh, S. [2 ]
Ohnishi, K. [3 ]
Uramoto, N. [2 ]
Watanabe, Y. [2 ]
机构
[1] IBM Sales & Distribut Div, Chuou Ku, Tokyo 1038510, Japan
[2] Tokyo Res Lab, IBM Res Div, Kawasaki, Kanagawa 2120032, Japan
[3] IBM Global Technol Serv, Nishi Ku, Osaka 5500004, Japan
关键词
Designing secure vehicles is becoming increasingly important as a result of recent advances in potential cyber-attacks against vehicles. This security needs to be considered over the course of the product lifecycle and includes a consideration of requirements definitions; design; development; testing; and maintenance. Even though many technologies and guidelines have been proposed to address end-to-end security design problems for the IT (information technology) industry; there are often significant differences between securing IT equipment (such as servers and PCs) and securing vehicles. Thus; purely IT-based approaches often have limited applicability in the domain of vehicle security because human safety is a primary design consideration in the development of vehicles; while relatively less attention has been paid to IT security. In addition; the lifecycle of a vehicle is often much longer than the lifecycle of many PCs and related IT equipment. Security design tends to be performed in silos and is not well coordinated among all of the stakeholders who are involved in the development of a vehicle. We have devised a specialized approach for designing secure in-vehicle infotainment systems; including the electronic control system and software. Our approach is based on secure engineering; an established methodology used in the IT industry to cover the entire software lifecycle. © 2014 IBM;
D O I
10.1147/JRD.2013.2288061
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Designing secure vehicles is becoming increasingly important as a result of recent advances in potential cyber-attacks against vehicles. This security needs to be considered over the course of the product lifecycle and includes a consideration of requirements definitions, design, development, testing, and maintenance. Even though many technologies and guidelines have been proposed to address end-to-end security design problems for the IT (information technology) industry, there are often significant differences between securing IT equipment (such as servers and PCs) and securing vehicles. Thus, purely IT-based approaches often have limited applicability in the domain of vehicle security because human safety is a primary design consideration in the development of vehicles, while relatively less attention has been paid to IT security. In addition, the lifecycle of a vehicle is often much longer than the lifecycle of many PCs and related IT equipment. Security design tends to be performed in "silos" and is not well coordinated among all of the stakeholders who are involved in the development of a vehicle. We have devised a specialized approach for designing secure in-vehicle infotainment systems, including the electronic control system and software. Our approach is based on secure engineering, an established methodology used in the IT industry to cover the entire software lifecycle.
引用
下载
收藏
页数:9
相关论文
共 50 条
  • [31] On the role of informational privacy in connected vehicles: A privacy-aware acceptance modelling approach for connected vehicular services
    Walter, Jonas
    Abendroth, Bettina
    TELEMATICS AND INFORMATICS, 2020, 49
  • [32] Advanced Information and Communication Technology for Connected Vehicles and Autonomous Vehicles
    Yu, F. Richard
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2017, 66 (06) : 4515 - 4516
  • [33] Enhancing Security, Privacy, and Trust in Connected UAV Systems
    Mukkamala, Ravi
    Aljohani, Meshari
    Rangi, Aditya
    Olariu, Stephen
    2023 IEEE/AIAA 42ND DIGITAL AVIONICS SYSTEMS CONFERENCE, DASC, 2023,
  • [34] Addressing Privacy and Security in Connected Health with Fog Computing
    Dimitrievski, Ace
    Zdravevski, Eftim
    Lameski, Petre
    Trajkovik, Vladimir
    PROCEEDINGS OF THE 5TH EAI INTERNATIONAL CONFERENCE ON SMART OBJECTS AND TECHNOLOGIES FOR SOCIAL GOOD (GOODTECHS 2019), 2019, : 255 - 260
  • [35] Security and Privacy Challenges in Connected Vehicular Cloud Computing
    Masood, Arooj
    Lakew, Demeke Shumeye
    Cho, Sungrae
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (04): : 2725 - 2764
  • [36] Advanced Sensing and Control for Connected and Automated Vehicles
    Huang, Chao
    Du, Haiping
    Zhao, Wanzhong
    Zhao, Yifan
    Yan, Fuwu
    Lv, Chen
    SENSORS, 2022, 22 (04)
  • [37] Autonomous Vehicles: Resource Allocation, Security, and Data Privacy
    Nayak, Biraja Prasad
    Hota, Lopamudra
    Kumar, Arun
    Turuk, Ashok Kumar
    Chong, Peter H. J.
    IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING, 2022, 6 (01): : 117 - 131
  • [38] Threat Modeling of Connected Vehicles: A privacy analysis and extension of vehicleLang
    Xiong, Wenjun
    Lagerstrom, Robert
    2019 INTERNATIONAL CONFERENCE ON CYBER SITUATIONAL AWARENESS, DATA ANALYTICS AND ASSESSMENT (CYBER SA), 2019,
  • [39] Benchmarking Consumer Data and Privacy Knowledge in Connected and Autonomous Vehicles
    Barber, Flora
    Furnell, Steven
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2021, : 426 - 434
  • [40] Privacy Enhancing Technologies (PETs) for connected vehicles in smart cities
    Safa, Nader Sohrabi
    Mitchell, Faye
    Maple, Carsten
    Azad, Muhammad Ajmal
    Dabbagh, Mohammad
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (10)