Advanced security and privacy in connected vehicles

被引:2
|
作者
Kitayama, H. [1 ]
Munetoh, S. [2 ]
Ohnishi, K. [3 ]
Uramoto, N. [2 ]
Watanabe, Y. [2 ]
机构
[1] IBM Sales & Distribut Div, Chuou Ku, Tokyo 1038510, Japan
[2] Tokyo Res Lab, IBM Res Div, Kawasaki, Kanagawa 2120032, Japan
[3] IBM Global Technol Serv, Nishi Ku, Osaka 5500004, Japan
关键词
Designing secure vehicles is becoming increasingly important as a result of recent advances in potential cyber-attacks against vehicles. This security needs to be considered over the course of the product lifecycle and includes a consideration of requirements definitions; design; development; testing; and maintenance. Even though many technologies and guidelines have been proposed to address end-to-end security design problems for the IT (information technology) industry; there are often significant differences between securing IT equipment (such as servers and PCs) and securing vehicles. Thus; purely IT-based approaches often have limited applicability in the domain of vehicle security because human safety is a primary design consideration in the development of vehicles; while relatively less attention has been paid to IT security. In addition; the lifecycle of a vehicle is often much longer than the lifecycle of many PCs and related IT equipment. Security design tends to be performed in silos and is not well coordinated among all of the stakeholders who are involved in the development of a vehicle. We have devised a specialized approach for designing secure in-vehicle infotainment systems; including the electronic control system and software. Our approach is based on secure engineering; an established methodology used in the IT industry to cover the entire software lifecycle. © 2014 IBM;
D O I
10.1147/JRD.2013.2288061
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Designing secure vehicles is becoming increasingly important as a result of recent advances in potential cyber-attacks against vehicles. This security needs to be considered over the course of the product lifecycle and includes a consideration of requirements definitions, design, development, testing, and maintenance. Even though many technologies and guidelines have been proposed to address end-to-end security design problems for the IT (information technology) industry, there are often significant differences between securing IT equipment (such as servers and PCs) and securing vehicles. Thus, purely IT-based approaches often have limited applicability in the domain of vehicle security because human safety is a primary design consideration in the development of vehicles, while relatively less attention has been paid to IT security. In addition, the lifecycle of a vehicle is often much longer than the lifecycle of many PCs and related IT equipment. Security design tends to be performed in "silos" and is not well coordinated among all of the stakeholders who are involved in the development of a vehicle. We have devised a specialized approach for designing secure in-vehicle infotainment systems, including the electronic control system and software. Our approach is based on secure engineering, an established methodology used in the IT industry to cover the entire software lifecycle.
引用
下载
收藏
页数:9
相关论文
共 50 条
  • [41] On Differential Privacy and Traffic State Estimation Problem for Connected Vehicles
    Vishnoi, Suyash C.
    Taha, Ahmad F.
    Nugroho, Sebastian A.
    Claudel, Christian G.
    2022 IEEE 61ST CONFERENCE ON DECISION AND CONTROL (CDC), 2022, : 1162 - 1167
  • [42] Privacy Impact Assessment of Cyber Attacks on Connected and Autonomous Vehicles
    Panda, Sakshyam
    Panaousis, Emmanouil
    Loukas, George
    Kentrotis, Konstantinos
    18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023, 2023,
  • [43] Distributed and Privacy Preserving Routing of Connected Vehicles to Minimize Congestion
    Boob, Surabhi
    Mahmood, Shakir
    Shahzad, Muhammad
    2020 IEEE 17TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SMART SYSTEMS (MASS 2020), 2020, : 220 - 228
  • [44] Privacy-Preserving Authentication Scheme for Connected Autonomous Vehicles
    Karabulut-Kurt, Gunes
    Nari-Baykal, Kubra
    Ozdemir, Enver
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2024, 25 (06) : 4998 - 5010
  • [45] TSP SECURITY IN INTELLIGENT AND CONNECTED VEHICLES: CHALLENGES AND SOLUTIONS
    Li, Yansong
    Luo, Qian
    Liu, Jiajia
    Guo, Hongzhi
    Kato, Nei
    IEEE WIRELESS COMMUNICATIONS, 2019, 26 (03) : 125 - 131
  • [46] UWB: Enhancing Positioning, Safety and Security for Connected Vehicles
    Glover, Kerry
    Peterson, Bror
    MICROWAVE JOURNAL, 2021, 64 (09) : 22 - 34
  • [47] 5G Communication and Security in Connected Vehicles
    Imbruglia, Antonio
    Cancila, Daniela
    Settembre, Marina
    Ada User Journal, 2022, 43 (04): : 240 - 244
  • [48] Adapting Security Policy At Runtime For Connected Autonomous Vehicles
    Loulou, Hassan
    Saudrais, Sebastien
    Soubra, Hassan
    Larouci, Cherif
    2016 IEEE 25TH INTERNATIONAL CONFERENCE ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES (WETICE), 2016, : 26 - 31
  • [49] Approaching the Automation of Cyber Security Testing of Connected Vehicles
    Marksteiner, Stefan
    Ma, Zhendong
    THIRD CENTRAL EUROPEAN CYBERSECURITY CONFERENCE (CECC 2019), 2019,
  • [50] Security Analysis of Merging Control for Connected and Automated Vehicles
    Jarouf, Abdulah
    Meskin, Nader
    Al-Kuwari, Saif
    Shakerpour, Mohammad
    Cassanderas, Christos G.
    2022 IEEE INTELLIGENT VEHICLES SYMPOSIUM (IV), 2022, : 1739 - 1744