Federated Platooning: Insider Threats and Mitigations

被引:0
|
作者
Callegati, Franco [1 ]
Gabbrielli, Maurizio [1 ,2 ]
Giallorenzo, Saverio [3 ]
Melis, Andrea [1 ]
Prandini, Marco [1 ]
机构
[1] Univ Bologna, Bologna, Italy
[2] INRIA, Rocquencourt, France
[3] Univ Southern Denmark, Odense, Denmark
关键词
VEHICLE; MOBILITY; SERVICE; FLOW;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Platoon formation is a freight organization system where a group of vehicles follows a predefined trajectory maintaining a desired spatial pattern. Benefits of platooning include fuel savings, reduction of carbon dioxide emissions, and efficient allocation of road capacity. While traditionally platooning has been an exclusive option limited to specific geographical areas managed by a single operator, recent technological developments and EU initiatives are directed at the creation of an international, federated market for platooning, i.e., a consortium of platoon operators that collaborate and coordinate their users to constitute freights covering international routes. In this paper, we look at federated platooning from an insiders' perspective. In our development, first we outline the basic elements of platooning and federation of platooning operators. Then, we provide a comprehensive analysis to identify the possible insiders (employees, users, operators, and federated members) and the threats they pose. Finally, we propose two layered, composable technical solutions to mitigate those threats: a) a decentralized overlay network that regulates the interactions among the stakeholders, useful to mitigate issues linked to data safety and trustworthiness and b) a dynamic federation platform, needed to monitor and interrupt deviant behaviors of federated members.
引用
收藏
页码:3222 / 3231
页数:10
相关论文
共 50 条
  • [1] Redefining insider threats: a distinction between insider hazards and insider threats
    Mathias Reveraert
    Tom Sauer
    [J]. Security Journal, 2021, 34 : 755 - 775
  • [2] Redefining insider threats: a distinction between insider hazards and insider threats
    Reveraert, Mathias
    Sauer, Tom
    [J]. SECURITY JOURNAL, 2021, 34 (04) : 755 - 775
  • [3] Insider threats
    Hobbs, Christopher
    [J]. INTERNATIONAL AFFAIRS, 2019, 95 (03) : 725 - 726
  • [4] Identifying Indicators of Insider Threats: Insider IT Sabotage
    Claycomb, William R.
    Huth, Carly L.
    Phillips, Brittany
    Flynn, Lori
    McIntire, David
    [J]. 2013 47TH INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2013,
  • [5] Securing Services in the Cloud: An Investigation of the Threats and the Mitigations
    Farroha, Bassam S.
    Farroha, Deborah L.
    [J]. DEFENSE TRANSFORMATION AND NET-CENTRIC SYSTEMS 2012, 2012, 8405
  • [6] Social engineering and Insider threats
    LiuXiangyu
    LiQiuyang
    Chandel, Sonali
    [J]. 2017 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2017, : 25 - 34
  • [7] A primer on insider threats in cybersecurity
    Prabhu, Sunitha
    Thompson, Nik
    [J]. INFORMATION SECURITY JOURNAL, 2022, 31 (05): : 602 - 611
  • [8] Isabelle Modelchecking for Insider Threats
    Kammuller, Florian
    [J]. DATA PRIVACY MANAGEMENT AND SECURITY ASSURANCE, 2016, 9963 : 196 - 210
  • [9] Modelling of Enterprise Insider Threats
    Roy, Puloma
    Mazumdar, Chandan
    [J]. 2015 INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2015, : 132 - 136
  • [10] Identifying and Mitigating Insider Threats
    Probst, Christian W.
    [J]. IT-INFORMATION TECHNOLOGY, 2011, 53 (04): : 202 - 206