Federated Platooning: Insider Threats and Mitigations

被引:0
|
作者
Callegati, Franco [1 ]
Gabbrielli, Maurizio [1 ,2 ]
Giallorenzo, Saverio [3 ]
Melis, Andrea [1 ]
Prandini, Marco [1 ]
机构
[1] Univ Bologna, Bologna, Italy
[2] INRIA, Rocquencourt, France
[3] Univ Southern Denmark, Odense, Denmark
关键词
VEHICLE; MOBILITY; SERVICE; FLOW;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Platoon formation is a freight organization system where a group of vehicles follows a predefined trajectory maintaining a desired spatial pattern. Benefits of platooning include fuel savings, reduction of carbon dioxide emissions, and efficient allocation of road capacity. While traditionally platooning has been an exclusive option limited to specific geographical areas managed by a single operator, recent technological developments and EU initiatives are directed at the creation of an international, federated market for platooning, i.e., a consortium of platoon operators that collaborate and coordinate their users to constitute freights covering international routes. In this paper, we look at federated platooning from an insiders' perspective. In our development, first we outline the basic elements of platooning and federation of platooning operators. Then, we provide a comprehensive analysis to identify the possible insiders (employees, users, operators, and federated members) and the threats they pose. Finally, we propose two layered, composable technical solutions to mitigate those threats: a) a decentralized overlay network that regulates the interactions among the stakeholders, useful to mitigate issues linked to data safety and trustworthiness and b) a dynamic federation platform, needed to monitor and interrupt deviant behaviors of federated members.
引用
下载
收藏
页码:3222 / 3231
页数:10
相关论文
共 50 条
  • [21] Techniques and countermeasures for preventing insider threats
    Alsowail, Rakan A.
    Al-Shehari, Taher
    PEERJ COMPUTER SCIENCE, 2022, 8
  • [22] Detecting Insider Threats: Solutions and Trends
    Zeadally, Sherali
    Yu, Byunggu
    Jeong, Dong Hyun
    Liang, Lily
    INFORMATION SECURITY JOURNAL, 2012, 21 (04): : 183 - 192
  • [23] Introduction to the Special Issue on Insider Threats
    Claycomb, Bill
    Greitzer, Frank
    Jaros, Stephanie L.
    Gardner, Carrie
    DIGITAL THREATS: RESEARCH AND PRACTICE, 2022, 3 (01):
  • [24] Model Based Analysis of Insider Threats
    Chen, Taolue
    Han, Tingting
    Kammueller, Florian
    Nemli, Ibrahim
    Probst, Christian W.
    2016 INTERNATIONAL CONFERENCE ON CYBER SECURITY AND PROTECTION OF DIGITAL SERVICES (CYBER SECURITY), 2016,
  • [25] Leveraging Parent Mitigations and Threats for CAPEC-Driven Hierarchies
    Engebretson, Patrick H.
    Pauli, Joshua J.
    PROCEEDINGS OF THE 2009 SIXTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, VOLS 1-3, 2009, : 344 - 349
  • [26] A comprehensive survey on SDN security: threats, mitigations, and future directions
    Maleh Y.
    Qasmaoui Y.
    El Gholami K.
    Sadqi Y.
    Mounir S.
    Journal of Reliable Intelligent Environments, 2023, 9 (02) : 201 - 239
  • [27] Security Threats and their Mitigations on the Operating System of Internet of Medical Things (IoMT)
    Ghazal, Taher M.
    Hasan, Mohammad Kamrul
    Issa, Ghassan F.
    Al-Dmour, Nidal A.
    Alnawayseh, Saif. E. A.
    Al-Sit, Waleed T.
    2022 14TH INTERNATIONAL CONFERENCE ON MATHEMATICS, ACTUARIAL SCIENCE, COMPUTER SCIENCE AND STATISTICS (MACS), 2022,
  • [28] Towards Formal Analysis of Insider Threats for Auctions
    Kammuller, Florian
    Kerber, Manfred
    Probst, Christian W.
    MIST'16: PROCEEDINGS OF THE INTERNATIONAL WORKSHOP ON MANAGING INSIDER SECURITY THREATS, 2016, : 23 - 34
  • [29] Detecting and Preventing Cyber Insider Threats: A Survey
    Liu, Liu
    De Vel, Olivier
    Han, Qing-Long
    Zhang, Jun
    Xiang, Yang
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (02): : 1397 - 1417
  • [30] Understanding and countering insider threats in software development
    Franz, Michael
    2008 INTERNATIONAL MCETECH CONFERENCE ON E-TECHNOLOGIES, PROCEEDINGS, 2007, : 81 - 90