Security Analysis and Design for Connected Vehicles

Verified

Added on  2021/04/16

|25
|6269
|107
AI Summary
This assignment involves analyzing and designing secure connected vehicle systems. It requires reviewing various research papers, case studies, and articles related to automotive safety and security. The task is to find relevant sources (minimum 25) from the provided list of references [1-25], which focus on safety and security analysis for connected vehicles. These sources include academic papers, conference proceedings, and journal articles that explore vulnerabilities in automotive systems, intrusion detection systems, security protocols for in-vehicle CAN, and limitations of existing methods like STPA-Sec. The assignment aims to educate students about the importance of integrating safety and security in the development process of smart products and digital manufacturing.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: ANALYSIS FOR SAFETY AND SECURITY IN AUTOMOTIVE VEHICLE
SECURITY SYSTEM
Analysis for Safety and Security in Automotive Vehicle Security System
Name of the Student:
Name of the University:

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1
ANALYSIS FOR SAFETY AND SECURITY IN AUTOMOTIVE VEHICLE SECURITY
SYSTEM
Abstract
The connection among the automotive systems by means of other systems is open up for the
attackers to remote access safely with the connected cars. Security of the automotive vehicle
security system is importance for the trust of the customers as well as acceptance of the emerging
technologies. The paper is described approach towards on-board detection of the unanticipated
sequences of the events to identify the risks. The result of this research paper shows that the
approach is faster for in-vehicle applications at the runtime. There are various behavioral models
which are analyzed to narrow the suspicious sequences of the events in privacy respecting
towards the global security operations with in-depth analysis.
Document Page
2
ANALYSIS FOR SAFETY AND SECURITY IN AUTOMOTIVE VEHICLE SECURITY
SYSTEM
Table of Contents
1. Introduction..................................................................................................................................3
1.1. The significance of the research...........................................................................................3
1.2. The originality of the approach.............................................................................................4
1.3. The automotive vehicle security systems and reasons for its security and safety measures 4
1.4. Safety and Security measures were undertaken in Automotive Vehicles............................5
1.5. Research gap.........................................................................................................................6
1.6. The aim of the research.........................................................................................................7
2. Materials and methods.................................................................................................................8
A. Data Collection.......................................................................................................................8
B. Data Inclusion Criteria..........................................................................................................11
C. Data Analysis........................................................................................................................12
3. Results........................................................................................................................................13
4. Discussion..................................................................................................................................16
5. Conclusion.................................................................................................................................19
References......................................................................................................................................21
Document Page
3
ANALYSIS FOR SAFETY AND SECURITY IN AUTOMOTIVE VEHICLE SECURITY
SYSTEM
1. Introduction
1.1. The significance of the research
The research paper is based on “Analysis for Safety and Security in Automotive Vehicle
Security System”. The inter-connections of automotive systems with various other systems like
road-side units, vehicles and servers over the Internet have been opening new ways for today’s
attackers. These hackers have been remotely accessing security-related subsystems within
various connected cars. Here, the security of different connected cars and overall vehicular
ecosystem has been important for gaining consumer trust and accepting the emerging innovation
[11].
The research is helping to understand the approach for different on-board detecting of
various events having anticipated sequences. This helps in identifying suspicious activities. The
outcomes of the study are used to determine how fast the in-vehicle application has been at real
runtime [4]. Various behavior models and strategies of synchronization strategies could be
assessed for narrowing down various suspicious events to be sent in privacy towards global
security operations. This is helpful for in-depth analysis in the future.
Here, the primary contribution of the task is intended to implement and design model-
based methods as compared to the measured behavior of vehicles with expected behavior. Here,
the experimental determination of the complexity of the models has been needed to find various
security anomalies in real-life implementation [10]. Further, effects of different possible
strategies re-synchronizing models with multiple event streams that might not fit the intended
behavior are analyzed from the research.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4
ANALYSIS FOR SAFETY AND SECURITY IN AUTOMOTIVE VEHICLE SECURITY
SYSTEM
1.2. The originality of the approach
The research uses current systematic approaches for the future developments of
automotive systems supporting cyber security and different safety aware developments. The
study uses techniques to analyze threats and risks that are present in automotive domains and
presenting approaches for categorizing different cyber-security threats [22]. This is useful to find
out the proper amount of countermeasures that are taken into consideration in the research.
Moreover, a combines approach for security and safety analysis has been applied in the prior
development phases [9]. This is an original pre-requisite as per as consistent engineering is
considered across the development of the life-cycle.
1.3. The automotive vehicle security systems and reasons for its security and safety
measures
The innovation was introduced in the late 70s with self-contained systems known as
ECUs into different production vehicles. However, the complicacy of embedded systems within
automotive industries has risen notably [12]. Today’s information society has been strongly
supporting various Car2X or inter-system communications within an automotive domain. [12]
showed that, as a result, the boundaries of various application domains have disappeared quickly
resulting in various cross-domain interactions and collaborations. Here, these kinds of challenges
have possessed a high effect on developing products and release of products and brand reputation
of companies. Thus different future developments of automotive systems need proper systematic
methods [19]. This has helped in developing awareness. Thus, different security standards like
ISO 2626212 regarding road vehicles are established providing guidance while various critical
safety systems developed.
Document Page
5
ANALYSIS FOR SAFETY AND SECURITY IN AUTOMOTIVE VEHICLE SECURITY
SYSTEM
According to [3], the external services, road-side units and connected cars have
established innovative ecosystems with high benefits. This has included situational awareness
helping vehicles to act intelligently and autonomously. Besides, as formerly closed automotive
systems have been evolving to open systems, the externals security threats has been affecting the
safety mechanism indirectly.
1.4. Safety and Security measures were undertaken in Automotive Vehicles
As per application requirements and scenarios are concerned the current upper-class
vehicles have comprised more than about 50 ECUs. They are connected through various bus
systems interconnected through central gateways and having various tasks. Here, the core
gateway has been connected to OBD or On-Board Diagnose ports that have been used by repair
shops According to [2]. This has been helpful to seen problems and performs various exhaust
measurements. The anomaly detection systems are implemented through detecting anomalous
behaviors that have been categorized in two stages. For example, at the first stage, a model is
represented as denoting normal behavior of the cars. In the second stage referred to as
conformance checking, that model is sued for determining the deviations from the models or
anomalies. [25] showed that here the base of normal behavior model has been tracing records
from CAN bus of the vehicles. Since it is already assumed that behavior of vehicles has never
been changing often the stage discovery has been operation going online.
During constructing behavior models, the initial task has been to build a proper model of
behavior. Here, the goal of experimental determination model complexity has been complete
identifications of behavior anomalies sufficiently. [6] argued that in the event stream processing,
the execution times are analyzed as per as behavior checking is concerned as compared to
intended behaviors provided by the model with measured behavior provided by the event stream.
Document Page
6
ANALYSIS FOR SAFETY AND SECURITY IN AUTOMOTIVE VEHICLE SECURITY
SYSTEM
During runtime, the event stream has been mapped to abstract stream through similar projections
used in the discovery phase of the model. For improving performances, the aggregation and
filtering steps are implemented through particular preprocessing elements. Regarding model
quality the experimental determinations of various model complexities suitable to find security
anomalies are needed to be found out as mentioned by Kohn and others [7].
The future activities on model discoveries have been providing algorithms adapting
model during the execution time as ay false positives are determined. Future works on various
performance issues must be transferring software to embedded platforms that have been likely
used in the vehicles of the current era [15]. Lastly, it is understood that there are various
interesting challenges while designing a global system getting event streams from various cars,
identifying attacks that are detectable from a global perspective.
1.5. Research gap
There have been many limitations in this research. First of all the study is unable to
analyze how the security engineering could be integrated to develop automotive systems such
that the current processes are impacted very little. The security engineering has encompassed
every aspect of security from identification of threats, analyzing the threats, implementation of
mitigating security measures and incorporating recovery and legal mechanisms [12]. Because of
the safety critical quality of vehicular systems, the various automotive organizations have been
undertaking robust development methods that should be observed. Further, changing those
processes has not been an as easy task. Thus, it has been vital to examine how security
engineering processes and mechanisms have been incorporated to and assimilated with the
current processes of automotive developments.

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7
ANALYSIS FOR SAFETY AND SECURITY IN AUTOMOTIVE VEHICLE SECURITY
SYSTEM
Secondly, the research is unable to answer the way in which the system architecture of
automotive systems has been affecting discovery and creation of various software vulnerabilities
and influencing the design of different protective mechanisms of security. The automotive
industry has possessed some distinct problems while designing systems [14]. Here, the outcomes
denote highly customized systems that are required to assess from security perspectives.
Moreover, here the research is unable to answer how the systematic vulnerabilities could be
exploited [23]. Further, how particular architectures have been influencing the designing of
protection mechanisms are still to be identified. The possibility to utilize security mechanisms
known from servers and desktops are needed to be determined along with how they can be used
such that they can be adapted or re-used.
Lastly, this research has overlooked the security mechanisms has been impacting
automotive systems and vice versa. The safety engineering has been present for a long time in
automotive systems. However, development security engineering has been posing interesting
query how they have been affecting others. Further, it has always been easy to imagine that few
safety mechanisms like redundancy have been able to create vulnerabilities in security that can
be easily exploited [13]. Besides, security mechanisms like authentications have been leading to
various security issues. For example, every breaking message has failed to authenticate and they
have stopped working completely.
1.6. The aim of the research
The study was aimed at various issues that are researched here. Those goals are listed
below.
Document Page
8
ANALYSIS FOR SAFETY AND SECURITY IN AUTOMOTIVE VEHICLE SECURITY
SYSTEM
Addressing cyber-security and system safety in automotive vehicles combined
and raising awareness of their mutual effects.
Examining proper threat modeling and analysis of hazards tools to quantify
security effects on dependable safety-related system development at system
levels.
Investigating systematic approaches for supporting the identification of different
trust boundaries and attacks vectors are per safety and cyber-security aspects of
automotive systems are concerned.
Analyzing how to what extent various well-known mechanisms and processes
from IT security plans ate adapted to automotive domains.
2. Materials and methods
Selection of the proper research methods are facilitating the process to collect in-depth
information regarded to the artificial domain. The selected research topic is based on artificial
intelligence. The study is focused on design of the intelligent agents. The selected topic makes
the evaluation harder since theories have some evaluation criteria. The intelligent agent is both
proactive as well as reactive, which is achieved of goals, implicit and explicit. The behavior is
planned and future oriented [1]. The agent is received and reacted of environmental changes. The
behavior is casual as well as past determined.
A. Data Collection
The events of safety and security in automotive vehicle security system are collected
using secondary data collection method. There is collection of the information from relevant
Document Page
9
ANALYSIS FOR SAFETY AND SECURITY IN AUTOMOTIVE VEHICLE SECURITY
SYSTEM
sources for finding of answers to the research problems as well as evaluating the research
outcomes [4]. The secondary data are those which are collected by someone and it is passed
throughout the statistical process. It is both published as well as unpublished data as the available
data are unsuitable. The data are set to collect from existing research articles as well as literature
that are considered to be secondary data sources [6]. The secondary data helps to understand the
different existing theories as well as concepts regards to the domain. It helps to conduct of
research in proper manner. The research work is conducted based on availability of data from the
journal articles. The records are contained of information regards to the safety and security of
automotive vehicle security system which consists of details on severity of the incidents, loss of
property and life that are involved. The entire research work is based on collected data from the
secondary sources. Mainly, the data are collected from newspaper articles, publication papers
and journal articles [9]. The secondary sources are being found from library research like the
journal articles furthermore also magazines.
The researcher is required to be careful with use of the secondary data. There are
minute’s scrutiny which are possible that the secondary data are unsuitable as well as inadequate
into the problem context where the researcher is required to study [18]. There are various
problems which are raised as well as referred to the data that are collected and analyzed by
others; therefore the arguments of other’s authors are used to analyze the security and safety of
the automotive vehicle system. The researcher is utilized of secondary data, and then there are
looked for various sources from where the researcher has to gather the secondary sources. There
is collection of original as well as realistic data [12].

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
10
ANALYSIS FOR SAFETY AND SECURITY IN AUTOMOTIVE VEHICLE SECURITY
SYSTEM
Search for the secondary data
Identification of information required on basis of research
Identification of data sources
Evaluation of data
Identification of problems and research gaps
Figure 1: Step-by-step research methodology
(Source: [5], pp-191)
The steps which are performed to do the research methodology are as follows:
Search for the secondary data: The data are collected by someone other than users. The
sources of the secondary data are the information those are collected by the organizational
records, data those are collected by the research purposes [3].
Identification of information required on basis of research: The research is composed
of gathering of information based on selected research topic. The research paper is based on
“Analysis for Safety and Security in Automotive Vehicle Security System”. Therefore, mostly
the journal articles are selected related to the topic [10].
Document Page
11
ANALYSIS FOR SAFETY AND SECURITY IN AUTOMOTIVE VEHICLE SECURITY
SYSTEM
Identification of data sources: Identification of the data sources are used to populate the
security and safety into the proposed system. The data are stored into different formats as well as
sources. There are various data types such as data at rest, data in motion and data from the data
warehouse [24]. The data from the data warehouse are structured format.
B. Data Inclusion Criteria
Certain attributes such as reliability, availability, safety and security are required to
analyze the secondary data based on selected research topic.
Table 1: Selected Attribute Description
Attribute
Name
Data Type Description
Reliability Secondary The study is used of qualitative methods to analyse seeks to
understand the experience of the users those are used of automotive
security system. It describes the safety and security events
experienced by the system users [9]. It includes of reliable
qualitative studies that are involved of secondary qualitative
analysis of qualitative data.
Availability Secondary Secondary market research is done so that the information is
gathered easily as well as accessible. There are various data sources
where the data are to be taken and it is easier to gather of relevant
information [16]. This method is used of huge amount of
information into less time.
Document Page
12
ANALYSIS FOR SAFETY AND SECURITY IN AUTOMOTIVE VEHICLE SECURITY
SYSTEM
Safety Secondary There is requirement of building of automotive vehicle system
which is started to build of safety relevant systems with the security
needs [2].
Security Secondary The researcher is evaluated to data sets for choosing of secondary
data. All the collected data are to be kept secured so that no other
persona can able to access to those data [12]. The data are kept into
secured position.
C. Data Analysis
The qualitative data analysis is set to facilitate of process to gain the theoretical as well as
conceptual data with regards to the domain being researched and allowed the researchers to gain
of insight into the research topic. This data analysis is based on the methods for performing of
subjective evaluation of the opinions as well as attributes [17]. The research analyst can perform
of in-depth analysis of the topic in addition to perform of group interviews. The data are being
analyzed with use of qualitative data collection procedure for understanding the safety and
security in automotive vehicle security system. The analysis of data is central step into the
qualitative research [19]. The collection of data is being limited towards recording and
documentation which are occurred as for example with recording interactions. Development of
qualitative data analysis is found a field where there is constant growing as well as less
structuring.

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
13
ANALYSIS FOR SAFETY AND SECURITY IN AUTOMOTIVE VEHICLE SECURITY
SYSTEM
3. Results
According to [5], dependability is such a concept which is regrouped of various system
attributes like reliability, availability, safety and security along with non-functional requirements
for the embedded systems. There are various attributes which lead to development targets. The
non-unified methods are required to manage various attributes lead to inconsistencies which are
identified into the development phases. The dependability features of Automotive Vehicle
Security System are required of development processes along with mutual domain expertise [7].
The dependable system is relied on development methods like requirement and system
engineering.
Table 2: Mapping of safety and security
Safety engineering Cyber security
engineering
Analysis
subject
External enabling conditions Hazardous situations Attack
Risk Hazard Threat
System inherent shortage Malfunction Vulnerability
Analysis
category
External risk controlling analysis Controllability Attacker skills
Impact analysis Severity Threat critically
Occurrence analysis Exposure Attack resources
Analysis
results
Design goals Safety goals Security targets
Document Page
14
ANALYSIS FOR SAFETY AND SECURITY IN AUTOMOTIVE VEHICLE SECURITY
SYSTEM
The modern “Electronic Steering Column Lock (ESCL)” systems are representative
safety as well as security relevant to the use cases, due to safety as well as security related nature
along with manageable complexity regards to the elements of the proposed system. It is
underlying of the functionality as well as external systems. The use cases are intended to train
purposes along with represents neither of the sensitive projects [17]. The proposed use cases are
elaborated in collaboration with the initiatives those are united experts from major sensitive
suppliers into focused working group. ESCL system has some basic functions such as when the
drivers are get into the car, then the vehicle immobilizer are received of ignition key signals.
When the drivers are started of the car, then the ignition-on messages are communicated by
means of controller area network bus. The time when the signals are being received by use of
ESCL along with IM enables of ESCL, the motor moves locking bolt in addition to unlocks the
steering column [22]. The process of inverse, locking of the steering column, are happened by
means of bolt movement by electric motors into the opposite directions as the vehicles are into
standstill as well as drivers are switched off ignition.
The vehicles systems are under the threat from the malicious individuals as well as
groups those are seek to gain of the personal and organizational advantages. It ensures of security
that are critical for successful deployment of the technology [20]. There are various levels for the
security protection which are based on requirements. Some of the assets are not required of
security measures due to low level of risks. The risk analysis is done to prioritize the
requirements of security due to proposed system. Related vulnerabilities as well as threats from
the external sources are considered as hacker’s communities, security researchers and
vulnerability related database [24]. The threat modeling of the automotive systems are included
of model of system by adding of details in addition to drawing of trust boundaries. There is
Document Page
15
ANALYSIS FOR SAFETY AND SECURITY IN AUTOMOTIVE VEHICLE SECURITY
SYSTEM
identification of threats from the data flows by use of threat identification methodology. There
are assessments of the threats which are added. There is addressing of the threats by redesign of
the system, adding of mitigations along with ignorance if the risks are acceptable [18]. There is
filtration of normal behavior which leaves smaller percentage of the abnormal behavior that is
basis by malicious agents lead to security of the actions into actuators of the car.
The automotive systems are subjected to the conditions that are different from the regular
IT systems. The long life time is implied of chosen security mechanisms that are functioning for
20 years. The vulnerabilities are found into various kinds of the systems that are made of secured
software updates required. Remote software updates are made of secured software updates
necessary [22]. The cost factors are cost, profit margins, cost savings which are considered.
There are different types of behavior models in addition to strategies of synchronization
strategies could be reviewed for narrowing down a variety of suspicious events to be sent in
privacy towards global security operations [12]. It is also understandable that there are different
challenges to design the automotive vehicle system which gets of events from different cars,
identification of the attacks as well as detectable from a global perspective. The behavior models
and strategies of synchronization strategies could be assessed for narrowing down various
suspicious events.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
16
ANALYSIS FOR SAFETY AND SECURITY IN AUTOMOTIVE VEHICLE SECURITY
SYSTEM
4. Discussion
The research paper is based on the impacts of security on safety that are being discussed.
There is a consideration of the functional safety hazards that are raised out of various malicious
manipulations to safety hazards raised due to systematic failures as well as failures of random
hardware. [8] discussed of security as well as safety goals to the functional safety security
analysis. The security is for safety as well as safety for driver towards the security measures. The
functional safety disciplines are considered as systematic hardware failures as the hazard
sources. The security is being considered as malicious adversary as the threat sources to the
natural disasters as well as systematic failures. [10] argued that security is such a discipline that
have broader range of an unacceptable consequences such as human life, security of human, loss
of organizational reputation, finance losses, losses of the intellectual property as well as damage
to the infrastructure. The purpose of this work is to complement of the specifications which are
based on on-board attack detections by measurement to detect the unanticipated sequences of the
events [22]. Into the research approach, there is assumption of future where there is multi-level
hierarchy of the system to detect as well as prevent of malicious activities. Into the vehicle, there
is signature based measures that are used to detect as well as combat the known attacks with on-
board networks [13]. The detection of unknown attacks is required to more resources that are
available into one vehicle and more knowledge than availability locally.
The main contribution of this research paper is analyzing the security and safety in
automotive vehicle security system. There is a designing of model based methods which are
compared to measure behavior of the vehicle with expected behavior. There is experimental
determination of the model complexity which is required to find the security anomalies with
Document Page
17
ANALYSIS FOR SAFETY AND SECURITY IN AUTOMOTIVE VEHICLE SECURITY
SYSTEM
practices [25]. In general, the system have no such knowledge of the applications related to
vehicle, therefore it is lacked connection among reported security problems as well as affected
critical behaviors. The system is also used of various types of technologies. The paper is
provided of approaches and implemented of in-vehicle processing of the events streams in
identifying the anomalous behavior with sequences of events [12]. There is filtration of normal
behavior which leaves smaller percentage of the abnormal behavior that is caused by malicious
agents lead to safety of the actions into actuators of car. The unanticipated events are required to
process the security analysis, either by the vehicle components. In order to satisfy with the
objectives, the work is contributed to design as well as implement of model based methods with
expected behavior [15]. The proposed approach is proper for computing the models considered
and executing behavior check on the computing platforms.
The approach into the automotive domain is reduction of number of Electronic Control
Unit (ECU) per car which is combined with the individual ECU to powerful domains. With such
an approach, each of the domain controller is bundled various number of functions. [18] stated
that the cars are more as well as intelligent and also connected. The technological transformation
is made of modern vehicles which are vulnerable to the cyber attacks. The cars are used to be
closed system. The automotive system is not designed with keeping in mind the security. The
security breaches are automotive domain which are raised the issues into the industry as well as
public. [16] discussed that security is a critical concern with the impact on both public as well as
safety of road. The new technologies like autonomous driving as well as intelligent transport
system are a reality. The secured development of the automotive system is required of higher
quality as well as safety standard. The automotive industry is developed as well as accepted of
ISO 26262 as the standard for the road vehicle functional safety for the proposed system which
Document Page
18
ANALYSIS FOR SAFETY AND SECURITY IN AUTOMOTIVE VEHICLE SECURITY
SYSTEM
covers of both hardware as well as software. The development is started with concept phase like
the hazard analysis as well as the risk assessment [20]. The security becomes an issue for the
safety into the modern vehicles which are attempted of emerged into recent years for tackling of
secured development of the ICT components along with system into automotive domain. It is on-
going discussions on integration of the security activities into the existing “safety-oriented
automotive development lifecycle”. There are secured development processes for cyber physical
vehicle systems [18]. Risk assessment is to be done for identification of potential cyber security
threats along with assets and also rates the risk which is associated with the possible threats.
Automotive threat modelling is such an activity which is defined as theoretical model
for perceived threats into the system. There are theoretical model to practical implementation for
capturing of the significant attack vectors. [21] discussed that threat modelling into the
automotive secured development lifecycle is addressed of software security of the web
applications into the design phase. The automotive systems are shared of commonalities with the
standard IT system, and there are various differences that are required of domain techniques as
well as research considerations. The threat modelling has various phases to meet with the
research objectives. [23] concluded that automotive vehicle system is equipped with safety
features which help to protect both the drivers as well as passengers which make easier to read
the instruments along with in-vehicle infotainments. From the data analysis part, it is stated that
security as well as safety are the highest challenges to connected as well as intelligent vehicles
[25]. Threat modelling is such a technique which is used to identify the threats along with
mitigations throughout the security analysis of the automotive systems. There are used of various
standards that are used to evaluate the risk assessment techniques. The research study is showed
of the current advances those are required of security and safety engineering [16]. This can

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
19
ANALYSIS FOR SAFETY AND SECURITY IN AUTOMOTIVE VEHICLE SECURITY
SYSTEM
acquire place as their similarities are well-known along with adequate interactions are adequately
established.
5. Conclusion
The automotive security has turned out to be very active research areas. The above
research is helpful for vehicle suppliers and manufacturers to understand the analysis of safety
and security in automotive vehicle security systems. The study shows that in spite of current
advances many open questions have been remaining and they are required to be answered. In
conclusion, it can be said that the security and safety engineering is a much closed related field
and has been able to benefit each other mutually. This can take place as their similarities are
identified and sufficient interactions are adequately established. The study has provided the
approach to implement in-vehicle processing of event streams for identifying anomalous
behavior according to various sequences and not just only on one single event. The research is
helping to understand how automotive systems can achieve long product lifetimes, long
development leading times as well as thus showing technology adoptions.
On the other hand, the security topics have been seen traditionally as effective as physical
attacks affecting single vehicles. Because of new functionalities such as autonomous driving and
various online software upgrading, this has been no longer acceptable in assuming that care
fleets have been immune to multiple security risks and different automated remote attacks. This
future automotive systems development needs proper systematic approaches to supporting safety
aware as well as cyber-security events. Further, the industry must sustain high-cost pressure to
stay competitive and here every possible cost-savings should be considered. Moreover,
automotive vehicle businesses must fulfill the legal, real-time and safety requirements that are
Document Page
20
ANALYSIS FOR SAFETY AND SECURITY IN AUTOMOTIVE VEHICLE SECURITY
SYSTEM
needed to be performed. However, this might differ around various regions of the world. The
paper is to be provided as well as implemented of the in-vehicle processing of the events streams
in recognizing the anomalous behavior with sequences of events.
Document Page
21
ANALYSIS FOR SAFETY AND SECURITY IN AUTOMOTIVE VEHICLE SECURITY
SYSTEM
References
[1]A. van Lamsweerde, "Elaborating Security Requirements by Construction of Intentional
Anti-Models", Dl.acm.org, 2018. [Online]. Available: https://dl.acm.org/citation.cfm?
id=999421. [Accessed: 15- May- 2018].
[2]S. Kondakci, "Analysis of information security reliability: A tutorial", Reliability Engineering
& System Safety, vol. 133, pp. 275-299, 2015.
[3]G. Kalra, "Threat analysis of an enterprise messaging system", Network Security, vol. 2014,
no. 12, pp. 7-13, 2014.
[4]R. Sadia, S. Bekhor and A. Polus, "Individual Selection of Driving Speeds: Analysis of a
Stated Preference Survey", Journal of Transportation Safety & Security, vol. 7, no. 4, pp. 291-
306, 2015.
[5]A. Fletcher, "Applying critical realism in qualitative research: methodology meets
method", International Journal of Social Research Methodology, vol. 20, no. 2, pp. 181-194,
2016.
[6]R. Thomson and J. McLeod, "New frontiers in qualitative longitudinal research: an agenda for
research", International Journal of Social Research Methodology, vol. 18, no. 3, pp. 243-250,
2015.
[7]G. Mangiameli, "BMC Medical Research Methodology reviewer acknowledgement
2015", BMC Medical Research Methodology, vol. 16, no. 1, 2016.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
22
ANALYSIS FOR SAFETY AND SECURITY IN AUTOMOTIVE VEHICLE SECURITY
SYSTEM
[8] M. Zhu and P. Liu, "Reviewing the book “Principles of Cyber-physical Systems” from a
security perspective", ICST Transactions on Security and Safety, vol. 2, no. 4, p. 150480, 2015.
[9] E. Piesik, M. Śliwiński and T. Barnert, "Determining and verifying the safety integrity level
of the safety instrumented systems with the uncertainty and security aspects", Reliability
Engineering & System Safety, vol. 152, pp. 259-272, 2016.
[10] A. Kohn, R. Schneider, A. Vilela, U. Dannebaum and A. Herkersdorf, "Markov Chain-
based Reliability Analysis for Automotive Fail-Operational Systems", SAE International Journal
of Transportation Safety, vol. 5, no. 1, 2017.
[11] C. Schmittner, E. Ma, Z., Schoitsch and T. Gruber, “A case study of fmvea and chassis as
safety and security co-analysis method for automotive cyber-physical systems”. In Proceedings
of the 1st ACM Workshop on Cyber-Physical System Security (pp. 69-80). ACM. 2015.
[12] G. Macher, H. Sporer, R. Berlach, E. Armengaud and C. Kreiner, March. SAHARA: a
security-aware hazard and risk analysis method. In Design, Automation & Test in Europe
Conference & Exhibition (DATE), 2015 (pp. 621-624). IEEE. 2015.
[13] M. Steger, M. Karner, J., Hillebrand, W. Rom and K. Römer. A security metric for
structured security analysis of cyber-physical systems supporting SAE J3061. In Modelling,
Analysis, and Control of Complex CPS (CPS Data), 2016 2nd International Workshop on (pp. 1-
6). IEEE. 2016.
[14] V. Izosimov, A. Asvestopoulos, O. Blomkvist, M. and Törngren. Security-aware
development of cyber-physical systems illustrated with automotive case study. In Proceedings of
Document Page
23
ANALYSIS FOR SAFETY AND SECURITY IN AUTOMOTIVE VEHICLE SECURITY
SYSTEM
the 2016 Conference on Design, Automation & Test in Europe (pp. 818-821). EDA Consortium.
2016.
[15] P. Mundhenk, S. Steinhorst, M. Lukasiewycz, S.A. Fahmy and S. Chakraborty. Security
analysis of automotive architectures using probabilistic model checking. In Proceedings of the
52nd Annual Design Automation Conference (p. 38). ACM. 2015.
[16] H.M. Song, H.MRKim, H.K. and Kim. January. Intrusion detection system based on the
analysis of time intervals of CAN messages for in-vehicle network. In Information Networking
(ICOIN), 2016 International Conference on (pp. 63-68). IEEE. 2016
[17] M. Amoozadeh, A., Raghuramu, C.N., Chuah, D. Ghosal, H.M. Zhang, J. Rowe and K.
Levitt. Security vulnerabilities of connected vehicle streams and their impact on cooperative
driving. IEEE Communications Magazine, 53(6), pp.126-132. 2015.
[18] S. Woo,H.J.., Jo, D.H.. and Lee, A practical wireless attack on the connected car and
security protocol for in-vehicle CAN. IEEE Transactions on Intelligent Transportation
Systems, 16(2), pp.993-1006. 2015.
[19] C. Schmittner, Z., Ma, Z. and P. Puschner, Limitation and improvement of STPA-Sec for
safety and security co-analysis. In International Conference on Computer Safety, Reliability, and
Security (pp. 195-209). Springer, Cham. 2016.
[20] P. Mundhenk, A., Mrowca, S., Steinhorst, M., Lukasiewycz, S.A., Fahmy and S.
Chakraborty. Open source model and simulator for real-time performance analysis of automotive
network security. Acm Sigbed Review, 13(3), pp.8-13. 2016.
Document Page
24
ANALYSIS FOR SAFETY AND SECURITY IN AUTOMOTIVE VEHICLE SECURITY
SYSTEM
[21] A. Riel, C. Kreiner, G, Macher and R. Messnarz. Integrated design for tackling safety and
security challenges of smart products and digital manufacturing. CIRP Annals, 66(1), pp.177-
180. 2017.
[22] C.W. Lin and H. Yu, cooperation or competition?: Coexistence of safety and security in
next-generation ethernet-based automotive networks. In Proceedings of the 53rd Annual Design
Automation Conference (p. 52). ACM. 2016.
[23] B. Zheng, W. Li, P. Deng, L. Gérard, Q. Zhu and N. Shankar. Design and verification for
transportation system security. In Proceedings of the 52nd annual design automation
conference (p. 96). ACM. 2015.
[24] K. Schmidt, P. Tröger, H.M. Kroll, T. Bünger, F. Krueger, and C. Neuhaus, Adapted
development process for security in networked automotive systems. SAE International Journal
of Passenger Cars-Electronic and Electrical Systems, 7(2014-01-0334), pp.516-526. 2014.
[25] Ward, D., 2016. Aligning safety and security systems for connected vehicles. 2016.
1 out of 25
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]