Analysis for Safety and Security in Automotive Vehicle Security System
VerifiedAdded on 2021/04/16
|25
|6269
|107
Report
AI Summary
This report provides an in-depth analysis of safety and security in automotive vehicle security systems. It begins by highlighting the significance of the research, emphasizing the increasing vulnerabilities of connected cars to cyberattacks and the importance of consumer trust in emerging technologies. The report outlines the originality of the approach, which focuses on on-board detection of unanticipated event sequences to identify risks and the use of behavioral models to narrow down suspicious events. The methodology involves data collection from secondary sources such as journal articles, publications, and research papers. The report discusses the limitations of the research, including the integration of security engineering into automotive systems, the impact of system architecture on software vulnerabilities, and the influence of security mechanisms on automotive systems and vice versa. The aim of the research includes addressing cyber-security and system safety in automotive vehicles, examining threat modeling, and investigating systematic approaches for identifying trust boundaries and attack vectors. The report also covers the materials and methods used for data collection and analysis, and the results and discussion of the findings. The conclusion summarizes the key findings and implications of the research, offering valuable insights into the current state and future developments of automotive security systems.

Running head: ANALYSIS FOR SAFETY AND SECURITY IN AUTOMOTIVE VEHICLE
SECURITY SYSTEM
Analysis for Safety and Security in Automotive Vehicle Security System
Name of the Student:
Name of the University:
SECURITY SYSTEM
Analysis for Safety and Security in Automotive Vehicle Security System
Name of the Student:
Name of the University:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1
ANALYSIS FOR SAFETY AND SECURITY IN AUTOMOTIVE VEHICLE SECURITY
SYSTEM
Abstract
The connection among the automotive systems by means of other systems is open up for the
attackers to remote access safely with the connected cars. Security of the automotive vehicle
security system is importance for the trust of the customers as well as acceptance of the emerging
technologies. The paper is described approach towards on-board detection of the unanticipated
sequences of the events to identify the risks. The result of this research paper shows that the
approach is faster for in-vehicle applications at the runtime. There are various behavioral models
which are analyzed to narrow the suspicious sequences of the events in privacy respecting
towards the global security operations with in-depth analysis.
ANALYSIS FOR SAFETY AND SECURITY IN AUTOMOTIVE VEHICLE SECURITY
SYSTEM
Abstract
The connection among the automotive systems by means of other systems is open up for the
attackers to remote access safely with the connected cars. Security of the automotive vehicle
security system is importance for the trust of the customers as well as acceptance of the emerging
technologies. The paper is described approach towards on-board detection of the unanticipated
sequences of the events to identify the risks. The result of this research paper shows that the
approach is faster for in-vehicle applications at the runtime. There are various behavioral models
which are analyzed to narrow the suspicious sequences of the events in privacy respecting
towards the global security operations with in-depth analysis.

2
ANALYSIS FOR SAFETY AND SECURITY IN AUTOMOTIVE VEHICLE SECURITY
SYSTEM
Table of Contents
1. Introduction..................................................................................................................................3
1.1. The significance of the research...........................................................................................3
1.2. The originality of the approach.............................................................................................4
1.3. The automotive vehicle security systems and reasons for its security and safety measures 4
1.4. Safety and Security measures were undertaken in Automotive Vehicles............................5
1.5. Research gap.........................................................................................................................6
1.6. The aim of the research.........................................................................................................7
2. Materials and methods.................................................................................................................8
A. Data Collection.......................................................................................................................8
B. Data Inclusion Criteria..........................................................................................................11
C. Data Analysis........................................................................................................................12
3. Results........................................................................................................................................13
4. Discussion..................................................................................................................................16
5. Conclusion.................................................................................................................................19
References......................................................................................................................................21
ANALYSIS FOR SAFETY AND SECURITY IN AUTOMOTIVE VEHICLE SECURITY
SYSTEM
Table of Contents
1. Introduction..................................................................................................................................3
1.1. The significance of the research...........................................................................................3
1.2. The originality of the approach.............................................................................................4
1.3. The automotive vehicle security systems and reasons for its security and safety measures 4
1.4. Safety and Security measures were undertaken in Automotive Vehicles............................5
1.5. Research gap.........................................................................................................................6
1.6. The aim of the research.........................................................................................................7
2. Materials and methods.................................................................................................................8
A. Data Collection.......................................................................................................................8
B. Data Inclusion Criteria..........................................................................................................11
C. Data Analysis........................................................................................................................12
3. Results........................................................................................................................................13
4. Discussion..................................................................................................................................16
5. Conclusion.................................................................................................................................19
References......................................................................................................................................21
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3
ANALYSIS FOR SAFETY AND SECURITY IN AUTOMOTIVE VEHICLE SECURITY
SYSTEM
1. Introduction
1.1. The significance of the research
The research paper is based on “Analysis for Safety and Security in Automotive Vehicle
Security System”. The inter-connections of automotive systems with various other systems like
road-side units, vehicles and servers over the Internet have been opening new ways for today’s
attackers. These hackers have been remotely accessing security-related subsystems within
various connected cars. Here, the security of different connected cars and overall vehicular
ecosystem has been important for gaining consumer trust and accepting the emerging innovation
[11].
The research is helping to understand the approach for different on-board detecting of
various events having anticipated sequences. This helps in identifying suspicious activities. The
outcomes of the study are used to determine how fast the in-vehicle application has been at real
runtime [4]. Various behavior models and strategies of synchronization strategies could be
assessed for narrowing down various suspicious events to be sent in privacy towards global
security operations. This is helpful for in-depth analysis in the future.
Here, the primary contribution of the task is intended to implement and design model-
based methods as compared to the measured behavior of vehicles with expected behavior. Here,
the experimental determination of the complexity of the models has been needed to find various
security anomalies in real-life implementation [10]. Further, effects of different possible
strategies re-synchronizing models with multiple event streams that might not fit the intended
behavior are analyzed from the research.
ANALYSIS FOR SAFETY AND SECURITY IN AUTOMOTIVE VEHICLE SECURITY
SYSTEM
1. Introduction
1.1. The significance of the research
The research paper is based on “Analysis for Safety and Security in Automotive Vehicle
Security System”. The inter-connections of automotive systems with various other systems like
road-side units, vehicles and servers over the Internet have been opening new ways for today’s
attackers. These hackers have been remotely accessing security-related subsystems within
various connected cars. Here, the security of different connected cars and overall vehicular
ecosystem has been important for gaining consumer trust and accepting the emerging innovation
[11].
The research is helping to understand the approach for different on-board detecting of
various events having anticipated sequences. This helps in identifying suspicious activities. The
outcomes of the study are used to determine how fast the in-vehicle application has been at real
runtime [4]. Various behavior models and strategies of synchronization strategies could be
assessed for narrowing down various suspicious events to be sent in privacy towards global
security operations. This is helpful for in-depth analysis in the future.
Here, the primary contribution of the task is intended to implement and design model-
based methods as compared to the measured behavior of vehicles with expected behavior. Here,
the experimental determination of the complexity of the models has been needed to find various
security anomalies in real-life implementation [10]. Further, effects of different possible
strategies re-synchronizing models with multiple event streams that might not fit the intended
behavior are analyzed from the research.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4
ANALYSIS FOR SAFETY AND SECURITY IN AUTOMOTIVE VEHICLE SECURITY
SYSTEM
1.2. The originality of the approach
The research uses current systematic approaches for the future developments of
automotive systems supporting cyber security and different safety aware developments. The
study uses techniques to analyze threats and risks that are present in automotive domains and
presenting approaches for categorizing different cyber-security threats [22]. This is useful to find
out the proper amount of countermeasures that are taken into consideration in the research.
Moreover, a combines approach for security and safety analysis has been applied in the prior
development phases [9]. This is an original pre-requisite as per as consistent engineering is
considered across the development of the life-cycle.
1.3. The automotive vehicle security systems and reasons for its security and safety
measures
The innovation was introduced in the late 70s with self-contained systems known as
ECUs into different production vehicles. However, the complicacy of embedded systems within
automotive industries has risen notably [12]. Today’s information society has been strongly
supporting various Car2X or inter-system communications within an automotive domain. [12]
showed that, as a result, the boundaries of various application domains have disappeared quickly
resulting in various cross-domain interactions and collaborations. Here, these kinds of challenges
have possessed a high effect on developing products and release of products and brand reputation
of companies. Thus different future developments of automotive systems need proper systematic
methods [19]. This has helped in developing awareness. Thus, different security standards like
ISO 2626212 regarding road vehicles are established providing guidance while various critical
safety systems developed.
ANALYSIS FOR SAFETY AND SECURITY IN AUTOMOTIVE VEHICLE SECURITY
SYSTEM
1.2. The originality of the approach
The research uses current systematic approaches for the future developments of
automotive systems supporting cyber security and different safety aware developments. The
study uses techniques to analyze threats and risks that are present in automotive domains and
presenting approaches for categorizing different cyber-security threats [22]. This is useful to find
out the proper amount of countermeasures that are taken into consideration in the research.
Moreover, a combines approach for security and safety analysis has been applied in the prior
development phases [9]. This is an original pre-requisite as per as consistent engineering is
considered across the development of the life-cycle.
1.3. The automotive vehicle security systems and reasons for its security and safety
measures
The innovation was introduced in the late 70s with self-contained systems known as
ECUs into different production vehicles. However, the complicacy of embedded systems within
automotive industries has risen notably [12]. Today’s information society has been strongly
supporting various Car2X or inter-system communications within an automotive domain. [12]
showed that, as a result, the boundaries of various application domains have disappeared quickly
resulting in various cross-domain interactions and collaborations. Here, these kinds of challenges
have possessed a high effect on developing products and release of products and brand reputation
of companies. Thus different future developments of automotive systems need proper systematic
methods [19]. This has helped in developing awareness. Thus, different security standards like
ISO 2626212 regarding road vehicles are established providing guidance while various critical
safety systems developed.

5
ANALYSIS FOR SAFETY AND SECURITY IN AUTOMOTIVE VEHICLE SECURITY
SYSTEM
According to [3], the external services, road-side units and connected cars have
established innovative ecosystems with high benefits. This has included situational awareness
helping vehicles to act intelligently and autonomously. Besides, as formerly closed automotive
systems have been evolving to open systems, the externals security threats has been affecting the
safety mechanism indirectly.
1.4. Safety and Security measures were undertaken in Automotive Vehicles
As per application requirements and scenarios are concerned the current upper-class
vehicles have comprised more than about 50 ECUs. They are connected through various bus
systems interconnected through central gateways and having various tasks. Here, the core
gateway has been connected to OBD or On-Board Diagnose ports that have been used by repair
shops According to [2]. This has been helpful to seen problems and performs various exhaust
measurements. The anomaly detection systems are implemented through detecting anomalous
behaviors that have been categorized in two stages. For example, at the first stage, a model is
represented as denoting normal behavior of the cars. In the second stage referred to as
conformance checking, that model is sued for determining the deviations from the models or
anomalies. [25] showed that here the base of normal behavior model has been tracing records
from CAN bus of the vehicles. Since it is already assumed that behavior of vehicles has never
been changing often the stage discovery has been operation going online.
During constructing behavior models, the initial task has been to build a proper model of
behavior. Here, the goal of experimental determination model complexity has been complete
identifications of behavior anomalies sufficiently. [6] argued that in the event stream processing,
the execution times are analyzed as per as behavior checking is concerned as compared to
intended behaviors provided by the model with measured behavior provided by the event stream.
ANALYSIS FOR SAFETY AND SECURITY IN AUTOMOTIVE VEHICLE SECURITY
SYSTEM
According to [3], the external services, road-side units and connected cars have
established innovative ecosystems with high benefits. This has included situational awareness
helping vehicles to act intelligently and autonomously. Besides, as formerly closed automotive
systems have been evolving to open systems, the externals security threats has been affecting the
safety mechanism indirectly.
1.4. Safety and Security measures were undertaken in Automotive Vehicles
As per application requirements and scenarios are concerned the current upper-class
vehicles have comprised more than about 50 ECUs. They are connected through various bus
systems interconnected through central gateways and having various tasks. Here, the core
gateway has been connected to OBD or On-Board Diagnose ports that have been used by repair
shops According to [2]. This has been helpful to seen problems and performs various exhaust
measurements. The anomaly detection systems are implemented through detecting anomalous
behaviors that have been categorized in two stages. For example, at the first stage, a model is
represented as denoting normal behavior of the cars. In the second stage referred to as
conformance checking, that model is sued for determining the deviations from the models or
anomalies. [25] showed that here the base of normal behavior model has been tracing records
from CAN bus of the vehicles. Since it is already assumed that behavior of vehicles has never
been changing often the stage discovery has been operation going online.
During constructing behavior models, the initial task has been to build a proper model of
behavior. Here, the goal of experimental determination model complexity has been complete
identifications of behavior anomalies sufficiently. [6] argued that in the event stream processing,
the execution times are analyzed as per as behavior checking is concerned as compared to
intended behaviors provided by the model with measured behavior provided by the event stream.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

6
ANALYSIS FOR SAFETY AND SECURITY IN AUTOMOTIVE VEHICLE SECURITY
SYSTEM
During runtime, the event stream has been mapped to abstract stream through similar projections
used in the discovery phase of the model. For improving performances, the aggregation and
filtering steps are implemented through particular preprocessing elements. Regarding model
quality the experimental determinations of various model complexities suitable to find security
anomalies are needed to be found out as mentioned by Kohn and others [7].
The future activities on model discoveries have been providing algorithms adapting
model during the execution time as ay false positives are determined. Future works on various
performance issues must be transferring software to embedded platforms that have been likely
used in the vehicles of the current era [15]. Lastly, it is understood that there are various
interesting challenges while designing a global system getting event streams from various cars,
identifying attacks that are detectable from a global perspective.
1.5. Research gap
There have been many limitations in this research. First of all the study is unable to
analyze how the security engineering could be integrated to develop automotive systems such
that the current processes are impacted very little. The security engineering has encompassed
every aspect of security from identification of threats, analyzing the threats, implementation of
mitigating security measures and incorporating recovery and legal mechanisms [12]. Because of
the safety critical quality of vehicular systems, the various automotive organizations have been
undertaking robust development methods that should be observed. Further, changing those
processes has not been an as easy task. Thus, it has been vital to examine how security
engineering processes and mechanisms have been incorporated to and assimilated with the
current processes of automotive developments.
ANALYSIS FOR SAFETY AND SECURITY IN AUTOMOTIVE VEHICLE SECURITY
SYSTEM
During runtime, the event stream has been mapped to abstract stream through similar projections
used in the discovery phase of the model. For improving performances, the aggregation and
filtering steps are implemented through particular preprocessing elements. Regarding model
quality the experimental determinations of various model complexities suitable to find security
anomalies are needed to be found out as mentioned by Kohn and others [7].
The future activities on model discoveries have been providing algorithms adapting
model during the execution time as ay false positives are determined. Future works on various
performance issues must be transferring software to embedded platforms that have been likely
used in the vehicles of the current era [15]. Lastly, it is understood that there are various
interesting challenges while designing a global system getting event streams from various cars,
identifying attacks that are detectable from a global perspective.
1.5. Research gap
There have been many limitations in this research. First of all the study is unable to
analyze how the security engineering could be integrated to develop automotive systems such
that the current processes are impacted very little. The security engineering has encompassed
every aspect of security from identification of threats, analyzing the threats, implementation of
mitigating security measures and incorporating recovery and legal mechanisms [12]. Because of
the safety critical quality of vehicular systems, the various automotive organizations have been
undertaking robust development methods that should be observed. Further, changing those
processes has not been an as easy task. Thus, it has been vital to examine how security
engineering processes and mechanisms have been incorporated to and assimilated with the
current processes of automotive developments.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7
ANALYSIS FOR SAFETY AND SECURITY IN AUTOMOTIVE VEHICLE SECURITY
SYSTEM
Secondly, the research is unable to answer the way in which the system architecture of
automotive systems has been affecting discovery and creation of various software vulnerabilities
and influencing the design of different protective mechanisms of security. The automotive
industry has possessed some distinct problems while designing systems [14]. Here, the outcomes
denote highly customized systems that are required to assess from security perspectives.
Moreover, here the research is unable to answer how the systematic vulnerabilities could be
exploited [23]. Further, how particular architectures have been influencing the designing of
protection mechanisms are still to be identified. The possibility to utilize security mechanisms
known from servers and desktops are needed to be determined along with how they can be used
such that they can be adapted or re-used.
Lastly, this research has overlooked the security mechanisms has been impacting
automotive systems and vice versa. The safety engineering has been present for a long time in
automotive systems. However, development security engineering has been posing interesting
query how they have been affecting others. Further, it has always been easy to imagine that few
safety mechanisms like redundancy have been able to create vulnerabilities in security that can
be easily exploited [13]. Besides, security mechanisms like authentications have been leading to
various security issues. For example, every breaking message has failed to authenticate and they
have stopped working completely.
1.6. The aim of the research
The study was aimed at various issues that are researched here. Those goals are listed
below.
ANALYSIS FOR SAFETY AND SECURITY IN AUTOMOTIVE VEHICLE SECURITY
SYSTEM
Secondly, the research is unable to answer the way in which the system architecture of
automotive systems has been affecting discovery and creation of various software vulnerabilities
and influencing the design of different protective mechanisms of security. The automotive
industry has possessed some distinct problems while designing systems [14]. Here, the outcomes
denote highly customized systems that are required to assess from security perspectives.
Moreover, here the research is unable to answer how the systematic vulnerabilities could be
exploited [23]. Further, how particular architectures have been influencing the designing of
protection mechanisms are still to be identified. The possibility to utilize security mechanisms
known from servers and desktops are needed to be determined along with how they can be used
such that they can be adapted or re-used.
Lastly, this research has overlooked the security mechanisms has been impacting
automotive systems and vice versa. The safety engineering has been present for a long time in
automotive systems. However, development security engineering has been posing interesting
query how they have been affecting others. Further, it has always been easy to imagine that few
safety mechanisms like redundancy have been able to create vulnerabilities in security that can
be easily exploited [13]. Besides, security mechanisms like authentications have been leading to
various security issues. For example, every breaking message has failed to authenticate and they
have stopped working completely.
1.6. The aim of the research
The study was aimed at various issues that are researched here. Those goals are listed
below.

8
ANALYSIS FOR SAFETY AND SECURITY IN AUTOMOTIVE VEHICLE SECURITY
SYSTEM
Addressing cyber-security and system safety in automotive vehicles combined
and raising awareness of their mutual effects.
Examining proper threat modeling and analysis of hazards tools to quantify
security effects on dependable safety-related system development at system
levels.
Investigating systematic approaches for supporting the identification of different
trust boundaries and attacks vectors are per safety and cyber-security aspects of
automotive systems are concerned.
Analyzing how to what extent various well-known mechanisms and processes
from IT security plans ate adapted to automotive domains.
2. Materials and methods
Selection of the proper research methods are facilitating the process to collect in-depth
information regarded to the artificial domain. The selected research topic is based on artificial
intelligence. The study is focused on design of the intelligent agents. The selected topic makes
the evaluation harder since theories have some evaluation criteria. The intelligent agent is both
proactive as well as reactive, which is achieved of goals, implicit and explicit. The behavior is
planned and future oriented [1]. The agent is received and reacted of environmental changes. The
behavior is casual as well as past determined.
A. Data Collection
The events of safety and security in automotive vehicle security system are collected
using secondary data collection method. There is collection of the information from relevant
ANALYSIS FOR SAFETY AND SECURITY IN AUTOMOTIVE VEHICLE SECURITY
SYSTEM
Addressing cyber-security and system safety in automotive vehicles combined
and raising awareness of their mutual effects.
Examining proper threat modeling and analysis of hazards tools to quantify
security effects on dependable safety-related system development at system
levels.
Investigating systematic approaches for supporting the identification of different
trust boundaries and attacks vectors are per safety and cyber-security aspects of
automotive systems are concerned.
Analyzing how to what extent various well-known mechanisms and processes
from IT security plans ate adapted to automotive domains.
2. Materials and methods
Selection of the proper research methods are facilitating the process to collect in-depth
information regarded to the artificial domain. The selected research topic is based on artificial
intelligence. The study is focused on design of the intelligent agents. The selected topic makes
the evaluation harder since theories have some evaluation criteria. The intelligent agent is both
proactive as well as reactive, which is achieved of goals, implicit and explicit. The behavior is
planned and future oriented [1]. The agent is received and reacted of environmental changes. The
behavior is casual as well as past determined.
A. Data Collection
The events of safety and security in automotive vehicle security system are collected
using secondary data collection method. There is collection of the information from relevant
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

9
ANALYSIS FOR SAFETY AND SECURITY IN AUTOMOTIVE VEHICLE SECURITY
SYSTEM
sources for finding of answers to the research problems as well as evaluating the research
outcomes [4]. The secondary data are those which are collected by someone and it is passed
throughout the statistical process. It is both published as well as unpublished data as the available
data are unsuitable. The data are set to collect from existing research articles as well as literature
that are considered to be secondary data sources [6]. The secondary data helps to understand the
different existing theories as well as concepts regards to the domain. It helps to conduct of
research in proper manner. The research work is conducted based on availability of data from the
journal articles. The records are contained of information regards to the safety and security of
automotive vehicle security system which consists of details on severity of the incidents, loss of
property and life that are involved. The entire research work is based on collected data from the
secondary sources. Mainly, the data are collected from newspaper articles, publication papers
and journal articles [9]. The secondary sources are being found from library research like the
journal articles furthermore also magazines.
The researcher is required to be careful with use of the secondary data. There are
minute’s scrutiny which are possible that the secondary data are unsuitable as well as inadequate
into the problem context where the researcher is required to study [18]. There are various
problems which are raised as well as referred to the data that are collected and analyzed by
others; therefore the arguments of other’s authors are used to analyze the security and safety of
the automotive vehicle system. The researcher is utilized of secondary data, and then there are
looked for various sources from where the researcher has to gather the secondary sources. There
is collection of original as well as realistic data [12].
ANALYSIS FOR SAFETY AND SECURITY IN AUTOMOTIVE VEHICLE SECURITY
SYSTEM
sources for finding of answers to the research problems as well as evaluating the research
outcomes [4]. The secondary data are those which are collected by someone and it is passed
throughout the statistical process. It is both published as well as unpublished data as the available
data are unsuitable. The data are set to collect from existing research articles as well as literature
that are considered to be secondary data sources [6]. The secondary data helps to understand the
different existing theories as well as concepts regards to the domain. It helps to conduct of
research in proper manner. The research work is conducted based on availability of data from the
journal articles. The records are contained of information regards to the safety and security of
automotive vehicle security system which consists of details on severity of the incidents, loss of
property and life that are involved. The entire research work is based on collected data from the
secondary sources. Mainly, the data are collected from newspaper articles, publication papers
and journal articles [9]. The secondary sources are being found from library research like the
journal articles furthermore also magazines.
The researcher is required to be careful with use of the secondary data. There are
minute’s scrutiny which are possible that the secondary data are unsuitable as well as inadequate
into the problem context where the researcher is required to study [18]. There are various
problems which are raised as well as referred to the data that are collected and analyzed by
others; therefore the arguments of other’s authors are used to analyze the security and safety of
the automotive vehicle system. The researcher is utilized of secondary data, and then there are
looked for various sources from where the researcher has to gather the secondary sources. There
is collection of original as well as realistic data [12].
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

10
ANALYSIS FOR SAFETY AND SECURITY IN AUTOMOTIVE VEHICLE SECURITY
SYSTEM
Search for the secondary data
Identification of information required on basis of research
Identification of data sources
Evaluation of data
Identification of problems and research gaps
Figure 1: Step-by-step research methodology
(Source: [5], pp-191)
The steps which are performed to do the research methodology are as follows:
Search for the secondary data: The data are collected by someone other than users. The
sources of the secondary data are the information those are collected by the organizational
records, data those are collected by the research purposes [3].
Identification of information required on basis of research: The research is composed
of gathering of information based on selected research topic. The research paper is based on
“Analysis for Safety and Security in Automotive Vehicle Security System”. Therefore, mostly
the journal articles are selected related to the topic [10].
ANALYSIS FOR SAFETY AND SECURITY IN AUTOMOTIVE VEHICLE SECURITY
SYSTEM
Search for the secondary data
Identification of information required on basis of research
Identification of data sources
Evaluation of data
Identification of problems and research gaps
Figure 1: Step-by-step research methodology
(Source: [5], pp-191)
The steps which are performed to do the research methodology are as follows:
Search for the secondary data: The data are collected by someone other than users. The
sources of the secondary data are the information those are collected by the organizational
records, data those are collected by the research purposes [3].
Identification of information required on basis of research: The research is composed
of gathering of information based on selected research topic. The research paper is based on
“Analysis for Safety and Security in Automotive Vehicle Security System”. Therefore, mostly
the journal articles are selected related to the topic [10].

11
ANALYSIS FOR SAFETY AND SECURITY IN AUTOMOTIVE VEHICLE SECURITY
SYSTEM
Identification of data sources: Identification of the data sources are used to populate the
security and safety into the proposed system. The data are stored into different formats as well as
sources. There are various data types such as data at rest, data in motion and data from the data
warehouse [24]. The data from the data warehouse are structured format.
B. Data Inclusion Criteria
Certain attributes such as reliability, availability, safety and security are required to
analyze the secondary data based on selected research topic.
Table 1: Selected Attribute Description
Attribute
Name
Data Type Description
Reliability Secondary The study is used of qualitative methods to analyse seeks to
understand the experience of the users those are used of automotive
security system. It describes the safety and security events
experienced by the system users [9]. It includes of reliable
qualitative studies that are involved of secondary qualitative
analysis of qualitative data.
Availability Secondary Secondary market research is done so that the information is
gathered easily as well as accessible. There are various data sources
where the data are to be taken and it is easier to gather of relevant
information [16]. This method is used of huge amount of
information into less time.
ANALYSIS FOR SAFETY AND SECURITY IN AUTOMOTIVE VEHICLE SECURITY
SYSTEM
Identification of data sources: Identification of the data sources are used to populate the
security and safety into the proposed system. The data are stored into different formats as well as
sources. There are various data types such as data at rest, data in motion and data from the data
warehouse [24]. The data from the data warehouse are structured format.
B. Data Inclusion Criteria
Certain attributes such as reliability, availability, safety and security are required to
analyze the secondary data based on selected research topic.
Table 1: Selected Attribute Description
Attribute
Name
Data Type Description
Reliability Secondary The study is used of qualitative methods to analyse seeks to
understand the experience of the users those are used of automotive
security system. It describes the safety and security events
experienced by the system users [9]. It includes of reliable
qualitative studies that are involved of secondary qualitative
analysis of qualitative data.
Availability Secondary Secondary market research is done so that the information is
gathered easily as well as accessible. There are various data sources
where the data are to be taken and it is easier to gather of relevant
information [16]. This method is used of huge amount of
information into less time.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 25

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.