A Policy-based Communications Architecture for Vehicles

Vassilis Prevelakis, Mohammad Hamad

2015

Abstract

Despite the fact that numerous studies have indicated that vehicular networks are vulnerable to external and internal attacks, very little effort has been expended in safeguarding communications both between elements within the vehicle and between the vehicle and the outside world. In this paper we present a mechanism that allows communications policy (essentially who can talk with whom and the security parameters of the channel) to be defined during the design of the software component and then adapted as the component undergoes integration first within subsystems and so on all the way to the final integration in the operational vehicle. We provide a mechanism that can maintain the integrity of the policy throughout the development effort and, finally, enforce the policy during the operation of the component in the production vehicle.

References

  1. Sprenger, H., 2010. “Maximising the efficiency of an organisation's fleets and assets,” Vodafone NZ, Jan. 2010. http://www.nsa.gov/research/_fi les/publications/selinux_configuring _policy.pdf.
  2. Checkoway S., et al 2011. “Comprehensive Experimental Analyses of Automotive Attack Surfaces,” USENIX Security, August 10-12.
  3. Sharafkandi S., et al 2012. “Using EDCA to improve Vehicle Safety Messaging,” IEEE Vehicular Networking Conference (VNC), pp. 70-77.
  4. Rouf I., et al 2010. “Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study,” USENIX Security Conf. Washington DC, August 2010.
  5. Laarouchi Y., et al, 2009. “Ensuring Safety and Security for Avionics,” Proc. 'DASIA 2009 Conference, Data Systems in Aerospace', Istanbul, Turkey, 26-29 May 2009.
  6. Federal Register, 2008. “Docket No. NM364 Special Conditions No. 25-356-SC,” Federal Register: January 2, 2008 (Volume 73, Number 1), pages 27-29.
  7. Keromytis, A. et al, 2007. “Designing Firewalls: A Survey,” In Network Security: Current Status and Future Directions, Christos Douligeris and Dimitrios N. Serpanos (editors), pp. 33 - 49. Wiley - IEEE Press, April 2007.
  8. Muter M., 2009. “Risks of the Networked Car - Intrusion Detection for Improved Automotive Security,” The Fully Networked Car Workshop, PALEXPO, Geneva, 4-5 March 2009.
  9. Eckert C., et al, 2013. “Security Issues of Multi Core Architectures, The Automotive Case,” Information Technology, Jan. 2013, pp 5-9.
  10. Laarouchi Y., et al 2008. “Safety and Security Architectures for Avionics,” Doctoral Consortium (DCSOFT 2008) of the 3rd International Conference on Software and Data Technologies (ICSOFT 2008), 5-8 July 2008, Portugal.
  11. Mahmoud B., et al, 2010. “An adaptive security architecture for future aircraft communications,” 29th Digital Avionics Systems Conference (DASC), 2010 IEEE/AIAA, 3-7 Oct. 2010
  12. Olive, M., 2001. “Efficient datalink security in a bandwidth-limited mobile environment - an overview of the Aeronautical Telecommunications Network (ATN) security concept,” Proc. 20th Digital Avionics Systems Conference, Vol. 2, October 2001, pp. 9E2/1- 10.
  13. Ioannidis, S. et al, 2000. “Implementing a Distributed Firewall,” Proceedings of Computer and Communications Security (CCS), pp. 190-199, November 2000, Athens, Greece.
  14. Blaze M. et al, 2001. “Trust Management for IPsec.” In Proceedings of the Internet Society Symposium on Network and Distributed Systems Security (SNDSS) 2001, pp. 139 - 151. February 2001, San Diego, CA.
  15. Prevelakis V., et al, 2003. “Drop-in Security for Distributed and Portable Computing Elements,” Journal of Internet Research, Volume 13 Issue 2, MCB Press, 2003.
  16. Miltchev S. et al, 2008. “Decentralized Access Control in Networked File Systems,” ACM Computing Surveys, 40(3), pp. 10:1 - 10:30, August 2008.
Download


Paper Citation


in Harvard Style

Prevelakis V. and Hamad M. (2015). A Policy-based Communications Architecture for Vehicles . In Proceedings of the 1st International Conference on Information Systems Security and Privacy - Volume 1: ICISSP, ISBN 978-989-758-081-9, pages 155-162. DOI: 10.5220/0005325001550162


in Bibtex Style

@conference{icissp15,
author={Vassilis Prevelakis and Mohammad Hamad},
title={A Policy-based Communications Architecture for Vehicles},
booktitle={Proceedings of the 1st International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,},
year={2015},
pages={155-162},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005325001550162},
isbn={978-989-758-081-9},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 1st International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,
TI - A Policy-based Communications Architecture for Vehicles
SN - 978-989-758-081-9
AU - Prevelakis V.
AU - Hamad M.
PY - 2015
SP - 155
EP - 162
DO - 10.5220/0005325001550162