Standardizing Security Evaluation Criteria for Connected Vehicles: A Modular Protection Profile

K. Maliatsos, Christos Lyvas, P. Pantazopoulos, C. Lambrinoudakis, A. Kanatas, Matthieu Gay, A. Amditis
{"title":"Standardizing Security Evaluation Criteria for Connected Vehicles: A Modular Protection Profile","authors":"K. Maliatsos, Christos Lyvas, P. Pantazopoulos, C. Lambrinoudakis, A. Kanatas, Matthieu Gay, A. Amditis","doi":"10.1109/CSCN.2019.8931344","DOIUrl":null,"url":null,"abstract":"The so-far most credible approach to Security Evaluation, the Common Criteria standard, relies on a thorough methodology to provide confidence that the security requirements of an IT system are satisfied. Towards that end, a Protection Profile (PP) document gathers carefully all required data and identifies in an implementation-independent way the security requirements of the studied system, referred to as Target of Evaluation (ToE). When the connected vehicles paradigm that integrates a mosaic of third-party modules and interfaces constitutes the ToE, the PP development calls for agile solutions.In this work, we introduce a modular approach to the design of a PP for connected vehicles, as developed in the SAFERtec project. Our starting point is a generic architecture of the Vehicle (V-ITS-S) that helps us identify all involved assets and accordingly introduce a flexible discrimination of the base and associated PP modules as well as their interplay. We discuss the way our modular PP can cope with various V-ITS-S implementation approaches and provide insights on its applicability on a real-world V-ITS-S bench we have developed. The proposed solution can pave the way for devising standardized security assurance arguments towards safer connected driving.","PeriodicalId":102095,"journal":{"name":"2019 IEEE Conference on Standards for Communications and Networking (CSCN)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE Conference on Standards for Communications and Networking (CSCN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSCN.2019.8931344","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

The so-far most credible approach to Security Evaluation, the Common Criteria standard, relies on a thorough methodology to provide confidence that the security requirements of an IT system are satisfied. Towards that end, a Protection Profile (PP) document gathers carefully all required data and identifies in an implementation-independent way the security requirements of the studied system, referred to as Target of Evaluation (ToE). When the connected vehicles paradigm that integrates a mosaic of third-party modules and interfaces constitutes the ToE, the PP development calls for agile solutions.In this work, we introduce a modular approach to the design of a PP for connected vehicles, as developed in the SAFERtec project. Our starting point is a generic architecture of the Vehicle (V-ITS-S) that helps us identify all involved assets and accordingly introduce a flexible discrimination of the base and associated PP modules as well as their interplay. We discuss the way our modular PP can cope with various V-ITS-S implementation approaches and provide insights on its applicability on a real-world V-ITS-S bench we have developed. The proposed solution can pave the way for devising standardized security assurance arguments towards safer connected driving.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
网联汽车安全评估标准标准化:模块化保护配置文件
到目前为止,最可靠的安全评估方法是通用准则标准,它依赖于一种彻底的方法来提供对IT系统的安全需求得到满足的信心。为此,保护概要文件(PP)仔细收集所有必需的数据,并以独立于实现的方式确定所研究系统的安全需求,称为评估目标(ToE)。当集成了一系列第三方模块和接口的互联汽车范式构成ToE时,PP开发需要敏捷的解决方案。在这项工作中,我们引入了一种模块化方法来设计联网车辆的PP,正如SAFERtec项目所开发的那样。我们的出发点是车辆的通用架构(V-ITS-S),它帮助我们识别所有涉及的资产,并相应地引入基础和相关PP模块及其相互作用的灵活区分。我们讨论了模块化PP处理各种V-ITS-S实现方法的方式,并就其在我们开发的实际V-ITS-S平台上的适用性提供了见解。拟议的解决方案可以为设计标准化的安全保障论据铺平道路,以实现更安全的联网驾驶。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Kalman-Filter-Based Tracking of Millimeter-Wave Channel Parameters for V2X Applications Testbed Federation for 5G Experimentation: Review and Guidelines Trustworthiness in IoT – A Standards Gap Analysis on Security, Data Protection and Privacy A Software Defined Radio Platform for Decode and Forward Relay Nodes Implementation Docker Enabled Virtualized Nanoservices for Local IoT Edge Networks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1