2015 7th International Conference on New Technologies, Mobility and Security (NTMS) 2015
DOI: 10.1109/ntms.2015.7266516
|View full text |Cite
|
Sign up to set email alerts
|

RACE: Risk analysis for cooperative engines

Abstract: Nowadays, Cooperative Intelligent Transport Systems (C-ITS) are not fiction anymore. Prototypes of self-driving vehicles are flourishing everywhere, e.g. Google driverless car. These new generation vehicles are not only intelligent as they do not need human intervention during cruise, but they also communicate together creating a cooperative network. However, C-ITS are becoming the prey of hackers and the target of cyberattacks. Consequently, a reliable risk analysis method needs to be defined to prevent C-ITS… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 19 publications
(6 citation statements)
references
References 2 publications
0
5
0
Order By: Relevance
“…However, EVITA mainly focuses on security risk assessment and does not use a systematic approach for the identification of threat scenarios, so it may be more exhausting when identifying threat scenarios for ICVs. The risk analysis method for cooperative engines (RACE) [ 41 ] is an improved approach for EVITA. RACE defines the severity value as the highest of the four values of the severity vector.…”
Section: Related Workmentioning
confidence: 99%
“…However, EVITA mainly focuses on security risk assessment and does not use a systematic approach for the identification of threat scenarios, so it may be more exhausting when identifying threat scenarios for ICVs. The risk analysis method for cooperative engines (RACE) [ 41 ] is an improved approach for EVITA. RACE defines the severity value as the highest of the four values of the severity vector.…”
Section: Related Workmentioning
confidence: 99%
“…It indicates that Dominic et al [10], and Parkinson et al [22] cover the security risk estimation and management in AVs; however, they provide little details on AV system assessment's impact. Other related studies [6][7][8][9]15,18] address security risk management, some [4,7] focus on safety and security engineering in AVs. But these studies do not discuss estimations needed for AV stakeholder security investment decisions.…”
Section: Related Workmentioning
confidence: 99%
“…But these studies do not discuss estimations needed for AV stakeholder security investment decisions. In [4], Boudguiga et al TVRA and EVITA methods are combined, but they did not include the cost of countermeasures to assess the severity of the security risks in supporting business decisions. Our study provides a securityfocused risk estimation and management analysis on the AV information system, covering the security assets, threats, resulting risks, proposed countermeasures and risk impact estimations based on the mentioned security metrics.…”
Section: Related Workmentioning
confidence: 99%
“…One effective method to describe attack surfaces are attack trees, which were first introduced in Reference [15] to manage the large number of threats derived from comprehensive threat modelling in general security. Attack tress have since been employed in automotive security in a number of scenarios [70][71][72]. To create attack trees potential threat agents and their goals in compromising the system first need to be identified.…”
Section: Synthesis Of Attack Surfacementioning
confidence: 99%
“…Risk analysis has been becoming compulsory to understand and control the potential system breaches and vulnerabilities [71]. Moreover, this analysis can also be used to rank the threats to help defenders deploy security resource most effectively for a mitigation plan.…”
Section: Understanding Dynamic Riskmentioning
confidence: 99%