Skip to main content

2020 | OriginalPaper | Buchkapitel

Collecting and Classifying Security and Privacy Design Patterns for Connected Vehicles: SECREDAS Approach

verfasst von : Nadja Marko, Alexandr Vasenev, Christoph Striecks

Erschienen in: Computer Safety, Reliability, and Security. SAFECOMP 2020 Workshops

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In the past several years, autonomous driving turned out to be a target for many technical players. Automated driving requires new and advanced mechanisms to provide safe functionality and the increased communication makes automated vehicles more vulnerable to attacks. Security is already well-established in some domains, such as the IT sector, and now spills over to Automotive. In order to not reinvent the wheel, existing security methods and tools can be evaluated and adapted to be applicable in other domains, such as Automotive. In the European H2020 ECSEL project SECREDAS, this approach is followed and existing methods, tools, protocols, best practices etc. are analyzed, combined and improved to be applicable in the field of connected vehicles. To provide modular and reusable designs, solutions are collected in form of design patterns. The SECREDAS design patterns describe solution templates to solve security, safety and privacy issues related to automated systems. The grouping and classification of design patterns is important to facilitate the selection process which is a challenging task and weak classification schemes can be a reason for a sparse application of security patterns, which represent a subgroup of design patterns. This work aims to assist automotive software and systems engineers in adopting and using technologies available on the market. The SECREDAS security patterns are based on existing technologies, so-called Common Technology Elements, and describe how and where to apply them in context of connected vehicles by making a reference to a generic architecture. This allows developers to easily find solutions to common problems and reduces the development effort by providing concrete, trustworthy solutions. The whole approach and classification scheme is illustrated based on one example security pattern.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Bécsi, T., Aradi, S., Gáspár, P.: Security issues and vulnerabilities in connected car systems. In: 2015 International Conference on Models and Technologies for Intelligent Transportation Systems (MT-ITS), pp. 477–482 (2015) Bécsi, T., Aradi, S., Gáspár, P.: Security issues and vulnerabilities in connected car systems. In: 2015 International Conference on Models and Technologies for Intelligent Transportation Systems (MT-ITS), pp. 477–482 (2015)
2.
Zurück zum Zitat Caiza, J.C., Martín, Y.S., Del Alamo, J.M., Guamán, D.S.: Organizing design patterns for privacy: a taxonomy of types of relationships. In: Proceedings of the 22nd European Conference on Pattern Languages of Programs, pp. 1–11 (2017) Caiza, J.C., Martín, Y.S., Del Alamo, J.M., Guamán, D.S.: Organizing design patterns for privacy: a taxonomy of types of relationships. In: Proceedings of the 22nd European Conference on Pattern Languages of Programs, pp. 1–11 (2017)
3.
Zurück zum Zitat Cheng, B.H., Doherty, B., Polanco, N., Pasco, M.: Security patterns for automotive systems. In: 2019 ACM/IEEE 22nd International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C), pp. 54–63 (2019) Cheng, B.H., Doherty, B., Polanco, N., Pasco, M.: Security patterns for automotive systems. In: 2019 ACM/IEEE 22nd International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C), pp. 54–63 (2019)
5.
Zurück zum Zitat van Den Berghe, A., Yskout, K., Joosen, W.: Security patterns 2.0: toward security patterns based on security building blocks. In: 2018 IEEE/ACM 1st International Workshop on Security Awareness from Design to Deployment (SEAD), pp. 45–48 (2018) van Den Berghe, A., Yskout, K., Joosen, W.: Security patterns 2.0: toward security patterns based on security building blocks. In: 2018 IEEE/ACM 1st International Workshop on Security Awareness from Design to Deployment (SEAD), pp. 45–48 (2018)
6.
Zurück zum Zitat ENISA: ENISA good practices for security of smart cars. Report, European Union Agency for Cybersecurity (2019) ENISA: ENISA good practices for security of smart cars. Report, European Union Agency for Cybersecurity (2019)
7.
Zurück zum Zitat Hafiz, M.: A collection of privacy design patterns. In: Proceedings of the 2006 Conference on Pattern Languages of Programs, PLoP 2006, pp. 1–13. Association for Computing Machinery, New York (2006) Hafiz, M.: A collection of privacy design patterns. In: Proceedings of the 2006 Conference on Pattern Languages of Programs, PLoP 2006, pp. 1–13. Association for Computing Machinery, New York (2006)
10.
Zurück zum Zitat Hudaib, A., Edinat, A.: A survey on security patterns and their classification schemes. Int. J. Sci. Eng. Res. 6, 79–90 (2019)CrossRef Hudaib, A., Edinat, A.: A survey on security patterns and their classification schemes. Int. J. Sci. Eng. Res. 6, 79–90 (2019)CrossRef
11.
Zurück zum Zitat Kienzle, D.M., Elder, M.C., Tyree, D., Edwards-Hewitt, J.: Security patterns repository version 1.0. DARPA, Washington DC (2002) Kienzle, D.M., Elder, M.C., Tyree, D., Edwards-Hewitt, J.: Security patterns repository version 1.0. DARPA, Washington DC (2002)
12.
Zurück zum Zitat Laverdiere, M., Mourad, A., Hanna, A., Debbabi, M.: Security design patterns: survey and evaluation. In: 2006 Canadian Conference on Electrical and Computer Engineering, pp. 1605–1608 (2006) Laverdiere, M., Mourad, A., Hanna, A., Debbabi, M.: Security design patterns: survey and evaluation. In: 2006 Canadian Conference on Electrical and Computer Engineering, pp. 1605–1608 (2006)
14.
Zurück zum Zitat Munawar, H.S.: A pattern language for developing privacy enhancing technologies. Softw.: Pract. Exp. 43(7), 769–787 (2013) Munawar, H.S.: A pattern language for developing privacy enhancing technologies. Softw.: Pract. Exp. 43(7), 769–787 (2013)
15.
Zurück zum Zitat NHTSA: Cybersecurity Best Practices for Modern Vehicles. Report DOT HS 812 333, National Highway Traffic Safety Administration (2016) NHTSA: Cybersecurity Best Practices for Modern Vehicles. Report DOT HS 812 333, National Highway Traffic Safety Administration (2016)
16.
Zurück zum Zitat van der Sanden, B., Vasenev, A.: Architectural guidance in automotive for privacy and security: survey and classification. In: Annual IEEE International Systems Conference (SysCon) (IEEE SysCon 2020) (2020, accepted) van der Sanden, B., Vasenev, A.: Architectural guidance in automotive for privacy and security: survey and classification. In: Annual IEEE International Systems Conference (SysCon) (IEEE SysCon 2020) (2020, accepted)
17.
Zurück zum Zitat Schumacher, M., Fernandez, E., Hybertson, D., Buschmann, F., Sommerlad, P.: Security Patterns: Integrating Security and Systems Engineering. Wiley, Hoboken (2006) Schumacher, M., Fernandez, E., Hybertson, D., Buschmann, F., Sommerlad, P.: Security Patterns: Integrating Security and Systems Engineering. Wiley, Hoboken (2006)
18.
Zurück zum Zitat Siljee, J.: Privacy transparency patterns. In: Proceedings of the 20th European Conference on Pattern Languages of Programs, pp. 1–11 (2015) Siljee, J.: Privacy transparency patterns. In: Proceedings of the 20th European Conference on Pattern Languages of Programs, pp. 1–11 (2015)
19.
Zurück zum Zitat Vasenev, A., et al.: Practical security and privacy threat analysis in the automotive domain: long term support scenario for over-the-air updates. In: Proceedings of the 5th International Conference on Vehicle Technology and Intelligent Transport Systems (VEHITS 2019), pp. 550–555 (2019) Vasenev, A., et al.: Practical security and privacy threat analysis in the automotive domain: long term support scenario for over-the-air updates. In: Proceedings of the 5th International Conference on Vehicle Technology and Intelligent Transport Systems (VEHITS 2019), pp. 550–555 (2019)
20.
Zurück zum Zitat Weiss, M., Mouratidis, H.: Selecting security patterns that fulfill security requirements. In: 2008 16th IEEE International Requirements Engineering Conference, pp. 169–172 (2008) Weiss, M., Mouratidis, H.: Selecting security patterns that fulfill security requirements. In: 2008 16th IEEE International Requirements Engineering Conference, pp. 169–172 (2008)
21.
Zurück zum Zitat Yoshioka, N., Washizaki, H., Maruyama, K.: A survey on security patterns. Prog. Inform. 5(5), 35–47 (2008)CrossRef Yoshioka, N., Washizaki, H., Maruyama, K.: A survey on security patterns. Prog. Inform. 5(5), 35–47 (2008)CrossRef
Metadaten
Titel
Collecting and Classifying Security and Privacy Design Patterns for Connected Vehicles: SECREDAS Approach
verfasst von
Nadja Marko
Alexandr Vasenev
Christoph Striecks
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-55583-2_3