Skip to main content
Top

2020 | OriginalPaper | Chapter

Towards an Extensible Security Monitoring Architecture for Vehicular Networks

Authors : Amir Teshome Wonjiga, Marc Lacoste

Published in: Communication Technologies for Vehicles

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Extensibility for security monitoring in 5G vehicular networks remains largely unexplored despite strong requirements for interoperability, to support multiple properties (e.g., security, privacy, trust, sustainability) and to reach trade-offs. We discuss ITS security monitoring challenges and propose an extensible monitoring architecture to meet them. We design and implement a sample security monitoring probe for CAM and DENM and demonstrate on simulations the probe capabilities on a cooperative collision detection use case.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference ETSI EN 102 637–2: ITS; Vehicular Communications; Basic Set of Applications; Part 2: Specification of Cooperative Awareness Basic Service ETSI EN 102 637–2: ITS; Vehicular Communications; Basic Set of Applications; Part 2: Specification of Cooperative Awareness Basic Service
3.
go back to reference ETSI EN 102 637–3: ITS; Vehicular Communications; Basic Set of Applications; Part 3: Specifications of Decentralized Environmental Notification Basic Service ETSI EN 102 637–3: ITS; Vehicular Communications; Basic Set of Applications; Part 3: Specifications of Decentralized Environmental Notification Basic Service
4.
go back to reference ETSI GS ZSM 002: Zero-touch network and Service Management (ZSM); Reference Architecture. V1.1.1 (2019) ETSI GS ZSM 002: Zero-touch network and Service Management (ZSM); Reference Architecture. V1.1.1 (2019)
5.
go back to reference INSPIRE-5GPlus: 5G Security: Current Status and Future Trends. D2.1 (2019) INSPIRE-5GPlus: 5G Security: Current Status and Future Trends. D2.1 (2019)
6.
go back to reference Arfaoui, G., et al.: Security and resilience in 5G: current challenges and future directions. In: IEEE Trustcom/BigDataSE/ICESS, pp. 1010–1015 (2017) Arfaoui, G., et al.: Security and resilience in 5G: current challenges and future directions. In: IEEE Trustcom/BigDataSE/ICESS, pp. 1010–1015 (2017)
7.
go back to reference Blanc, G., et al.: Towards a 5G security architecture: articulating software-defined security and security as a service. In: ARES, pp. 1–8 (2018) Blanc, G., et al.: Towards a 5G security architecture: articulating software-defined security and security as a service. In: ARES, pp. 1–8 (2018)
8.
9.
go back to reference Jaballah, W.B., Conti, M., Lal, C.: Security and design requirements for software-defined VANETs. Comput. Netw. 169, 107099 (2020)CrossRef Jaballah, W.B., Conti, M., Lal, C.: Security and design requirements for software-defined VANETs. Comput. Netw. 169, 107099 (2020)CrossRef
10.
go back to reference Kang, J., et al.: Blockchain for secure and efficient data sharing in vehicular edge computing and networks. IEEE Internet Things J. 6(3), 4460–4670 (2018) Kang, J., et al.: Blockchain for secure and efficient data sharing in vehicular edge computing and networks. IEEE Internet Things J. 6(3), 4460–4670 (2018)
11.
go back to reference Khan, R., et al.: A survey on security and privacy of 5G technologies: potential solutions, recent advancements, and future directions. IEEE Commun. Surv. Tutorials 22(1), 196–248 (2019)CrossRef Khan, R., et al.: A survey on security and privacy of 5G technologies: potential solutions, recent advancements, and future directions. IEEE Commun. Surv. Tutorials 22(1), 196–248 (2019)CrossRef
12.
go back to reference Le Lann, G.: Cyberphysical Constructs and Concepts for Fully Automated Networked Vehicles. Research Report RR-9297, INRIA Paris-Rocquencourt (2019) Le Lann, G.: Cyberphysical Constructs and Concepts for Fully Automated Networked Vehicles. Research Report RR-9297, INRIA Paris-Rocquencourt (2019)
13.
go back to reference Liyanage, M., et al.: Software defined monitoring (SDM) for 5G mobile backhaul networks. In: IEEE LANMAN, pp. 1–6 (2017) Liyanage, M., et al.: Software defined monitoring (SDM) for 5G mobile backhaul networks. In: IEEE LANMAN, pp. 1–6 (2017)
14.
go back to reference García Olmos, A., Vázquez-Gallego, F., Sedar, R., Samoladas, V., Mira, F., Alonso-Zarate, J.: An automotive cooperative collision avoidance service based on mobile edge computing. In: Palattella, M.R., Scanzio, S., Coleri Ergen, S. (eds.) ADHOC-NOW 2019. LNCS, vol. 11803, pp. 601–607. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-31831-4_43CrossRef García Olmos, A., Vázquez-Gallego, F., Sedar, R., Samoladas, V., Mira, F., Alonso-Zarate, J.: An automotive cooperative collision avoidance service based on mobile edge computing. In: Palattella, M.R., Scanzio, S., Coleri Ergen, S. (eds.) ADHOC-NOW 2019. LNCS, vol. 11803, pp. 601–607. Springer, Cham (2019). https://​doi.​org/​10.​1007/​978-3-030-31831-4_​43CrossRef
15.
go back to reference Ortega, V., et al.: Trusted 5G vehicular networks: blockchains and content-centric networking. IEEE Veh. Technol. Mag. 13(2), 121–127 (2018)CrossRef Ortega, V., et al.: Trusted 5G vehicular networks: blockchains and content-centric networking. IEEE Veh. Technol. Mag. 13(2), 121–127 (2018)CrossRef
16.
go back to reference Ray, S., et al.: Extensibility in automotive security: current practice and challenges. In: 54th ACM/EDAC/IEEE DAC, pp. 1–6 (2017) Ray, S., et al.: Extensibility in automotive security: current practice and challenges. In: 54th ACM/EDAC/IEEE DAC, pp. 1–6 (2017)
18.
go back to reference Sairam, A.S., Garg, A.: Detecting semantic attacks in intelligent transport system. In: 4th IEEE ICITE, pp. 185–189 (2019) Sairam, A.S., Garg, A.: Detecting semantic attacks in intelligent transport system. In: 4th IEEE ICITE, pp. 185–189 (2019)
19.
go back to reference Shi, W., et al.: Drone assisted vehicular networks: architecture, challenges and opportunities. IEEE Netw. 32(3), 130–137 (2018)CrossRef Shi, W., et al.: Drone assisted vehicular networks: architecture, challenges and opportunities. IEEE Netw. 32(3), 130–137 (2018)CrossRef
20.
go back to reference Wasicek, A., et al.: Context-aware intrusion detection in automotive control systems. In: Proceedings 5th ESCAR USA Conference, pp. 21–22 (2017) Wasicek, A., et al.: Context-aware intrusion detection in automotive control systems. In: Proceedings 5th ESCAR USA Conference, pp. 21–22 (2017)
21.
go back to reference Wonjiga, A.T., Peisert, S., Rilling, L., Morin, C.: Blockchain as a trusted component in cloud SLA verification. In: 12th IEEE/ACM UCC, pp. 93–100 (2019) Wonjiga, A.T., Peisert, S., Rilling, L., Morin, C.: Blockchain as a trusted component in cloud SLA verification. In: 12th IEEE/ACM UCC, pp. 93–100 (2019)
22.
go back to reference Yang, Z., et al.: Blockchain-based decentralized trust management in vehicular networks. IEEE Internet Things J. 6(2), 1495–1505 (2019)CrossRef Yang, Z., et al.: Blockchain-based decentralized trust management in vehicular networks. IEEE Internet Things J. 6(2), 1495–1505 (2019)CrossRef
23.
24.
go back to reference Zeadally, S., et al.: Vehicular communications for ITS: standardization and challenges. IEEE Commun. Stan. Mag. 4(1), 11–17 (2020)CrossRef Zeadally, S., et al.: Vehicular communications for ITS: standardization and challenges. IEEE Commun. Stan. Mag. 4(1), 11–17 (2020)CrossRef
25.
go back to reference Zhang, M., et al.: SafeDrive: online driving anomaly detection from large-scale vehicle data. IEEE Trans. Ind. Inform. 13(4), 2087–2096 (2017)CrossRef Zhang, M., et al.: SafeDrive: online driving anomaly detection from large-scale vehicle data. IEEE Trans. Ind. Inform. 13(4), 2087–2096 (2017)CrossRef
Metadata
Title
Towards an Extensible Security Monitoring Architecture for Vehicular Networks
Authors
Amir Teshome Wonjiga
Marc Lacoste
Copyright Year
2020
DOI
https://doi.org/10.1007/978-3-030-66030-7_2

Premium Partner