Graphical security modelling for Autonomous Vehicles: A novel approach to threat analysis and defence evaluation

被引:0
|
作者
Nguyen, Nhung H. [1 ]
Ge, Mengmeng [5 ]
Cho, Jin-Hee [2 ]
Moore, Terrence J. [3 ]
Yoon, Seunghyun [4 ]
Lim, Hyuk [4 ]
Nelson, Frederica [3 ]
Bai, Guangdong [1 ]
Kim, Dan Dongseong [1 ]
机构
[1] Univ Queensland, Sch Elect Engn & Comp Sci, Brisbane, Qld 4072, Australia
[2] Virginia Tech, Dept Comp Sci, Falls Church, VA 22043 USA
[3] US DEVCOM Army Res Lab, Network Sci Div, Adelphi, MD 20783 USA
[4] Korea Inst Energy Technol, AI Grad Sch, Naju Si 58217, South Korea
[5] Univ Canterbury, Dept Comp Sci & Software Engn, Christchurch 8041, New Zealand
关键词
Attack graphs; Autonomous Vehicle; Security analysis; Security modelling; Graphical security modelling; Attack countermeasure tree;
D O I
10.1016/j.cose.2024.104229
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Autonomous Vehicles (AVs) integrate numerous control units, network components, and protocols to operate effectively and interact with their surroundings, such as pedestrians and other vehicles. While these technologies enhance vehicle capabilities and enrich the driving experience, they also introduce new attack surfaces, making AVs vulnerable to cyber-attacks. Such cyber-attacks can lead to severe consequences, including traffic disruption and even threats to human life. Security modelling is crucial to safeguarding AVs as it enables the simulation and analysis of an AV's security before any potential attacks. However, the existing research on AV security modelling methods for analysing security risks and evaluating the effectiveness of security measures remains limited. In this work, we introduce a novel graphical security model and metrics to assess the security of AV systems. The proposed model utilizes initial network information to build attack graphs and attack trees at different layers of network depth. From this, various metrics are automatically calculated to analyse the security and safety of the AV network. The proposed model is designed to identify potential attack paths, analyse security and safety with precise metrics, and evaluate various defence strategies. We demonstrate the effectiveness of our framework by applying it to two AV networks and distinct AV attack scenarios, showcasing its capability to enhance the security of AVs.
引用
收藏
页数:19
相关论文
共 50 条
  • [11] Exploring expert perceptions about the cyber security and privacy of Connected and Autonomous Vehicles: A thematic analysis approach
    Liu, Na
    Nikitas, Alexandros
    Parkinson, Simon
    TRANSPORTATION RESEARCH PART F-TRAFFIC PSYCHOLOGY AND BEHAVIOUR, 2020, 75 : 66 - 86
  • [12] BNART: A Novel Centralized Traffic Management Approach for Autonomous Vehicles
    Ebrahimi, Dariush
    Sudarshan, Govind
    Alzhouri, Fadi
    20TH INTERNATIONAL CONFERENCE ON THE DESIGN OF RELIABLE COMMUNICATION NETWORKS, DRCN 2024, 2024,
  • [13] A Threat Analysis Methodology for Security Evaluation and Enhancement Planning
    Stango, Antonietta
    Prasad, Neeli R.
    Kyriazanos, Dimitris M.
    2009 THIRD INTERNATIONAL CONFERENCE ON EMERGING SECURITY INFORMATION, SYSTEMS, AND TECHNOLOGIES, 2009, : 262 - +
  • [14] Identification and Analysis of Threat Vector for Security Evaluation of LAN
    Rehan, Simranjeet Kaur
    Saraswat, Rekha
    PROCEEDINGS OF EMERGING TRENDS AND TECHNOLOGIES ON INTELLIGENT SYSTEMS (ETTIS 2021), 2022, 1371 : 13 - 23
  • [15] Enhancing Security in Connected and Autonomous Vehicles: A Pairing Approach and Machine Learning Integration
    Ahmad, Usman
    Han, Mu
    Mahmood, Shahid
    APPLIED SCIENCES-BASEL, 2024, 14 (13):
  • [16] A Comprehensive Approach to Combat GPS Spoofing and Ensure Security Positioning in Autonomous Vehicles
    Kenioua, Laid
    Lejdel, Brahim
    Nedioui, Mohamed Abdelhamid
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2024, 21 (04) : 627 - 635
  • [17] Enhancing blockchain security: a novel approach to integrated malware defence mechanisms
    Sharma, Aastha
    Upadhyay, Divya
    Sharma, Shanu
    ENGINEERING RESEARCH EXPRESS, 2024, 6 (02):
  • [18] A systematic approach for threat and vulnerability analysis of unmanned aerial vehicles
    Ficco, Massimo
    Granata, Daniele
    Palmieri, Francesco
    Rak, Massimiliano
    INTERNET OF THINGS, 2024, 26
  • [19] Modelling and Analysis of Network Security - an Algebraic Approach
    Zhang, Qian
    Jiang, Ying
    Wu, Peng
    2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 308 - 315
  • [20] A hierarchical evaluation approach for network security based on threat spread model
    Chen, Feng
    Liu, Dehui
    Zhang, Yi
    Su, Jishu
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2011, 48 (06): : 945 - 954