Graphical security modelling for Autonomous Vehicles: A novel approach to threat analysis and defence evaluation

被引:0
|
作者
Nguyen, Nhung H. [1 ]
Ge, Mengmeng [5 ]
Cho, Jin-Hee [2 ]
Moore, Terrence J. [3 ]
Yoon, Seunghyun [4 ]
Lim, Hyuk [4 ]
Nelson, Frederica [3 ]
Bai, Guangdong [1 ]
Kim, Dan Dongseong [1 ]
机构
[1] Univ Queensland, Sch Elect Engn & Comp Sci, Brisbane, Qld 4072, Australia
[2] Virginia Tech, Dept Comp Sci, Falls Church, VA 22043 USA
[3] US DEVCOM Army Res Lab, Network Sci Div, Adelphi, MD 20783 USA
[4] Korea Inst Energy Technol, AI Grad Sch, Naju Si 58217, South Korea
[5] Univ Canterbury, Dept Comp Sci & Software Engn, Christchurch 8041, New Zealand
关键词
Attack graphs; Autonomous Vehicle; Security analysis; Security modelling; Graphical security modelling; Attack countermeasure tree;
D O I
10.1016/j.cose.2024.104229
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Autonomous Vehicles (AVs) integrate numerous control units, network components, and protocols to operate effectively and interact with their surroundings, such as pedestrians and other vehicles. While these technologies enhance vehicle capabilities and enrich the driving experience, they also introduce new attack surfaces, making AVs vulnerable to cyber-attacks. Such cyber-attacks can lead to severe consequences, including traffic disruption and even threats to human life. Security modelling is crucial to safeguarding AVs as it enables the simulation and analysis of an AV's security before any potential attacks. However, the existing research on AV security modelling methods for analysing security risks and evaluating the effectiveness of security measures remains limited. In this work, we introduce a novel graphical security model and metrics to assess the security of AV systems. The proposed model utilizes initial network information to build attack graphs and attack trees at different layers of network depth. From this, various metrics are automatically calculated to analyse the security and safety of the AV network. The proposed model is designed to identify potential attack paths, analyse security and safety with precise metrics, and evaluate various defence strategies. We demonstrate the effectiveness of our framework by applying it to two AV networks and distinct AV attack scenarios, showcasing its capability to enhance the security of AVs.
引用
收藏
页数:19
相关论文
共 50 条
  • [41] Securing Cloud-Assisted Connected and Autonomous Vehicles: An In-Depth Threat Analysis and Risk Assessment
    Sheik, Al Tariq
    Maple, Carsten
    Epiphaniou, Gregory
    Dianati, Mehrdad
    SENSORS, 2024, 24 (01)
  • [42] The CloudGrid approach: Security analysis and performance evaluation
    Casola, Valentina
    Cuomo, Antonio
    Rak, Massimiliano
    Villano, Umberto
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (01): : 387 - 401
  • [43] FVMS: A Novel SiL Approach on the Evaluation of Controllers for Autonomous MAV
    Sampaio, Rafael C. B.
    Becker, Marcelo
    Siqueira, Adriano A. G.
    Freschi, Leonardo W.
    Montanher, Marcelo P.
    2013 IEEE AEROSPACE CONFERENCE, 2013,
  • [44] Analysis of safety benefits and security concerns from the use of autonomous vehicles: A grouped random parameters bivariate probit approach with heterogeneity in means
    Ahmed, Sheikh Shahriar
    Pantangi, Sarvani Sonduru
    Eker, Ugur
    Fountas, Grigorios
    Still, Stephen E.
    Anastasopoulos, Panagiotis Ch
    ANALYTIC METHODS IN ACCIDENT RESEARCH, 2020, 28
  • [45] Security Control of Autonomous Ground Vehicles Under DoS Attacks via a Novel Controller With the Switching Mechanism
    Ren, Yunshuai
    Xie, Xiangpeng
    Nguyen, Anh-Tu
    IEEE TRANSACTIONS ON FUZZY SYSTEMS, 2024, 32 (06) : 3669 - 3681
  • [46] A Novel Approach To Improve The Social Acceptance Of Autonomous Driving Vehicles By Recognizing The Emotions Of Passengers
    Marceddu, Antonio Costantino
    Sini, Jacopo
    Violante, Massimo
    Montrucchio, Bartolomeo
    THIRTEENTH INTERNATIONAL CONFERENCE ON MACHINE VISION (ICMV 2020), 2021, 11605
  • [47] A Novel Approach for A Double-Check of Passable Vegetation Detection in Autonomous Ground Vehicles
    Nguyen, D. -V.
    Kuhnert, L.
    Thamke, S.
    Schlemper, J.
    Kuhnert, K. -D.
    2012 15TH INTERNATIONAL IEEE CONFERENCE ON INTELLIGENT TRANSPORTATION SYSTEMS (ITSC), 2012, : 230 - 236
  • [48] A Multi-layer Approach through Threat Modelling and Attack Simulation for Enhanced Cyber Security Assessment
    Iturbe, Eider
    Arcas, Javier
    Rios, Erkuden
    Toledo, Nerea
    19TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY, ARES 2024, 2024,
  • [49] Requirements and Recommendations for IoT/IIoT Models to automate Security Assurance through Threat Modelling, Security Analysis and Penetration Testing
    Ankele, Ralph
    Marksteiner, Stefan
    Nahrgang, Kai
    Vallant, Heribert
    14TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2019), 2019,
  • [50] Network Security Threat Situation Evaluation Based on Fusion Decision and Spread Analysis
    Cai, Xiangdong
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (03): : 383 - 388