Learning outcomes
The research paper is based on “Analysis for Safety and Security in Automotive Vehicle Security System”. The inter-connections of automotive systems with various other systems like road-side units, vehicles and servers over the Internet have been opening new ways for today’s attackers. These hackers have been remotely accessing security-related subsystems within various connected cars. Here, the security of different connected cars and overall vehicular ecosystem has been important for gaining consumer trust and accepting the emerging innovation [11].
The research is helping to understand the approach for different on-board detecting of various events having anticipated sequences. This helps in identifying suspicious activities. The outcomes of the study are used to determine how fast the in-vehicle application has been at real runtime [4]. Various behavior models and strategies of synchronization strategies could be assessed for narrowing down various suspicious events to be sent in privacy towards global security operations. This is helpful for in-depth analysis in the future.
Here, the primary contribution of the task is intended to implement and design model-based methods as compared to the measured behavior of vehicles with expected behavior. Here, the experimental determination of the complexity of the models has been needed to find various security anomalies in real-life implementation [10]. Further, effects of different possible strategies re-synchronizing models with multiple event streams that might not fit the intended behavior are analyzed from the research.
The research uses current systematic approaches for the future developments of automotive systems supporting cyber security and different safety aware developments. The study uses techniques to analyze threats and risks that are present in automotive domains and presenting approaches for categorizing different cyber-security threats [22]. This is useful to find out the proper amount of countermeasures that are taken into consideration in the research. Moreover, a combines approach for security and safety analysis has been applied in the prior development phases [9]. This is an original pre-requisite as per as consistent engineering is considered across the development of the life-cycle.
The innovation was introduced in the late 70s with self-contained systems known as ECUs into different production vehicles. However, the complicacy of embedded systems within automotive industries has risen notably [12]. Today’s information society has been strongly supporting various Car2X or inter-system communications within an automotive domain. [12] showed that, as a result, the boundaries of various application domains have disappeared quickly resulting in various cross-domain interactions and collaborations. Here, these kinds of challenges have possessed a high effect on developing products and release of products and brand reputation of companies. Thus different future developments of automotive systems need proper systematic methods [19]. This has helped in developing awareness. Thus, different security standards like ISO 2626212 regarding road vehicles are established providing guidance while various critical safety systems developed.
Overview of recent trends in emerging technologies and innovation
According to [3], the external services, road-side units and connected cars have established innovative ecosystems with high benefits. This has included situational awareness helping vehicles to act intelligently and autonomously. Besides, as formerly closed automotive systems have been evolving to open systems, the externals security threats has been affecting the safety mechanism indirectly.
As per application requirements and scenarios are concerned the current upper-class vehicles have comprised more than about 50 ECUs. They are connected through various bus systems interconnected through central gateways and having various tasks. Here, the core gateway has been connected to OBD or On-Board Diagnose ports that have been used by repair shops According to [2]. This has been helpful to seen problems and performs various exhaust measurements. The anomaly detection systems are implemented through detecting anomalous behaviors that have been categorized in two stages. For example, at the first stage, a model is represented as denoting normal behavior of the cars. In the second stage referred to as conformance checking, that model is sued for determining the deviations from the models or anomalies. [25] showed that here the base of normal behavior model has been tracing records from CAN bus of the vehicles. Since it is already assumed that behavior of vehicles has never been changing often the stage discovery has been operation going online.
During constructing behavior models, the initial task has been to build a proper model of behavior. Here, the goal of experimental determination model complexity has been complete identifications of behavior anomalies sufficiently. [6] argued that in the event stream processing, the execution times are analyzed as per as behavior checking is concerned as compared to intended behaviors provided by the model with measured behavior provided by the event stream. During runtime, the event stream has been mapped to abstract stream through similar projections used in the discovery phase of the model. For improving performances, the aggregation and filtering steps are implemented through particular preprocessing elements. Regarding model quality the experimental determinations of various model complexities suitable to find security anomalies are needed to be found out as mentioned by Kohn and others [7].
The future activities on model discoveries have been providing algorithms adapting model during the execution time as ay false positives are determined. Future works on various performance issues must be transferring software to embedded platforms that have been likely used in the vehicles of the current era [15]. Lastly, it is understood that there are various interesting challenges while designing a global system getting event streams from various cars, identifying attacks that are detectable from a global perspective.
Evaluation of different methods for mitigating cyber-security threats
There have been many limitations in this research. First of all the study is unable to analyze how the security engineering could be integrated to develop automotive systems such that the current processes are impacted very little. The security engineering has encompassed every aspect of security from identification of threats, analyzing the threats, implementation of mitigating security measures and incorporating recovery and legal mechanisms [12]. Because of the safety critical quality of vehicular systems, the various automotive organizations have been undertaking robust development methods that should be observed. Further, changing those processes has not been an as easy task. Thus, it has been vital to examine how security engineering processes and mechanisms have been incorporated to and assimilated with the current processes of automotive developments.
Secondly, the research is unable to answer the way in which the system architecture of automotive systems has been affecting discovery and creation of various software vulnerabilities and influencing the design of different protective mechanisms of security. The automotive industry has possessed some distinct problems while designing systems [14]. Here, the outcomes denote highly customized systems that are required to assess from security perspectives. Moreover, here the research is unable to answer how the systematic vulnerabilities could be exploited [23]. Further, how particular architectures have been influencing the designing of protection mechanisms are still to be identified. The possibility to utilize security mechanisms known from servers and desktops are needed to be determined along with how they can be used such that they can be adapted or re-used.
Lastly, this research has overlooked the security mechanisms has been impacting automotive systems and vice versa. The safety engineering has been present for a long time in automotive systems. However, development security engineering has been posing interesting query how they have been affecting others. Further, it has always been easy to imagine that few safety mechanisms like redundancy have been able to create vulnerabilities in security that can be easily exploited [13]. Besides, security mechanisms like authentications have been leading to various security issues. For example, every breaking message has failed to authenticate and they have stopped working completely.
The study was aimed at various issues that are researched here. Those goals are listed below.
- Addressing cyber-security and system safety in automotive vehicles combined and raising awareness of their mutual effects.
- Examining proper threat modeling and analysis of hazards tools to quantify security effects on dependable safety-related system development at system levels.
- Investigating systematic approaches for supporting the identification of different trust boundaries and attacks vectors are per safety and cyber-security aspects of automotive systems are concerned.
- Analyzing how to what extent various well-known mechanisms and processes from IT security plans ate adapted to automotive domains.
Selection of the proper research methods are facilitating the process to collect in-depth information regarded to the artificial domain. The selected research topic is based on artificial intelligence. The study is focused on design of the intelligent agents. The selected topic makes the evaluation harder since theories have some evaluation criteria. The intelligent agent is both proactive as well as reactive, which is achieved of goals, implicit and explicit. The behavior is planned and future oriented [1]. The agent is received and reacted of environmental changes. The behavior is casual as well as past determined.
Behavior models and strategies for systematic vulnerabilities
The events of safety and security in automotive vehicle security system are collected using secondary data collection method. There is collection of the information from relevant sources for finding of answers to the research problems as well as evaluating the research outcomes [4]. The secondary data are those which are collected by someone and it is passed throughout the statistical process. It is both published as well as unpublished data as the available data are unsuitable. The data are set to collect from existing research articles as well as literature that are considered to be secondary data sources [6]. The secondary data helps to understand the different existing theories as well as concepts regards to the domain. It helps to conduct of research in proper manner. The research work is conducted based on availability of data from the journal articles. The records are contained of information regards to the safety and security of automotive vehicle security system which consists of details on severity of the incidents, loss of property and life that are involved. The entire research work is based on collected data from the secondary sources. Mainly, the data are collected from newspaper articles, publication papers and journal articles [9]. The secondary sources are being found from library research like the journal articles furthermore also magazines.
The researcher is required to be careful with use of the secondary data. There are minute’s scrutiny which are possible that the secondary data are unsuitable as well as inadequate into the problem context where the researcher is required to study [18]. There are various problems which are raised as well as referred to the data that are collected and analyzed by others; therefore the arguments of other’s authors are used to analyze the security and safety of the automotive vehicle system. The researcher is utilized of secondary data, and then there are looked for various sources from where the researcher has to gather the secondary sources. There is collection of original as well as realistic data [12].
Figure 1: Step-by-step research methodology
(Source: [5], pp-191)
The steps which are performed to do the research methodology are as follows:
Search for the secondary data: The data are collected by someone other than users. The sources of the secondary data are the information those are collected by the organizational records, data those are collected by the research purposes [3].
Identification of information required on basis of research: The research is composed of gathering of information based on selected research topic. The research paper is based on “Analysis for Safety and Security in Automotive Vehicle Security System”. Therefore, mostly the journal articles are selected related to the topic [10].
Current systematic approaches for the future developments of automotive systems
Identification of data sources: Identification of the data sources are used to populate the security and safety into the proposed system. The data are stored into different formats as well as sources. There are various data types such as data at rest, data in motion and data from the data warehouse [24]. The data from the data warehouse are structured format.
Certain attributes such as reliability, availability, safety and security are required to analyze the secondary data based on selected research topic.
Table 1: Selected Attribute Description
Attribute Name |
Data Type |
Description |
Reliability |
Secondary |
The study is used of qualitative methods to analyse seeks to understand the experience of the users those are used of automotive security system. It describes the safety and security events experienced by the system users [9]. It includes of reliable qualitative studies that are involved of secondary qualitative analysis of qualitative data. |
Availability |
Secondary |
Secondary market research is done so that the information is gathered easily as well as accessible. There are various data sources where the data are to be taken and it is easier to gather of relevant information [16]. This method is used of huge amount of information into less time. |
Safety |
Secondary |
There is requirement of building of automotive vehicle system which is started to build of safety relevant systems with the security needs [2]. |
Security |
Secondary |
The researcher is evaluated to data sets for choosing of secondary data. All the collected data are to be kept secured so that no other persona can able to access to those data [12]. The data are kept into secured position. |
The qualitative data analysis is set to facilitate of process to gain the theoretical as well as conceptual data with regards to the domain being researched and allowed the researchers to gain of insight into the research topic. This data analysis is based on the methods for performing of subjective evaluation of the opinions as well as attributes [17]. The research analyst can perform of in-depth analysis of the topic in addition to perform of group interviews. The data are being analyzed with use of qualitative data collection procedure for understanding the safety and security in automotive vehicle security system. The analysis of data is central step into the qualitative research [19]. The collection of data is being limited towards recording and documentation which are occurred as for example with recording interactions. Development of qualitative data analysis is found a field where there is constant growing as well as less structuring.
According to [5], dependability is such a concept which is regrouped of various system attributes like reliability, availability, safety and security along with non-functional requirements for the embedded systems. There are various attributes which lead to development targets. The non-unified methods are required to manage various attributes lead to inconsistencies which are identified into the development phases. The dependability features of Automotive Vehicle Security System are required of development processes along with mutual domain expertise [7]. The dependable system is relied on development methods like requirement and system engineering.
Table 2: Mapping of safety and security
Safety engineering |
Cyber security engineering |
||
Analysis subject |
External enabling conditions |
Hazardous situations |
Attack |
Risk |
Hazard |
Threat |
|
System inherent shortage |
Malfunction |
Vulnerability |
|
Analysis category |
External risk controlling analysis |
Controllability |
Attacker skills |
Impact analysis |
Severity |
Threat critically |
|
Occurrence analysis |
Exposure |
Attack resources |
|
Analysis results |
Design goals |
Safety goals |
Security targets |
The modern “Electronic Steering Column Lock (ESCL)” systems are representative safety as well as security relevant to the use cases, due to safety as well as security related nature along with manageable complexity regards to the elements of the proposed system. It is underlying of the functionality as well as external systems. The use cases are intended to train purposes along with represents neither of the sensitive projects [17]. The proposed use cases are elaborated in collaboration with the initiatives those are united experts from major sensitive suppliers into focused working group. ESCL system has some basic functions such as when the drivers are get into the car, then the vehicle immobilizer are received of ignition key signals. When the drivers are started of the car, then the ignition-on messages are communicated by means of controller area network bus. The time when the signals are being received by use of ESCL along with IM enables of ESCL, the motor moves locking bolt in addition to unlocks the steering column [22]. The process of inverse, locking of the steering column, are happened by means of bolt movement by electric motors into the opposite directions as the vehicles are into standstill as well as drivers are switched off ignition.
Limitations of the research
The vehicles systems are under the threat from the malicious individuals as well as groups those are seek to gain of the personal and organizational advantages. It ensures of security that are critical for successful deployment of the technology [20]. There are various levels for the security protection which are based on requirements. Some of the assets are not required of security measures due to low level of risks. The risk analysis is done to prioritize the requirements of security due to proposed system. Related vulnerabilities as well as threats from the external sources are considered as hacker’s communities, security researchers and vulnerability related database [24]. The threat modeling of the automotive systems are included of model of system by adding of details in addition to drawing of trust boundaries. There is identification of threats from the data flows by use of threat identification methodology. There are assessments of the threats which are added. There is addressing of the threats by redesign of the system, adding of mitigations along with ignorance if the risks are acceptable [18]. There is filtration of normal behavior which leaves smaller percentage of the abnormal behavior that is basis by malicious agents lead to security of the actions into actuators of the car.
The automotive systems are subjected to the conditions that are different from the regular IT systems. The long life time is implied of chosen security mechanisms that are functioning for 20 years. The vulnerabilities are found into various kinds of the systems that are made of secured software updates required. Remote software updates are made of secured software updates necessary [22]. The cost factors are cost, profit margins, cost savings which are considered. There are different types of behavior models in addition to strategies of synchronization strategies could be reviewed for narrowing down a variety of suspicious events to be sent in privacy towards global security operations [12]. It is also understandable that there are different challenges to design the automotive vehicle system which gets of events from different cars, identification of the attacks as well as detectable from a global perspective. The behavior models and strategies of synchronization strategies could be assessed for narrowing down various suspicious events.
The research paper is based on the impacts of security on safety that are being discussed. There is a consideration of the functional safety hazards that are raised out of various malicious manipulations to safety hazards raised due to systematic failures as well as failures of random hardware. [8] discussed of security as well as safety goals to the functional safety security analysis. The security is for safety as well as safety for driver towards the security measures. The functional safety disciplines are considered as systematic hardware failures as the hazard sources. The security is being considered as malicious adversary as the threat sources to the natural disasters as well as systematic failures. [10] argued that security is such a discipline that have broader range of an unacceptable consequences such as human life, security of human, loss of organizational reputation, finance losses, losses of the intellectual property as well as damage to the infrastructure. The purpose of this work is to complement of the specifications which are based on on-board attack detections by measurement to detect the unanticipated sequences of the events [22]. Into the research approach, there is assumption of future where there is multi-level hierarchy of the system to detect as well as prevent of malicious activities. Into the vehicle, there is signature based measures that are used to detect as well as combat the known attacks with on-board networks [13]. The detection of unknown attacks is required to more resources that are available into one vehicle and more knowledge than availability locally.
Selected research methods
The main contribution of this research paper is analyzing the security and safety in automotive vehicle security system. There is a designing of model based methods which are compared to measure behavior of the vehicle with expected behavior. There is experimental determination of the model complexity which is required to find the security anomalies with practices [25]. In general, the system have no such knowledge of the applications related to vehicle, therefore it is lacked connection among reported security problems as well as affected critical behaviors. The system is also used of various types of technologies. The paper is provided of approaches and implemented of in-vehicle processing of the events streams in identifying the anomalous behavior with sequences of events [12]. There is filtration of normal behavior which leaves smaller percentage of the abnormal behavior that is caused by malicious agents lead to safety of the actions into actuators of car. The unanticipated events are required to process the security analysis, either by the vehicle components. In order to satisfy with the objectives, the work is contributed to design as well as implement of model based methods with expected behavior [15]. The proposed approach is proper for computing the models considered and executing behavior check on the computing platforms.
The approach into the automotive domain is reduction of number of Electronic Control Unit (ECU) per car which is combined with the individual ECU to powerful domains. With such an approach, each of the domain controller is bundled various number of functions. [18] stated that the cars are more as well as intelligent and also connected. The technological transformation is made of modern vehicles which are vulnerable to the cyber attacks. The cars are used to be closed system. The automotive system is not designed with keeping in mind the security. The security breaches are automotive domain which are raised the issues into the industry as well as public. [16] discussed that security is a critical concern with the impact on both public as well as safety of road. The new technologies like autonomous driving as well as intelligent transport system are a reality. The secured development of the automotive system is required of higher quality as well as safety standard. The automotive industry is developed as well as accepted of ISO 26262 as the standard for the road vehicle functional safety for the proposed system which covers of both hardware as well as software. The development is started with concept phase like the hazard analysis as well as the risk assessment [20]. The security becomes an issue for the safety into the modern vehicles which are attempted of emerged into recent years for tackling of secured development of the ICT components along with system into automotive domain. It is on-going discussions on integration of the security activities into the existing “safety-oriented automotive development lifecycle”. There are secured development processes for cyber physical vehicle systems [18]. Risk assessment is to be done for identification of potential cyber security threats along with assets and also rates the risk which is associated with the possible threats.
Focus of the study: Design of the intelligent agents
Automotive threat modelling is such an activity which is defined as theoretical model for perceived threats into the system. There are theoretical model to practical implementation for capturing of the significant attack vectors. [21] discussed that threat modelling into the automotive secured development lifecycle is addressed of software security of the web applications into the design phase. The automotive systems are shared of commonalities with the standard IT system, and there are various differences that are required of domain techniques as well as research considerations. The threat modelling has various phases to meet with the research objectives. [23] concluded that automotive vehicle system is equipped with safety features which help to protect both the drivers as well as passengers which make easier to read the instruments along with in-vehicle infotainments. From the data analysis part, it is stated that security as well as safety are the highest challenges to connected as well as intelligent vehicles [25]. Threat modelling is such a technique which is used to identify the threats along with mitigations throughout the security analysis of the automotive systems. There are used of various standards that are used to evaluate the risk assessment techniques. The research study is showed of the current advances those are required of security and safety engineering [16]. This can acquire place as their similarities are well-known along with adequate interactions are adequately established.
Conclusion
The automotive security has turned out to be very active research areas. The above research is helpful for vehicle suppliers and manufacturers to understand the analysis of safety and security in automotive vehicle security systems. The study shows that in spite of current advances many open questions have been remaining and they are required to be answered. In conclusion, it can be said that the security and safety engineering is a much closed related field and has been able to benefit each other mutually. This can take place as their similarities are identified and sufficient interactions are adequately established. The study has provided the approach to implement in-vehicle processing of event streams for identifying anomalous behavior according to various sequences and not just only on one single event. The research is helping to understand how automotive systems can achieve long product lifetimes, long development leading times as well as thus showing technology adoptions.
On the other hand, the security topics have been seen traditionally as effective as physical attacks affecting single vehicles. Because of new functionalities such as autonomous driving and various online software upgrading, this has been no longer acceptable in assuming that care fleets have been immune to multiple security risks and different automated remote attacks. This future automotive systems development needs proper systematic approaches to supporting safety aware as well as cyber-security events. Further, the industry must sustain high-cost pressure to stay competitive and here every possible cost-savings should be considered. Moreover, automotive vehicle businesses must fulfill the legal, real-time and safety requirements that are needed to be performed. However, this might differ around various regions of the world. The paper is to be provided as well as implemented of the in-vehicle processing of the events streams in recognizing the anomalous behavior with sequences of events.
Evaluation of intelligent agents
References
[1]A. van Lamsweerde, “Elaborating Security Requirements by Construction of Intentional Anti-Models”, Dl.acm.org, 2018. [Online]. Available: https://dl.acm.org/citation.cfm?id=999421. [Accessed: 15- May- 2018].
[2]S. Kondakci, “Analysis of information security reliability: A tutorial”, Reliability Engineering & System Safety, vol. 133, pp. 275-299, 2015.
[3]G. Kalra, “Threat analysis of an enterprise messaging system”, Network Security, vol. 2014, no. 12, pp. 7-13, 2014.
[4]R. Sadia, S. Bekhor and A. Polus, “Individual Selection of Driving Speeds: Analysis of a Stated Preference Survey”, Journal of Transportation Safety & Security, vol. 7, no. 4, pp. 291-306, 2015.
[5]A. Fletcher, “Applying critical realism in qualitative research: methodology meets method”, International Journal of Social Research Methodology, vol. 20, no. 2, pp. 181-194, 2016.
[6]R. Thomson and J. McLeod, “New frontiers in qualitative longitudinal research: an agenda for research”, International Journal of Social Research Methodology, vol. 18, no. 3, pp. 243-250, 2015.
[7]G. Mangiameli, “BMC Medical Research Methodology reviewer acknowledgement 2015”, BMC Medical Research Methodology, vol. 16, no. 1, 2016.
[8] M. Zhu and P. Liu, “Reviewing the book “Principles of Cyber-physical Systems” from a security perspective”, ICST Transactions on Security and Safety, vol. 2, no. 4, p. 150480, 2015.
[9] E. Piesik, M. ?liwi?ski and T. Barnert, “Determining and verifying the safety integrity level of the safety instrumented systems with the uncertainty and security aspects”, Reliability Engineering & System Safety, vol. 152, pp. 259-272, 2016.
[10] A. Kohn, R. Schneider, A. Vilela, U. Dannebaum and A. Herkersdorf, “Markov Chain-based Reliability Analysis for Automotive Fail-Operational Systems”, SAE International Journal of Transportation Safety, vol. 5, no. 1, 2017.
[11] C. Schmittner, E. Ma, Z., Schoitsch and T. Gruber, “A case study of fmvea and chassis as safety and security co-analysis method for automotive cyber-physical systems”. In Proceedings of the 1st ACM Workshop on Cyber-Physical System Security (pp. 69-80). ACM. 2015.
[12] G. Macher, H. Sporer, R. Berlach, E. Armengaud and C. Kreiner, March. SAHARA: a security-aware hazard and risk analysis method. In Design, Automation & Test in Europe Conference & Exhibition (DATE), 2015 (pp. 621-624). IEEE. 2015.
[13] M. Steger, M. Karner, J., Hillebrand, W. Rom and K. Römer. A security metric for structured security analysis of cyber-physical systems supporting SAE J3061. In Modelling, Analysis, and Control of Complex CPS (CPS Data), 2016 2nd International Workshop on (pp. 1-6). IEEE. 2016.
[14] V. Izosimov, A. Asvestopoulos, O. Blomkvist, M. and Törngren. Security-aware development of cyber-physical systems illustrated with automotive case study. In Proceedings of the 2016 Conference on Design, Automation & Test in Europe (pp. 818-821). EDA Consortium. 2016.
[15] P. Mundhenk, S. Steinhorst, M. Lukasiewycz, S.A. Fahmy and S. Chakraborty. Security analysis of automotive architectures using probabilistic model checking. In Proceedings of the 52nd Annual Design Automation Conference (p. 38). ACM. 2015.
[16] H.M. Song, H.MRKim, H.K. and Kim. January. Intrusion detection system based on the analysis of time intervals of CAN messages for in-vehicle network. In Information Networking (ICOIN), 2016 International Conference on (pp. 63-68). IEEE. 2016
[17] M. Amoozadeh, A., Raghuramu, C.N., Chuah, D. Ghosal, H.M. Zhang, J. Rowe and K. Levitt. Security vulnerabilities of connected vehicle streams and their impact on cooperative driving. IEEE Communications Magazine, 53(6), pp.126-132. 2015.
[18] S. Woo,H.J.., Jo, D.H.. and Lee, A practical wireless attack on the connected car and security protocol for in-vehicle CAN. IEEE Transactions on Intelligent Transportation Systems, 16(2), pp.993-1006. 2015.
[19] C. Schmittner, Z., Ma, Z. and P. Puschner, Limitation and improvement of STPA-Sec for safety and security co-analysis. In International Conference on Computer Safety, Reliability, and Security (pp. 195-209). Springer, Cham. 2016.
[20] P. Mundhenk, A., Mrowca, S., Steinhorst, M., Lukasiewycz, S.A., Fahmy and S. Chakraborty. Open source model and simulator for real-time performance analysis of automotive network security. Acm Sigbed Review, 13(3), pp.8-13. 2016.
[21] A. Riel, C. Kreiner, G, Macher and R. Messnarz. Integrated design for tackling safety and security challenges of smart products and digital manufacturing. CIRP Annals, 66(1), pp.177-180. 2017.
[22] C.W. Lin and H. Yu, cooperation or competition?: Coexistence of safety and security in next-generation ethernet-based automotive networks. In Proceedings of the 53rd Annual Design Automation Conference (p. 52). ACM. 2016.
[23] B. Zheng, W. Li, P. Deng, L. Gérard, Q. Zhu and N. Shankar. Design and verification for transportation system security. In Proceedings of the 52nd annual design automation conference (p. 96). ACM. 2015.
[24] K. Schmidt, P. Tröger, H.M. Kroll, T. Bünger, F. Krueger, and C. Neuhaus, Adapted development process for security in networked automotive systems. SAE International Journal of Passenger Cars-Electronic and Electrical Systems, 7(2014-01-0334), pp.516-526. 2014.
[25] Ward, D., 2016. Aligning safety and security systems for connected vehicles. 2016.