Reconcile Security Requirements for Intelligent Vehicles

被引:0
作者
Singh, Madhusudan [1 ]
Kim, Shiho [2 ]
机构
[1] Yonsei Univ, Yonsei Inst Convergence Technol, Seoul, South Korea
[2] Yonsei Univ, Sch Integrated Technol, Seoul, South Korea
来源
2017 17TH INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION AND SYSTEMS (ICCAS) | 2017年
关键词
Cyber Security; Requirement Engineering; MAPE-K; Intelligent Vehicles;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An intelligent vehicle (Self-driving) is an emerging research area. Presently, many industries, research organizations and universities are working on intelligent vehicles. Some researchers are working on security issues of intelligent vehicles (IV). Most of the researchers focus on static security (static security cannot adapt to the changes in the environment). Since the environment of IV is dynamically changing, the approach of static security is not feasible to provide reconcile cyber-security in IV. Reconciling systems evolve in a very uncertain environment and try to fulfill a business objective by sensing the environment, analyzing it and taking the best decision according to its requirements. In this paper, we discuss reconcile security requirements engineering to provide cyber-security in IV. To fulfill our objective, we use the goal modeling approach of RE, the Knowledge Acquisition in Automated Specification (KAOS) Model approach, and designed it using Objectiver tool to find the reconciling requirements. Self-reconciliation in requirement engineering is acquired by five building blocks such as Monitor, Analyze, Plan, Execute and Knowledge i.e. [MAPE-K] loop architecture, which provides the reconciling capabilities to our proposed reconciling requirements for cyber-security in IV.
引用
收藏
页码:1646 / 1651
页数:6
相关论文
共 50 条
  • [41] Security Requirements Engineering From TARA to PenTest
    Ebert, Christof
    2019 27TH IEEE INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE 2019), 2019, : 500 - 501
  • [42] Aspects of Cyber Security in Autonomous and Connected Vehicles
    Mudhivarthi, Bhavesh Raju
    Thakur, Prabhat
    Singh, Ghanshyam
    APPLIED SCIENCES-BASEL, 2023, 13 (05):
  • [43] A survey on communication technologies and requirements for internet of electric vehicles
    Bayram, Islam Safak
    Papapanagiotou, Ioannis
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2014,
  • [44] Security Requirements Specification: A Formal Method Perspective
    Mishra, Aditya Dev
    Mustafa, K.
    PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM-2020), 2019, : 113 - 117
  • [45] A Study of Security Vulnerabilities and Software Weaknesses in Vehicles
    Xiong, Wenjun
    Gulsever, Melek
    Kaya, Koray Mustafa
    Lagerstrom, Robert
    SECURE IT SYSTEMS, NORDSEC 2019, 2019, 11875 : 204 - 218
  • [46] Intelligent LSTM (iLSTM)-Security Model for HetIoT
    Mahadik, Shalaka S.
    Pawar, Pranav M.
    Muthalagu, Raja
    Prasad, Neeli Rashmi
    Mantri, Dnyaneshwar
    WIRELESS PERSONAL COMMUNICATIONS, 2023, 133 (01) : 323 - 350
  • [47] Intelligent LSTM (iLSTM)-Security Model for HetIoT
    Shalaka S. Mahadik
    Pranav M. Pawar
    Raja Muthalagu
    Neeli Rashmi Prasad
    Dnyaneshwar Mantri
    Wireless Personal Communications, 2023, 133 : 323 - 350
  • [48] Cyber security, building automation, and the intelligent building
    Fisk, David
    INTELLIGENT BUILDINGS INTERNATIONAL, 2012, 4 (03) : 169 - 181
  • [49] Architecture of an Intelligent System for Information Security Management
    Jafarov, Zafar
    2013 7TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES (AICT), 2013, : 181 - +
  • [50] Intelligent System for Automation of Security Audits (SIAAS)
    Seara, J. P.
    Serrao, C.
    EAI ENDORSED TRANSACTIONS ON SCALABLE INFORMATION SYSTEMS, 2024, 11 (01)