AVES – Automated vehicle safety and security analysis framework

G. Sabaliauskaite, L.S. Liew, Fengjun Zhou

Research output: Chapter in Book/Report/Conference proceedingConference proceedingpeer-review

9 Citations (Scopus)

Abstract

Automated Vehicle (AV) safety and cybersecurity is an important issue that has to be adequately addressed to ensure that AVs are ready to drive on public roads, and that they are able to safely and efficiently coexist with other motorized and non-motorized traffic participants. So far, there are numerous challenges, such as lack of international standards, software and hardware limitations, absence of methods for integrated safety and security analysis, etc. This paper proposes a novel approach, AVES Framework, for systematic, model-based, integrated AV safety and cybersecurity analysis. AVES Framework adheres to road vehicle development lifecycle and is consistent with international and national standards. It is a flexible method and may be used to analyze any AV regardless of its automation and connectivity level. Furthermore, several relationship matrices and a Safety and Cyber Security Deployment (SCSD) Model, inspired by the Quality Function Deployment method, are used in AVES Framework for relationship analysis and decision making with respect to safety and cybersecurity requirements, measures, and system components.
Original languageEnglish
Title of host publicationProceedings - CSCS 2019: ACM Computer Science in Cars Symposium
Publisher Association for Computing Machinery
Pages1-8
Number of pages8
ISBN (Print)978-1-4503-7004-2
DOIs
Publication statusPublished - 2019
Externally publishedYes
EventACM Computer Science in Cars Symposium - Kaiserslautern, Germany
Duration: 8 Oct 20198 Oct 2019
https://cscs19.cispa.saarland/#dates

Conference

ConferenceACM Computer Science in Cars Symposium
Abbreviated titleCSCS '19
Country/TerritoryGermany
City Kaiserslautern
Period8/10/198/10/19
Internet address

Fingerprint

Dive into the research topics of 'AVES – Automated vehicle safety and security analysis framework'. Together they form a unique fingerprint.

Cite this