Cybersecurity is an issue of increasing concern for emerging connected vehicles. Ensuring public trust in future connected and automated vehicles will require very high levels of confidence in their dependability, which will include cybersecurity assurance. In functional safety engineering, the safety case has become a widely used approach to describing and documenting safety assurance arguments and their supporting evidence. The use of a similar security case can also be considered in cybersecurity engineering, but there are significant differences between safety and cybersecurity. Cybersecurity impacts include, but are not limited to, possible safety issues. Furthermore, the cybersecurity threats arise from the ingenuity of human attackers, and available technology, with the result that they are constantly evolving. This paper proposes the use of an assurance case approach for cybersecurity and outlines the particular requirements that are considered to be necessary for the development of such a cybersecurity case.
|Title of host publication||Proceedings of the 7th International Conference on Vehicle Technology and Intelligent Transport Systems - VEHITS|
|Editors||Karsten Berns, Markus Helfert, Oleg Gusikhin|
|Number of pages||8|
|Publication status||Published - 2021|
|Event||7th International Conference on Vehicle Technology and Intelligent Transport Systems - |
Duration: 28 Apr 2021 → 30 Apr 2021
Conference number: 7
|Name||International Conference on Vehicle Technology and Intelligent Transport Systems, VEHITS - Proceedings|
|Conference||7th International Conference on Vehicle Technology and Intelligent Transport Systems|
|Abbreviated title||VEHITS 2021|
|Period||28/04/21 → 30/04/21|
Bibliographical noteDBLP's bibliographic metadata records provided through http://dblp.org/search/publ/api are distributed under a Creative Commons CC0 1.0 Universal Public Domain Dedication. Although the bibliographic metadata records are provided consistent with CC0 1.0 Dedication, the content described by the metadata records is not. Content may be subject to copyright, rights of privacy, rights of publicity and other restrictions.
- Connected and Automated Vehicles
- Cybersecurity Case
- Vehicle Cybersecurity