Requirements for a Cybersecurity Case Approach for the Assurance of Future Connected and Automated Vehicles

Research output: Chapter in Book/Report/Conference proceedingConference proceedingpeer-review

Abstract

Cybersecurity is an issue of increasing concern for emerging connected vehicles. Ensuring public trust in future connected and automated vehicles will require very high levels of confidence in their dependability, which will include cybersecurity assurance. In functional safety engineering, the safety case has become a widely used approach to describing and documenting safety assurance arguments and their supporting evidence. The use of a similar security case can also be considered in cybersecurity engineering, but there are significant differences between safety and cybersecurity. Cybersecurity impacts include, but are not limited to, possible safety issues. Furthermore, the cybersecurity threats arise from the ingenuity of human attackers, and available technology, with the result that they are constantly evolving. This paper proposes the use of an assurance case approach for cybersecurity and outlines the particular requirements that are considered to be necessary for the development of such a cybersecurity case.
Original languageEnglish
Title of host publicationProceedings of the 7th International Conference on Vehicle Technology and Intelligent Transport Systems - VEHITS
PublisherSciTePress
Pages626-633
Number of pages8
ISBN (Electronic)978-989-758-513-5
DOIs
Publication statusPublished - 2021
Event7th International Conference on Vehicle Technology and Intelligent Transport Systems -
Duration: 28 Apr 202130 Apr 2021
Conference number: 7

Conference

Conference7th International Conference on Vehicle Technology and Intelligent Transport Systems
Abbreviated titleVEHITS 2021
Period28/04/2130/04/21

Bibliographical note

DBLP's bibliographic metadata records provided through http://dblp.org/search/publ/api are distributed under a Creative Commons CC0 1.0 Universal Public Domain Dedication. Although the bibliographic metadata records are provided consistent with CC0 1.0 Dedication, the content described by the metadata records is not. Content may be subject to copyright, rights of privacy, rights of publicity and other restrictions.

Keywords

  • Assurance
  • Automotive
  • Connected and Automated Vehicles
  • Cybersecurity Case
  • Vehicle Cybersecurity

Fingerprint

Dive into the research topics of 'Requirements for a Cybersecurity Case Approach for the Assurance of Future Connected and Automated Vehicles'. Together they form a unique fingerprint.

Cite this