Year Year arrow
arrow-active-down-0
Publisher Publisher arrow
arrow-active-down-1
Journal
1
Journal arrow
arrow-active-down-2
Institution Institution arrow
arrow-active-down-3
Institution Country Institution Country arrow
arrow-active-down-4
Publication Type Publication Type arrow
arrow-active-down-5
Field Of Study Field Of Study arrow
arrow-active-down-6
Topics Topics arrow
arrow-active-down-7
Open Access Open Access arrow
arrow-active-down-8
Language Language arrow
arrow-active-down-9
Filter Icon Filter 1
Year Year arrow
arrow-active-down-0
Publisher Publisher arrow
arrow-active-down-1
Journal
1
Journal arrow
arrow-active-down-2
Institution Institution arrow
arrow-active-down-3
Institution Country Institution Country arrow
arrow-active-down-4
Publication Type Publication Type arrow
arrow-active-down-5
Field Of Study Field Of Study arrow
arrow-active-down-6
Topics Topics arrow
arrow-active-down-7
Open Access Open Access arrow
arrow-active-down-8
Language Language arrow
arrow-active-down-9
Filter Icon Filter 1
Export
Sort by: Relevance
  • Research Article
  • 10.4271/11-04-02-0006
2020-2021 Reviewers
  • Jan 18, 2022
  • SAE International Journal of Transportation Cybersecurity and Privacy
  • Andre Weimerskirch + 2 more

  • Journal Issue
  • 10.4271/v130-11ej-02
  • Dec 31, 2021
  • SAE International Journal of Transportation Cybersecurity and Privacy

  • Open Access Icon
  • Research Article
  • Cite Count Icon 1
  • 10.4271/11-04-02-0005
A Systematic Mapping Study on Security Countermeasures of In-Vehicle Communication Systems
  • Nov 16, 2021
  • SAE International Journal of Transportation Cybersecurity and Privacy
  • Jinghua Yu + 3 more

The innovations of vehicle connectivity have been increasing dramatically to enhance the safety and user experience of driving, while the rising numbers of interfaces to the external world also bring security threats to vehicles. Many security countermeasures have been proposed and discussed to protect the systems and services against attacks. To provide an overview of the current states in this research field, we conducted a systematic mapping study on the topic area "security countermeasures of in-vehicle communication systems". 279 papers are identified based on the defined study identification strategy and criteria. We discussed four research questions related to the security countermeasures, validation methods, publication patterns, and research trends and gaps based on the extracted and classified data. Finally, we evaluated the validity threats, the study identification results, and the whole mapping process. We found that the studies in this topic area are increasing rapidly in recent years. However, there are still gaps in various subtopics like automotive Ethernet security, anomaly reaction, and so on. This study reviews the target field not only related to research findings but also research activities, which can help identify research gaps at a high level and inspire new ideas for future work.

  • Research Article
  • Cite Count Icon 3
  • 10.4271/11-04-02-0004
Toward Privacy-Aware Traceability for Automotive Supply Chains
  • Jul 14, 2021
  • SAE International Journal of Transportation Cybersecurity and Privacy
  • Donghang Lu + 6 more

<div>The lack of traceability in today’s supply-chain system for auto components makes counterfeiting a significant problem leading to millions of dollars of lost revenue every year and putting the lives of customers at risk. Traditional solutions are usually built upon hardware such as radio-frequency identification (RFID) tags and barcodes, and these solutions cannot stop attacks from supply-chain (insider) parties themselves as they can simply duplicate products in their local database.</div> <div>This industry-academia collaborative work studies the benefits and challenges associated with the use of distributed ledger (or blockchain) technology toward preventing counterfeiting in the presence of malicious supply-chain parties. We illustrate that the provision of a distributed and append-only ledger jointly governed by supply-chain parties themselves makes permissioned blockchains such as Hyperledger Fabric a promising approach toward mitigating counterfeiting. Meanwhile, we demonstrate that the privacy of supply-chain parties can be preserved as competing supply-chain parties strive to protect their businesses from the prying eyes of competitors and counterparties. Besides, we show that the recall process can be achieved efficiently with the help of the blockchain. The proposed solution, Fordchain, overcomes the challenges to achieve the best of both worlds: a solution to the counterfeiting problem using distributed ledger technology while providing accountability and the privacy notions of interest for supply-chain parties. Although our efforts to build a blockchain-based counterfeiting prevention system aim at automotive supply chains, the lessons learned are highly applicable to other supply chains. We end-to-end implement our Fordchain solution in the Hyperledger Fabric framework, analyze it over AWS EC2 clusters, and illustrate that the performance of our solution is good enough to be applied in practice.</div>

  • Research Article
  • 10.4271/11-03-02-0009
2020-2021 Reviewers
  • May 10, 2021
  • SAE International Journal of Transportation Cybersecurity and Privacy
  • Forest

Reviewer Acknowledgment

  • Research Article
  • Cite Count Icon 7
  • 10.4271/11-04-01-0003
A Comprehensive Risk Management Approach to Information Security in Intelligent Transport Systems
  • May 5, 2021
  • SAE International Journal of Transportation Cybersecurity and Privacy
  • Tom Vogt + 13 more

<div>Connected vehicles and intelligent transportation systems are currently evolving into highly interconnected digital environments. Due to the interconnectivity of different systems and complex communication flows, a joint risk analysis for combining safety and security from a system perspective does not yet exist. We introduce a novel method for joint risk assessment in the automotive sector as a combination of the Diamond Model, Failure Mode and Effects Analysis (FMEA), and Factor Analysis of Information Risk (FAIR). These methods have been sequentially composed, which results in a comprehensive risk management approach to information security in an intelligent transport system (ITS). The Diamond Model serves to identify and structurally describe threats and scenarios, the widely accepted FMEA provides threat analysis by identifying possible error combinations, and FAIR provides a quantitative estimation of probabilities for the frequency and magnitude of risk events. We present the methodology and its step-by-step application on a practice-oriented automotive use case. As a result of this risk management approach, we can finally provide quantitative values from FAIR instead of a qualitative categorization, enabling a more accurate assessment of risks and prioritization of their mitigation. Simultaneously, the FMEA ensures complete risk identification at a component level. The approach is transparent, reusable, and can be adjusted to new estimations or insights easily and at any time, thus addressing the complexity and diversity of services in the transportation domain.</div>

  • Research Article
  • Cite Count Icon 2
  • 10.4271/11-04-01-0002
Towards a Blockchain Framework for Autonomous Vehicle System Integrity
  • May 5, 2021
  • SAE International Journal of Transportation Cybersecurity and Privacy
  • Kenneth H Chan + 2 more

  • Research Article
  • Cite Count Icon 5
  • 10.4271/11-04-01-0001
Security Threat Modeling and Automated Analysis for System Design
  • Apr 29, 2021
  • SAE International Journal of Transportation Cybersecurity and Privacy
  • Baoluo Meng + 2 more

  • Research Article
  • 10.4271/11-03-02-0007
Simple Cryptographic Key Management Scheme of the Electronic Control Unit in the Lifecycle of a Vehicle
  • Apr 14, 2021
  • SAE International Journal of Transportation Cybersecurity and Privacy
  • Toru Sakon + 1 more

  • Research Article
  • 10.4271/11-03-02-0008
Delivering Threat Analysis and Risk Assessment Based on ISO 21434: Practical and Tooling Considerations
  • Apr 14, 2021
  • SAE International Journal of Transportation Cybersecurity and Privacy
  • Kamil Svancara + 1 more