This content is not included in your SAE MOBILUS subscription, or you are not logged in.

Security Threat Analysis of In-vehicle Network Using STRIDE-Based Attack Tree and Fuzzy Analytic Hierarchy Process

Journal Article
12-04-04-0026
ISSN: 2574-0741, e-ISSN: 2574-075X
Published October 22, 2021 by SAE International in United States
Security Threat Analysis of In-vehicle Network Using STRIDE-Based Attack Tree and Fuzzy Analytic Hierarchy Process
Sector:
Citation: Luo, F., Zhang, X., and Hou, S., "Security Threat Analysis of In-vehicle Network Using STRIDE-Based Attack Tree and Fuzzy Analytic Hierarchy Process," SAE Intl. J CAV 4(4):335-346, 2021, https://doi.org/10.4271/12-04-04-0026.
Language: English

References

  1. Checkoway , S. , McCoy , D. , Kantor , B. , Anderson , D. et al. Comprehensive Experimental Analyses of Automotive Attack Surfaces USENIX Security Symposium San Francisco, CA 2011
  2. Miller , C. and Valasek , C. Remote Exploitation of an Unaltered Passenger Vehicle Black Hat USA 2015 2015 91
  3. Koscher , K. , Czeskis , A. , Roesner , F. , Patel , S. et al. Experimental Security Analysis of a Modern Automobile 2010 IEEE Symposium on Security and Privacy Berkeley, CA 2010
  4. Liu , J. , Zhang , S. , Sun , W. , and Shi , Y. In-Vehicle Network Attacks and Countermeasures: Challenges and Future Directions IEEE Network 31 5 2017 50 58 https://doi.org/10.1109/mnet.2017.1600257
  5. Deng , J. , Yu , L. , Fu , Y. , Hambolu , O. et al. Security and Data Privacy of Modern Automobiles Mashrur , C. , Amy , A. , Kakan , D. , Data Analytics for Intelligent Transportation Systems Amsterdam, the Netherlands Elsevier 2017 131 163
  6. Takahashi , J. , Aragane , Y. , Miyazawa , T. , Fuji , H. et al. Automotive Attacks and Countermeasures on Lin-Bus Journal of Information Processing 25 2017 220 228 https://doi.org/10.2197/ipsjjip.25.220
  7. Gu , Z. , Han , G. , Zeng , H. , and Zhao , Q. Security-Aware Mapping and Scheduling with Hardware Co-Processors for Flexray-Based Distributed Embedded Systems IEEE Transactions on Parallel and Distributed Systems 27 10 2016 3044 3057
  8. Mousa , A.R. , NourElDeen , P. , Azer , M. , and Allam , M. Lightweight Authentication Protocol Deployment over FlexRay Proceedings of the 10th International Conference on Informatics and Systems Giza, Egypt 2016
  9. El-Rewini , Z. , Sadatsharan , K. , Selvaraj , D.F. , Plathottam , S.J. et al. Cybersecurity Challenges in Vehicular Communications Vehicular Communications 23 2020 100214 https://doi.org/10.1016/j.vehcom.2019.100214
  10. SAE International Surface Vehicle Recommended Practices 2016
  11. Schneier , B. Attack Trees Dr. Dobb’s Journal 24 12 1999 21 29
  12. Ruddle , A. , Ward , D. , Weyl , B. , Idrees , S. et al. 2009
  13. Ketel , M. IT Security Risk Management Proceedings of the 46th Annual Southeast Regional Conference Auburn, AL 2008
  14. Kang , D.J. , Lee , J.J. , Lee , Y. , Lee , I.S. et al. Quantitative Methodology to Assess Cyber Security Risks of SCADA System in Electric Power Industry Journal of the Korea Institute of Information Security and Cryptology 23 3 2013 445 457 https://doi.org/10.13089/jkiisc.2013.23.3.445
  15. Kong , H.K. , Hong , M.K. , and Kim , T.S. Security Risk Assessment Framework for Smart Car Using the Attack Tree Analysis Journal of Ambient Intelligence and Humanized Computing 9 3 2018 531 551
  16. Swiderski , F. and Snyder , W. Threat Modeling Redmond, WA Microsoft Press 2004 0735619913
  17. Zhang , J.J. Fuzzy Analytical Hierarchy Process Fuzzy System and Mathematics 14 2 2000 80 88
  18. Saaty , T.L. How to Make a Decision: The Analytic Hierarchy Process European Journal of Operational Research 48 1 1990 9 26
  19. Islam , M. , Sandberg , C. , Bokesand , A. , Olovsson , T. et al. 2014
  20. Yao , M. and Zhang , S. Fuzzy Consistent Matrix and Its Applications in Soft Science Systems Engineering 2 1997 54 57
  21. Samuel , J. , Aalab , K. , and Jaskolka , J. Evaluating the Soundness of Security Metrics from Vulnerability Scoring Frameworks 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) Guangzhou, China 2020
  22. Yee , G.O. Designing Sound Security Metrics International Journal of Systems and Software Security and Protection (IJSSSP) 10 1 2019 1 21
  23. Ru , Y. , Wang , Y. , Li , J. , Liu , J. et al. Risk Assessment of Cyber Attacks in ECPS Based on Attack Tree and AHP 2016 12th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD) Changsha, China 2016
  24. Zhang , J.J. Comparison of Three Ranking Methods for the Fuzzy Consistent Judgment Matrix Systems Engineering and Electronics 25 11 2003 1370 1372
  25. Hu , Q. and Luo , F. Review of Secure Communication Approaches for In-Vehicle Network International Journal of Automotive Technology 19 5 2018 879 894 https://doi.org/10.1007/s12239-018-0085-1

Cited By