SAE International Journal of Transportation Cybersecurity and Privacy

  • ISSN 2572-1054
SAE International Journal of Transportation Cybersecurity and Privacy

Aims & Scope

Transportation Cybersecurity and Privacy: An SAE International Journal is a scholarly publication of original high-quality scientific articles focusing on the Cyber Physical System (CPS) related areas of transportation cybersecurity and privacy. Articles can present methods, tools, implementations, and applications of research in transportation cybersecurity and privacy around technologies, cybersecurity engineering process, and security economics and environment. The natural scope includes passenger vehicles and commercial and heavy-duty vehicles, as well as aerospace systems. Additional transportation systems, such as rail and maritime systems, are also in scope.

Cybersecurity and Privacy Technologies
• Cybersecurity of sensors and cyber-physical systems
• Design of resilient architectures and applications
• Privacy and data protection issues in transportation systems
• Hardware security and secure hardware modules
• Security of vehicular communications (on-board, between vehicles, and between vehicles and infrastructure)
• Security of application platforms
• Intrusion and anomaly detection systems
• Forensics and analytics
• Security of legally mandated applications (e.g., event data recorders, flight data recorders, tachographs, etc.)
• Security of cloud-based infrastructure
• Security of road pricing, restricted area access and vehicle monitoring
• Security of vehicle theft deterrent, immobilization, and theft response solutions
• Security of vehicular rights control and audit (e.g., feature activation)
• Security of emergent technologies (e.g., automated driving, unmanned aerial vehicle, and electric vehicles)
• Anti-reverse engineering

Cybersecurity and Privacy Engineering Process
• Cybersecurity engineering process
• Privacy by design
• Security throughout the system life-cycle
• Vehicle-related information sharing and vulnerability coordination
• Software assurance and formal methods
• Security standardization
• Supply chain integrity and traceability
• Communication of cybersecurity risks, impacts, and priorities
• Cybersecurity assurance testing
• Information and processes to drive organizational awareness
• Incident response
• Collaboration and engagement of stakeholders
• Reverse engineering and penetration testing

Cybersecurity Economics and Environment
• Security economics of both attackers and defenders
• Security of vehicle-driven business, maintenance, and service models
• Understanding and harnessing the hacker mindset
• Right to repair issues
• Impact of privacy/security requirements that vary by jurisdiction