Browse Topic: Cybersecurity

Items (588)
With the development of ship intelligence, network security threats are increasing day by day. This paper proposes a ship network security situation awareness algorithm based on an improved spatiotemporal attention mechanism, and constructs a supporting defense mechanism. The algorithm accurately captures changes in network security situation through dynamic weight allocation and multi-scale feature extraction. In the experimental simulation, OMNeT++ is combined with SUMO to build a ship network simulation environment, and Maritime - CPS - Dataset and other data sets are used for testing. The algorithm in this paper is compared with ARIMA, LSTM, GRU and other algorithms. The results show that in terms of situation awareness accuracy, the algorithm in this paper reaches 95.6%, which is 27.8% higher than ARIMA, 12.3% higher than LSTM, and 10.1% higher than GRU respectively; the average response time of the defense mechanism is shortened to 2.3 seconds, which is 40% faster than the
Kong, ZeyuZhou, BofeiWan, Shiyao
With the rapid development of Internet of Vehicles (IoV) and cyber-physical systems (CPS), connected autonomous vehicles (CAVs) have also developed rapidly. However, at the same time, in-vehicle networks also face more security challenges, mainly in terms of resource constraints, dynamic attacks, protocol heterogeneity, and high real-time requirements. Firstly, the trade-offs between lightweight encryption primitives and their software and hardware collaborative design in terms of performance, resource overhead, and security strength are analyzed. Secondly, the resource efficiency of AI-based intrusion detection system (IDS) is evaluated at the edge. Finally, we propose a dynamic adaptive collaborative defense framework (DACDF), which integrates federated learning with dynamic weight distillation, blockchain authentication with lightweight verifiable delay function (Light-VDF) and cross-domain IDS with hierarchical attention feature fusion to deal with collaborative attacks in resource
Zhou, YouZhang, JiguiDing, KaniYang, Guozhi
The rapid evolution of autonomy in Off-Highway Vehicles (OHVs)—spanning agriculture, mining, and construction—demands robust cybersecurity strategies. Sensor-control systems, the cognitive core of autonomous OHVs, operate in harsh, connectivity-limited environments. This paper presents a structured approach to applying threat modeling to these architectures, ensuring secure-by-design systems that uphold safety, resilience, and operational integrity.
Kotal, Amit
Manufacturers need pragmatic guidance when choosing network protocols that must balance responsiveness, high data throughput, and long-term maintainability. This paper presents a step-by-step, criteria-driven framework that scores protocols on six practical dimensions, real-time behavior, bandwidth, interoperability, security, IIoT readiness, and legacy support and demonstrates the approach on both greenfield and brownfield scenarios. By combining vendor specifications, peer-reviewed studies, and field experience, the framework delivers transparent, weighted rankings designed to help engineers make defensible deployment choices. This paper explores how network protocols can be mapped to different layers of the automation pyramid, ranging from field-level communication to enterprise-level. For example, Profinet is shown to be highly effective for time-critical applications such as robotic assembly and motion control due to its deterministic, real-time ethernet capabilities. Meanwhile
Tarapure, Prasad
In view of the complexity of railway engineering structure, the systematicness of professional collaboration and the high reliability of operation safety, this paper studied the spatial-temporal information data organization model with all elements in whole domain for Shuozhou-Huanghua Railway from the aspect of Shuozhou-Huanghua Railway spatial-temporal information security. Taking the unique spatial-temporal benchmark as the main line, the paper associated different spatial-temporal information to form an efficient organization model of Shuozhou-Huanghua Railway spatial-temporal information with all elements in the whole domain, so as to implement the effective organization of massive spatial-temporal information in various specialties and fields of Shuozhou-Huanghua Railway; By using GIS (Geographic Information System) visualization technology, spatial analysis technology and big data real-time dynamic rendering technology, it was realized the real-time dynamic visualization display
Liu, KunYu, HongshengZhu, PanfengLiu, WenbinWang, Yaoyao
The automotive industry's rapid shift towards electric and connected vehicles intensifies the demand for robust solutions addressing software integrity, cybersecurity, and stringent regulatory compliance, particularly concerning powertrain components and related control units. This paper addresses the significant challenge faced by automotive companies in efficiently managing and deploying an exponentially increasing number of software and hardware variants under the rigorous requirements of UNECE Regulation No. 156. This regulation mandates secure, traceable, and systematic software update processes for new vehicles and their components [1]. The proposed solution demonstrates a transformative approach that significantly reduces the software release cycle for Over-The-Air (OTA) updates which usually take 6 to 8 months to emerge [2]. By leveraging advanced techniques in automated compliance tracking, efficient parameter management, and centralized documentation, this approach bridges
Sammer, GeraldSchuch, NikolasKammerhofer, Markus
As mission-critical systems demand more processing power, real-time data movement, and multi-domain interoperability, rugged embedded systems are being transformed. Today's military and aerospace applications increasingly demand the merging of AI computing, enhanced sensor interfaces, and cybersecurity - all under harsh environmental conditions. At the heart of this evolution is the 3U OpenVPX form factor, a modular, compact, and ruggedized hardware standard and increasingly the SOSA aligned subset of the architecture. However, next-generation systems need to go further: supporting higher bandwidth, better thermal efficiency, improved security, while maintaining multi-vendor interoperability and long-term sustainability. We'll discuss some of today's enclosure solutions as well as emerging technologies.
Several information security problems currently require the vigilance of the defender to prevent exploitation or misclassification of information, specifically code injection vulnerabilities and enforcement of Security Classification Guides. This paper discusses a potential solution that can enforce some of these rules by computer mechanism, reducing the potential for security problems. The solution is to replace using simple text strings with data structures containing both a string and a key-value data store. This metadata allows the computer to apply automated rules to enforce data sanitization and classification.
Czerniak, Gregory P.
This research evaluated the practicality of implementing Post-Quantum Cryptography (PQC) algorithms onboard resource-constrained computing devices, especially those found in automotive platforms. While computational efficiency within PQC is high, memory size and bandwidth constraints become relevant upon consideration of end-to-end implementation. The Controller Area Network (CAN) protocol utilizes only eight (8) bytes of data payload per message, requiring the large keys of PQC algorithms to be split into several messages. Power efficient 32-bit ARM microcontrollers were used for testing. Comparison was made between software implementations of both PQC and modern algorithms to evaluate relative computational cost. Ultimately, this research determined that the communication overhead required by PQC algorithms such as CRYSTALS-Kyber, CRYSTALS-Dilithium, and Falcon is not so egregious as to preclude them from implementation on board vehicular networks.
Smith, SethOwens, KyleKozan, Katherine
As unmanned vehicular networks become more prevalent in civilian and defense applications, the need for robust security solutions grows in parallel. While ROS 2 offers a flexible platform for robotic operations, its security model lacks the adaptability required for dynamic trust management and proactive threat mitigation. To address these shortcomings, we propose a novel framework that integrates containerized ROS 2 nodes with Kubernetes-based orchestration, a dynamic trust management subsystem, and integrability with simulators for real-time and protocol-flexible network simulation. By embedding trust management directly within each ROS 2 container and leveraging Kubernetes, we overcome ROS 2’s security limitations by enabling real-time monitoring and machine learning-driven anomaly detection (via an autoencoder trained on custom data), facilitating the isolation or removal of suspicious nodes. Additionally, Kubernetes policies allow seamless scaling and enforcement of trust-based
Tinker, NoahBoone, JuliaWang, Kuang-Ching
The automotive industry’s systems and over-the-air (OTA) updates have vulnerabilities in its software supply chain (SSC). Although frameworks like Uptane have improved OTA security, gaps remain in ensuring software integrity and provenance. In this paper, we examine challenges securing the automotive SSC and introduce a framework, GUIXCHAIN, that integrates version control, reproducible builds, blockchain technology, and software bills of materials (SBoMs) for transparency, auditability, and resilience. Reproducible builds guarantee identical resulting binaries when compiling the same source code in different environments, as any deviation in the final output indicates a potential compromise in the build process, such as malware injection. Our preliminary study shows Guixchain’s use of reproducible builds ensures consistent and integrity-secured software across various build environments. The blockchain provides forensic capabilities, offering a history of the what, who and where of
Aideyan, IwinosaPesé, Mert D.Brooks, Richard
Data security remains an issue of the utmost concern in contested environments. Mechanisms such as data encryption, beam-forming antennas, and frequency-hopping radio have emerged to mitigate some of the concerns in radio-frequency (RF) communications, but they do not remove all risk. Consequently, there is still a consistent appetite for alternative solutions. This paper presents a case for the use of the free-space optical (FSO) communications technology ImpLi-Fi as one such alternative. FSO communication is promising because of the ease with which the signal beam may be steered and limited, making detection and interception more difficult than with RF, and ImpLi-Fi in particular is desirable for its exceptional outdoor performance and ease of integration into existing light sources. The paper briefly illustrates the origins of the contested logistics (CL) problem and CL use cases for secure communication channels, before describing the ImpLi-Fi technology in some detail; exploring
Brzozowski, AaronReimann, JethroLakshmanan, SridharMarrero, Pedro “Pete”Moyer, Benjamin D.
The scope of the analysis is on the GlobalPlatform Secure Element (SE) and Trusted Execution Environment (TEE) standard specifications correspondence to SAE J3101 recommended practices. This analysis includes focuses on the platform specifications but not the scope of any future security application/applets. Both of these GlobalPlatform specifications have associated protection profiles to validate compliance, although GlobalPlatform does not currently have any specific SAE J3101 protection profiles. GlobalPlatform has communicated that it is assessing whether or not to develop application-level protection profiles to more explicitly cover the remaining requirements of SAE J3101 in order to allow for standardized testing and certification of complete solutions.
Vehicle Electrical System Security Committee
This article introduces a comprehensive cooperative navigation algorithm to improve vehicular system safety and efficiency. The algorithm employs surrogate optimization to prevent collisions with cooperative cruise control and lane-keeping functionalities. These strategies address real-world traffic challenges. The dynamic model supports precise prediction and optimization within the MPC framework, enabling effective real-time decision-making for collision avoidance. The critical component of the algorithm incorporates multiple parameters such as relative vehicle positions, velocities, and safety margins to ensure optimal and safe navigation. In the cybersecurity evaluation, the four scenarios explore the system’s response to different types of cyberattacks, including data manipulation, signal interference, and spoofing. These scenarios test the algorithm’s ability to detect and mitigate the effects of malicious disruptions. Evaluate how well the system can maintain stability and avoid
Khan, Rahan RasheedHanif, AtharAhmed, Qadeer
With many stakeholders involved, and major investments supporting it, the advancements in automated driving (AD) are undoubtedly there. Generally speaking, the motivation for advancing AD is driver convenience and road safety. Regarding the development of AD, original equipment manufacturers, technology start-ups, and AD systems developers have taken different approaches for automated vehicles (AVs). Some manufacturers are on the path toward stand-alone vehicles, mostly relying on onboard sensors and intelligence. On the other hand, the connected, cooperative, and automated mobility (CCAM) approach relies on additional communication and information exchange to ensure safe and secure operation. CCAM holds great potential to improve traffic management, road safety, equity, and convenience. In both approaches, there are increasingly large amounts of data generated and used for AD functions in perception, situational awareness, path prediction, and decision-making. The use of artificial
Van Schijndel-de Nooij, MargrietBeiker, Sven
This document specifically pertains to cybersecurity for vehicles. It has been developed by SAE International (SAE) Committee Technical Committee on Vehicle Electrical and Electronic Systems, “Cybersecurity Testing Task Force,” a subcommittee of SAE Committee, “Vehicle Cybersecurity Systems Engineering Committee.” This committee is authorized under the scope and authority of the SAE Electronic Design Automation Steering Committee, which is organized under the scope and authority of the SAE Electrical Systems Committee (also known as the Electrical Systems Group), which is directly under the scope and authority of the SAE Motor Vehicle Council. The SAE Motor Vehicle Council’s stated scope of influence and authority, as defined by SAE, includes, “passenger car and light truck.” By definition, this excludes motorcycles, certain trailers, heavy trucks, buses, snowmobiles, watercraft, marine vessels, off-road, multi-purpose vehicles, certain other specialty vehicles, and aircraft.
Vehicle Cybersecurity Systems Engineering Committee
The aircraft cabin plays a crucial role in airline differentiation strategies, particularly when introducing novel, data-driven services. These services aim to enhance the passenger experience during the flight and to improve cabin crew efficiency in order to reduce workload and ensure continued growth of airline revenue. Digitalization and extensive exchange of information across the entire aircraft transport system have emerged as key enablers for these services. The development of aircraft and aircraft systems that realize these services is characterized by a multi-level development process. Various development levels are considered to initially identify the functions of an aircraft in the air transport system, refine its systems and break them down into their components until a level of detail is reached that allows the implementation of the component functions. In addition to the high complexity, a major challenge in this development is to ensure traceability and consistency
Blecken, MarvinHintze, HartmutGiertzsch, FabianGod, Ralf
Airworthiness certification of aircraft requires an Airworthiness Security Process (AWSP) to ensure safe operation under potential unauthorized interactions, particularly in the context of growing cyber threats. Regulatory authorities mandate the consideration of Intentional Unauthorized Electronic Interactions (IUEI) in the development of aircraft, airborne software, and equipment. As the industry increasingly adopts Model-Based Systems Engineering (MBSE) to accelerate development, we aim to enhance this effort by focusing on security scope definitions – a critical step within the AWSP for security risk assessment that establishes the boundaries and extent of security measures. However, our findings indicate that, despite the increasing use of model-based tools in development, these security scope definitions often remain either document-based or, when modeled, are presented at overly abstract levels, both of which limit their utility. Furthermore, we found that these definitions
Hechelmann, AdrianMannchen, Thomas
Aircraft cabin management is characterized by operational and business processes. Both are defined as a logical sequence of activities that occur during the flight. While the operational process includes activities to ensure flight safety, such as take-off, cruise and landing, the business process activities are related to adding value to the customer, i.e. the passenger. They are to be certified by the authority as a part of the aircraft type certification. These processes are defined by the airline and are described as part of the airline’s business model. While the scope of operational processes for passenger safety within the aircraft cabin should remain as unchanged as possible, the increasing competitive pressure on airlines is leading to a constantly rising number of services in the cabin. To prevent compromising cabin safety from increased cabin crew workload during the cruise phase, there is a growing trend toward digitizing operational and business processes. The digitized
Hintze, HartmutBlecken, MarvinGod, RalfPereira, Daniel
Abdul Hamid, Umar ZakirEastman, Brittany
Today’s vehicle architectures build trust on a framework that is static, binary and rigid; tomorrow’s software defined vehicle architectures require a trust model that is dynamic, nuanced, and adaptive. The Zero Trust paradigm supports this dynamic need, but current implementations focus on protecting information, not considering the challenges that automobiles face interacting with the physical world. We propose expanding Zero Trust for cyber-physical systems by weighing the potential safety impact of taking action based on information provided against the amount of trust in the message and develop a method to evaluate the effectiveness of this strategy. This strategy offers a potential solution to the problems of implementing real-time responses to active attacks over vehicle lifetime.
Kaster, RobertMa, Di
Security flaws in automotive software have significant consequences. Modern automotive engineers must assess software not only for performance and reliability but also for safety and security. This paper presents a tool to verify software for safety and security. The tool was originally developed for the Department of Defense (DoD) to detect cybersecurity vulnerabilities in legacy safety-critical software with tight performance constraints and a small memory footprint. We show how the tool and techniques developed for verifying legacy safety-critical software can be applied to automotive and embedded software using real-world case studies. We also discuss how this tool can be extended for software comprehension.
Awadhutkar, PayasTamrawi, AhmedSauceda, Jeremias
The rapid development of intelligent and connected vehicles is transforming them into data-rich information carriers, which generate and store vast amounts of sensitive information. However, the frequent sharing of resources within these vehicles poses substantial risks to user privacy and data security. Should sensitive resources be accessed maliciously, the consequences could be severe, leading to significant threats to the safety, property, and reputation of both drivers and passengers. To address these risks, this paper proposes an adaptive risk-based access control with Trusted Execution Environment (TEE) specifically designed for vehicles, aimed at managing and restricting access permissions based on risk assessments. Firstly, this paper designs an adaptive risk model in accordance with ISO/SAE 21434, taking into account factors such as the security levels of subjects and objects, context, and the risk history of subjects to separately quantify threats and impacts. By adjusting
Luo, FengLi, ZhihaoWang, JiajiaLuo, Cheng
SAE J1939 is a CAN-based standard used for connecting various ECUs together within a vehicle. There are also some related protocols sharing many of the features of SAE J1939 across other industries including ISO11783, RVC and NMEA 2000. The standard has enabled the easy integration of electronic devices into a vehicle. However, as with all CAN-based protocols, several vulnerabilities to cyberattacks have been identified and are discussed in this paper. Many are at the CAN-level, whilst others are in common with those protocols from the SAE J1939 family of protocols. This paper reviews the known vulnerabilities that have been identified with the SAE J1939 protocol at CAN and J1939-levels, along with proposed mitigation strategies that can be implemented in software. At the CAN-level, the weaknesses include ways to spoof the network by exploiting parts of the protocol. Denial of Service is also possible at the CAN-level. At the SAE J1939-level, weaknesses include Denial of Service type
Quigley, Christopher
The added connectivity and transmission of personal and payment information in electric vehicle (EV) charging technology creates larger attack surfaces and incentives for malicious hackers to act. As EV charging stations are a major and direct user interface in the charging infrastructure, ensuring cybersecurity of the personal and private data transmitted to and from chargers is a key component to the overall security. Researchers at Southwest Research Institute® (SwRI®) evaluated the security of direct current fast charging (DCFC) EV supply equipment (EVSE). Identified vulnerabilities included values such as the MAC addresses of both the EV and EVSE, either sent in plaintext or encrypted with a known algorithm. These values allowed for reprogramming of non-volatile memory of power-line communication (PLC) devices as well as the EV’s parameter information block (PIB). Discovering these values allowed the researchers to access the IPv6 layer on the connection between the EV and EVSE
Kozan, Katherine
Items per page:
1 – 50 of 588