Answer To: Course Paper A systematic Literature review paper on security policies Guidelines · There are two...
Anju Lata answered on Jun 10 2021
Running Head: Security Policies Implementation in Automobile Industry
Security Policies Implementation in Automobile Industry 9
Topic: SLR on Security Policies Implementation in Automobile Industry
Identifying the Research Question
As the interconnectivity of modern cars is increasing, the information security standards for automobiles emphasize more on functional safety and protection. Existing quality systems may be extended to identify and manage risks. According to PICO framework, the Problem in this context is –lack of the security of automobile systems, Intervention is- to include the IT systems in Automobile industry, C is Comparison of automobiles with improved security policies to earlier automobiles, and O is Outcome- which is better security in Automobiles through use of technology.
Research Question is: How the implementation of Security policies may improve the functional safety of modern cars or automobiles?
Inclusion & Exclusion Criteria
The literature resources from date 2014 to 2019 were sought. Only the conference papers and journals were included which were discussing the Security policies and their implementation , the security threats and their solutions. Non Journals and non conference articles are excluded, along with all the websites and digital sources of information are excluded. Only the articles published in English language were searched and the articles in other languages were excluded to save unnecessary translation costs.
Search Strategy
The data was searched using the keywords (Security Policy OR Security Policies) AND ( “Threat” OR “Safety”) AND (“Automobile” OR “car”); The digital libraries consulted during the SLR are Google Scholar, Science Direct.
Methodology
The sample size was not mentioned in the articles specifically as the search was technology based. As per the PRISMA evaluation, the search retrieved 6550 articles, through the search of Google Scholar and Science Direct databases. The screening of abstracts eliminated 350 duplicate articles and 5320 studies were eliminated due to absence of any security based intervention for the automobile industry. Over the eligibility criteria based on title and abstract, 880 studies were assessed. 870 studies were removed from the review due to several other causes. Few of them were not sufficient in illustrating the security policies and their implementation. Few of them were not peer reviewed while few of them were focusing on other policies of automobiles which did not include security aspect. There was no restriction on the basis of country, as the study is mainly aimed to explore the security policies.
After the evaluation and screening, mere 10 studies cleared the eligibility criteria and were included in the final review of literature.
The Summary of Journals Retrieved
S.No.
Reference
The Threat/ Protocol
Summary of Article/ Technology
1
Macher, G., Messnarz, R., Armengaud, E., Riel, A.,Brenner, E. & Kreiner, C. (2017). Integrated Safety and Security Development in the Automotive Domain. 10.4271/2017-01-1661.
Threat Analysis and Risk Assessment (TARA), ISO26262 Ed 2.0 and J3061
There is a need of integrated and systematic approach to cybersecurity design and functional safety of electronic automobiles
2
Engoulou, RG, Bellaïche, M, Pierre, S.(2014). VANET security surveys. Comp Comm 2014; 44: 1–13.
Denial Of Service
Signature based authentication and Bit Commitment. Trustworthiness of nodes and digital signatures. SEAD (Secure and Efficient Ad hoc Distance).
3
Eiza, MH & Ni, Q. (2017). Driving with sharks: rethinking connected vehicles with vehicle cybersecurity. IEEE Vehic Tech Magazine 2017; 12: 45–51.
Cybersecurity Threats
Cyber security threats such as on board diagnostics, mobile app threats and malwares.
4
Contreras, J, Zeadally, S, Guerrero-Ibanez, JA. (2017). Internet of vehicles: architecture, protocols, and security. IEEE Internet Things J ; 5: 3701–3709.
Wormhole
Temporal Leash, Time stamp, Shared public Key Distribution, Trusted Hardware, TESLA with instant Key
5
Hamida, EB, Noura, H, & Znaidi, W. (2015) Security of cooperative intelligent transport systems: standards, threats analysis and cryptographic countermeasures. Electronics 2015; 4: 380–423.
Repay, Traffic Analysis
Changing Key Anonymously, Data Encryption, Algorithms like VIPER
6
Azees, M, Vijayakumar, P, & Deborah, LJ. (2017). A comprehensive survey on security services in vehicular ad-hoc networks. IET Intel Trans Syst; 10: 379–388.
Sybil Attack and Message Tampering
The Address Resolution Protocol like Detection of active position, RobSAD (Robust Method of Sybil Attack detection) , Validation Authority validating the real time entities.
7
Hasrouny, H, Samhat, AE, Bassil, C. (2017). VANet security challenges and solutions: a survey. Vehicular Comm ; 7: 7–20.
Fabrication Attacks
Secure ECDSA and SAODV
8
Mejri, MN, Ben-Othman, J, & Hamdi, M. (2014). Survey on VANET security challenges and possible cryptographic solutions. Vehic Comm 2014; 1(2): 53–66.
Jamming
Frequency Hopping Spread Spectrum, Cryptographic Algorithms, OFDM
9
Manvi, SS & Tangade, S. (2017).A survey on authentication schemes in VANETs for secured communication. Vehic Comm ; 9: 19–30.
GPS Spoofing
Position data signature tool to validate identity
10
Deeksha, N, Kumar, A, Bansal, M. (2017).A review on VANET security attacks and their countermeasure. In: 2017 4th international conference on signal processing, computing and control (ISPCC), Solan, India, 21–23 September 2017, pp.580–585. New York: IEEE.
Masquerading
Using Trusted software and hardware, ID based cryptography,CoPRA, and secure protocols for routing.
Literature Review
The standard approaches to functional safety in automobiles according to ISO26262, mainly emphasize on minimizing the hazard risks occurring due...