Purpose of Autonomous Vehicle Security Model. Scope of Autonomous Vehicle Security Model. Composition of Autonomous Vehicle Security Model

EC9E90EC9CA8EC9E90EB8F99ECB0A820ECB0B8ECA1B0ED9598EB8A9420ED95ADEBAAA920EC889CEC849C
Autonomous vehicles are growing rapidly with the development of connectivity technology and sensor technology, and the autonomous vehicle security model is now important.

⃞  Purpose of Autonomous Vehicle Security Model

Self-driving cars are growing rapidly with the development of connectivity technology and sensor technology. Global vehicle manufacturers such as Google, GM, and Ford are actively developing self-driving cars, and Hyundai Motor Company also introduced self-driving cars at CES. has become.

Accordingly, service models utilizing self-driving vehicles such as unmanned shuttle, parking, and delivery are being actively developed. However, due to this convergence, cyber attacks that occurred in the existing ICT environment are being transferred to the automotive environment. Since the safety of a car is directly related to the safety of the driver and passengers as well as all objects on the road, it is necessary to be fully prepared to defend against cyber attacks on cars.

Currently, self-driving car services are not yet in a mature stage and focus on technology development, so preparation for cyber security is insufficient. Therefore, this study intends to present an autonomous vehicle security model based on the results of self-driving service surveys and vehicle/infrastructure vulnerability analysis.

This autonomous vehicle security model considers the following items.

• Scheme of security threats, attack routes, and damaged assets according to the composition of autonomous vehicles and related services

• Suggest security technologies and solutions needed to strengthen security based on the results of autonomous vehicle security threat analysis

⃞  Scope of Autonomous Vehicle Security Model

A total of 9 types of services were identified through the self-driving car service status survey, and the attack surface was identified through the Data Flow Diagram (DFD) for each service. However, since the detailed configuration of each service cannot be known through open data, and each service provider takes a different configuration, there is no common data flow. Therefore, among the identified services, except for the following two cases where security consulting was conducted, the remaining services identified simple DFDs and their threats.

• Self-driving shuttle

• Telematics service to provide autonomous driving service

For threats and mitigation measures for services other than the two cases, refer to “Chapter 4 Security Threats to Self-Driving Vehicles”.

⃞  Composition of Autonomous Vehicle Security Model

In this document, an ID is assigned to each item when deriving security requirements, security threats, and countermeasures. As shown in the figure below, Security Requirements were derived according to Security Threats, and a countermeasure (Security Concept) was developed. Therefore, an ID is assigned to each item in each chapter, and related IDs are marked on the right side of the table so that related items can be easily found.

%EC%9E%90%EC%9C%A8%EC%9E%90%EB%8F%99%EC%B0%A8%20%EC%B0%B8%EC%A1%B0%ED%95%98%EB%8A%94%20%ED%95%AD%EB%AA%A9%20%EC%88%9C%EC%84%9C
Order of Items Referring to Autonomous Vehicles
Identification ID values used in each chapter are summarized in the following table. For example, an identified STV01 (vehicle security threat) must have a vehicle security requirement (SRV), and may need to reference a vehicle countermeasure plan (SCV) to mitigate that threat and meet the requirements.

ᐆ vehicle security threats : Security Threats Vehicle

ᐆ Backend Infrastructure Security Threats : Security Threats Server, Security Threats Network, Security Threats DB

ᐆ Vehicle security requirements : Security Requirements Vehicle

ᐆ Backend Infrastructure Security Requirements : Security Requirements Server, Security Requirements Network, Security Requirements DB

ᐆ Vehicle countermeasures : Security Concept Vehicle

ᐆ Back-end infrastructure countermeasures : Security Concept Server, Security Concept Network, Security Concept DB

Source : Ministry of Science and ICT Korea Internet & Security Agency

 
 

답글 남기기

이메일 주소는 공개되지 않습니다. 필수 필드는 *로 표시됩니다