Abstract
Security assurance is the capacity of any teleinformatic system to demonstrate that the system is secure. It is provided by testing the system by an independent laboratory. Such an evaluation gives to the customer certainty that the system or product is secure enough for the intended use. In this paper we discuss the security assurance that the automotive sector requires to the 5G network for the secure communication of the Intelligent Transport System applications. In this case, the automotive sector takes the role of the customer of the network operator that provides connectivity of cars, trucks, bicycles, pedestrians and traffic infrastructure for creating vehicle to everything platform. Concretely, in this paper we (1) show new methodologies for evaluating network security, (2) provide a new strategy for the customer (automotive company) to select the underlying system based on network assurance levels, (3) survey security functionalities of a network devoted to automotive applications and demonstrate how automotive applications, 5G network and physical infrastructure, cooperate for enhancing security of the end-to-end system, and (4) provide example security evaluation results at different assurance levels. The results show the necessity of providing different levels of network assurance during the certification process in order that the automotive customer will be able to select the best products and sub-systems that may demonstrate (assure) enough security to the complete system.
| Original language | English |
|---|---|
| Pages (from-to) | 1-0 |
| Number of pages | 2 |
| Journal | IEEE Transactions on Intelligent Transportation Systems |
| DOIs | |
| Publication status | Accepted/In press - 2023 |
Keywords
- communication system security
- Intelligent transport systems (ITS)
- multi-criteria decision making
- multi-layer security
- security assurance
- security management
Fingerprint
Dive into the research topics of 'Multi-Layer Security Assurance of the 5G Automotive System Based on Multi-Criteria Decision Making'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver