{"title":"Securing an MQTT-based Traffic Light Perception System for Autonomous Driving","authors":"A. O. Affia, Raimundas Matulevičius","doi":"10.1109/CSR51186.2021.9527989","DOIUrl":null,"url":null,"abstract":"In this paper, we follow a security-by-design method to implement a secure MQTT-based traffic light perception system for autonomous driving vehicles. This security-by-design method is supported by a security risk management perspective where we analyse security threat information from existing literature as input to evaluate the MQTT assets, security risks and risk treatment decisions at the design phase. We also assess the security of the implemented MQTT system using security tools for MQTT security testing. Thus, showing the need for iterative security risk management as security gaps were identified that would pose challenges especially for decisions on scaling the MQTT system for autonomous driving.","PeriodicalId":253300,"journal":{"name":"2021 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"212 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE International Conference on Cyber Security and Resilience (CSR)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSR51186.2021.9527989","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
In this paper, we follow a security-by-design method to implement a secure MQTT-based traffic light perception system for autonomous driving vehicles. This security-by-design method is supported by a security risk management perspective where we analyse security threat information from existing literature as input to evaluate the MQTT assets, security risks and risk treatment decisions at the design phase. We also assess the security of the implemented MQTT system using security tools for MQTT security testing. Thus, showing the need for iterative security risk management as security gaps were identified that would pose challenges especially for decisions on scaling the MQTT system for autonomous driving.