协调智能车辆的安全需求

Madhusudan Singh, Shiho Kim
{"title":"协调智能车辆的安全需求","authors":"Madhusudan Singh, Shiho Kim","doi":"10.23919/ICCAS.2017.8204251","DOIUrl":null,"url":null,"abstract":"An intelligent vehicle (Self-driving) is an emerging research area. Presently, many industries, research organizations and universities are working on intelligent vehicles. Some researchers are working on security issues of intelligent vehicles (IV). Most of the researchers focus on static security (static security cannot adapt to the changes in the environment). Since the environment of IV is dynamically changing, the approach of static security is not feasible to provide reconcile cyber-security in IV. Reconciling systems evolve in a very uncertain environment and try to fulfill a business objective by sensing the environment, analyzing it and taking the best decision according to its requirements. In this paper, we discuss reconcile security requirements engineering to provide cyber-security in IV. To fulfill our objective, we use the goal modeling approach of RE, the Knowledge Acquisition in Automated Specification (KAOS) Model approach, and designed it using Objectiver tool to find the reconciling requirements. Self-reconciliation in requirement engineering is acquired by five building blocks such as Monitor, Analyze, Plan, Execute and Knowledge i.e. [MAPE-K] loop architecture, which provides the reconciling capabilities to our proposed reconciling requirements for cyber-security in IV.","PeriodicalId":140598,"journal":{"name":"2017 17th International Conference on Control, Automation and Systems (ICCAS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Reconcile security requirements for intelligent vehicles\",\"authors\":\"Madhusudan Singh, Shiho Kim\",\"doi\":\"10.23919/ICCAS.2017.8204251\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"An intelligent vehicle (Self-driving) is an emerging research area. Presently, many industries, research organizations and universities are working on intelligent vehicles. Some researchers are working on security issues of intelligent vehicles (IV). Most of the researchers focus on static security (static security cannot adapt to the changes in the environment). Since the environment of IV is dynamically changing, the approach of static security is not feasible to provide reconcile cyber-security in IV. Reconciling systems evolve in a very uncertain environment and try to fulfill a business objective by sensing the environment, analyzing it and taking the best decision according to its requirements. In this paper, we discuss reconcile security requirements engineering to provide cyber-security in IV. To fulfill our objective, we use the goal modeling approach of RE, the Knowledge Acquisition in Automated Specification (KAOS) Model approach, and designed it using Objectiver tool to find the reconciling requirements. Self-reconciliation in requirement engineering is acquired by five building blocks such as Monitor, Analyze, Plan, Execute and Knowledge i.e. [MAPE-K] loop architecture, which provides the reconciling capabilities to our proposed reconciling requirements for cyber-security in IV.\",\"PeriodicalId\":140598,\"journal\":{\"name\":\"2017 17th International Conference on Control, Automation and Systems (ICCAS)\",\"volume\":\"18 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 17th International Conference on Control, Automation and Systems (ICCAS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.23919/ICCAS.2017.8204251\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 17th International Conference on Control, Automation and Systems (ICCAS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.23919/ICCAS.2017.8204251","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

摘要

智能车辆(自动驾驶)是一个新兴的研究领域。目前,许多行业、研究机构和大学都在研究智能汽车。一些研究人员正在研究智能车辆的安全问题(四)。大多数研究人员关注的是静态安全(静态安全不能适应环境的变化)。由于IV的环境是动态变化的,静态安全的方法无法在IV中提供协调网络安全。协调系统在非常不确定的环境中进化,并试图通过感知环境,分析环境并根据其需求做出最佳决策来实现业务目标。在本文中,我们讨论了协调安全需求工程,以提供网络安全。为了实现我们的目标,我们使用了RE的目标建模方法,即自动规范中的知识获取(KAOS)模型方法,并使用objective - ver工具进行了设计,以找到协调需求。需求工程中的自协调是由五个构建块获得的,例如Monitor、Analyze、Plan、Execute和Knowledge,即[MAPE-K]循环体系结构,它为我们在第四章中提出的网络安全协调需求提供了协调能力。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Reconcile security requirements for intelligent vehicles
An intelligent vehicle (Self-driving) is an emerging research area. Presently, many industries, research organizations and universities are working on intelligent vehicles. Some researchers are working on security issues of intelligent vehicles (IV). Most of the researchers focus on static security (static security cannot adapt to the changes in the environment). Since the environment of IV is dynamically changing, the approach of static security is not feasible to provide reconcile cyber-security in IV. Reconciling systems evolve in a very uncertain environment and try to fulfill a business objective by sensing the environment, analyzing it and taking the best decision according to its requirements. In this paper, we discuss reconcile security requirements engineering to provide cyber-security in IV. To fulfill our objective, we use the goal modeling approach of RE, the Knowledge Acquisition in Automated Specification (KAOS) Model approach, and designed it using Objectiver tool to find the reconciling requirements. Self-reconciliation in requirement engineering is acquired by five building blocks such as Monitor, Analyze, Plan, Execute and Knowledge i.e. [MAPE-K] loop architecture, which provides the reconciling capabilities to our proposed reconciling requirements for cyber-security in IV.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信