Abstract
The purpose of this workshop contribution is the interaction between networked embedded systems (such as controllers, sensors and actuators within a motor vehicle) and how these can be simulated. It aims to assess the potential impacts of IT security incidents in advance and plan protective measures without having to build a complete prototype. The feasibility of recognizing and visualising possible dependencies and structural effects in a complex networked system with embedded components (in this example: A motor vehicle with CAN bus become more and more relevant. One exemplary reason is that in contrast to earlier times, now the vehicle manufacturers are acting just as a systems integrator of supply components. This could result in a leakage of the total understanding and a lost track of the networked system elements. This development is intensified by the growing number of control units, sensors and actuators, which make the complete testing of all system components and their dependencies almost impossible. Derived from this the need for a simulation model that represents these possible interactions as extensively as possible is obvious. In a first research step selected control devices on a CAN network, and related automotive sensors and actuators are modelled by simulation in order to simulate freely and selectable event sequences, e.g. to carry out as part of penetration testing to monitor possible weaknesses in the system and resulting interactions. On the latter, particular attention is given, as the security area is in the main application focus of this simulation.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Schramm, M.: Organic Computing - “Mr. Self-X ”- Wie Computer autonom werden. Bayern 2 (November 2010)
AnyLogic, http://www.xjtek.com/ (last access: September 23, 2011)
Zimmermann, W., Schmidgall, R.: Bussysteme in der Fahrzeugtechnik: Protokolle und Standards, 2nd edn. Vieweg, Wiesbaden (2006)
Bauer, H.: Kraftfahrtechnisches Taschenbuch. Vieweg (2003)
Bauer, H., Dietsche, K.H., Zabler, E., Crepin, J.: Sensoren im Kraftfahrzeug, Bosch. Gelbe Reihe (2007)
Hoppe, T., Dittmann, J., Müter, M.: Decision Model for Automotive intrusion detection systems. In: Automotive - Safety & Security 2010 Sicherheit und Zuverlässigkeit für automobile Informationstechnik, Stuttgart, Juni 22-23. Shaker Verlag, Aachen (2010)
Dittmann, J., Hoppe, T., Kiltz, S., Tuchscheerer, S.: Elektronische Manipulation von Fahrzeug- und Infrastruktursystemen: Gefährdungspotentiale für die Straßenverkehrssicherheit, Paperback, 92 pages. Wirtschaftsverlag N. W. Verlag für neue Wissenschaft (2011) ISBN 978-3869181158
Da: Zulieferer werden für die Automobilindustrie immer wichtiger (July 6, 2001), http://www.welt.de/print-welt/article461473/ (last access: July 15, 2012)
Kiltz, S., Hildebrand, M., Dittmann, J.: Forensische Datenarten und -analysen in automotiven Systemen. In: Horster, P. (ed.) D-A-CH Security 2009, Bochum, Deutschland, May 19-20, pp. 141–152 (2009) ISBN 978-3-00-027488-6
Hoppe, T., Holthusen, S., Tuchscheerer, S., Kiltz, S., Dittmann, J.: Sichere Datenhaltung im Automobil am Beispiel eines Konzepts zur forensisch sicheren Datenhaltung. In: Sicherheit 2010 - Sicherheit, Schutz und Zuverlässigkeit, 5, October 5-7, pp. S.153–S.164. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V (GI), Berlin (2010)
Tuchscheerer, S., Hoppe, T., Dittmann, J., Pukall, M., Adamczyk, H.: Herausforderungen an die Absicherung von IT Systemen in der Entwicklung, Betrieb und Wartung von Fahrzeugen. In: Forschung und Innovation - Magdeburg: Univ., insges. 9 S., 2011 Kongress: Magdeburger Maschinenbau-Tage; 10 (Magdeburg), Buchbeitrag, September 27-29 (2011) ISBN 978-3-940961-60-0
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kuhlmann, S., Fruth, J., Hoppe, T., Dittmann, J. (2012). Simulation of Structural Effects in Embedded Systems and Visualization of Dependencies According to an Intended Attack or Manipulation. In: Ortmeier, F., Daniel, P. (eds) Computer Safety, Reliability, and Security. SAFECOMP 2012. Lecture Notes in Computer Science, vol 7613. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33675-1_47
Download citation
DOI: https://doi.org/10.1007/978-3-642-33675-1_47
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-33674-4
Online ISBN: 978-3-642-33675-1
eBook Packages: Computer ScienceComputer Science (R0)