Skip to main content

Workload Distribution for Supporting Anonymous Communications in Automotive Network

  • Conference paper
  • First Online:
  • 1409 Accesses

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 969))

Abstract

Automotive systems are widely upgraded with Internet-based applications. In these applications, we could be interested in preserving anonymity of communications and that senders (automotive system) could communicate in an anonymous way. For this purpose, we need to introduce the model of an anonymous communication system in automotive systems. The design of this system requires a workload model in the system. In this paper, we present how to distribute this workload in a Controller Area Network (CAN)-based automotive system so that anonymous communications are feasible at the same time we make sure sensitive jobs meet their deadlines. We proposed a systematic method in order to deal with incorporating anonymity service into the automotive system. The proposed system has been modelled and simulated using RTaW-Sim for a VOLVO XC90 car. The results show that this model can be applied successfully to automotive systems.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    http://www.realtimeatwork.com/software/rtaw-sim/.

References

  1. National Vulnerability Database, “CVSS Severity Distribution Over Time,” Annual report of NIST, Last updated January 2016

    Google Scholar 

  2. Nisch, P.: Security Issues in Modern Automotive Systems (2012). http://www.panisch.com

  3. Koscher, K.: Securing embedded systems: analyses of modern automotive systems and enabling near-real time dynamic analysis. Doctor of Philosophy Thesis, University of Washington (2014)

    Google Scholar 

  4. Dingledine, R., Mathewson, N., Syverson, N.: Tor: the second-generation onion router. In: Proceedings of the 13th USENIX Security Symposium (2004)

    Google Scholar 

  5. Nia, M.A., Babulak, E., Fabian, B., Atani, R.E.: An analytical perspective to traffic engineering in anonymous communication systems. In: Progress in Computer Sciences and Information Technology International Conference, Malaysia, pp. 1–6 (2016)

    Google Scholar 

  6. Nia, M.A., Atani, R.E., Haghi, A.K.: Ubiquitous IoT structure via homogeneous data type modelling. In: 7th International Symposium on Telecommunications (IST), Tehran (2014)

    Google Scholar 

  7. Nia, M.A., Atani, R.E., Ruiz-Martínez, A.: Privacy enhancement in anonymous network channels using multimodality injection. Security Comm. Networks 8(16), 2917–2932 (2015)

    Article  Google Scholar 

  8. Bosch, “CAN Specification version 2.0”, Robert Bosch GmbH, Postfach 30 02 40, D-70442, Stuttgart (1991)

    Google Scholar 

  9. Fuchs, K., Herrmann, D., Federrath, H.: Workload modelling for mix-based anonymity services. Comput. Secur. 52, 221–233 (2015)

    Article  Google Scholar 

  10. Khan, D.A., Davis, R.I., Navet, N.: Schedulability Analysis of CAN with non-abortable transmission requests. In: Proceedings 16th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA 2011), 5–9 September (2011)

    Google Scholar 

  11. Koscher, K., et al.: Experimental security analysis of a modern automobile. In: Proceeding of IEEE Symposium on Security and Privacy, May 2010

    Google Scholar 

  12. Meumeu-Yomsi, P., Bertrand, D., Navet, N., Davis, R.: Controller Area Network (CAN): response time analysis with offsets. In: Proceedings of the 9th IEEE International Workshop on Factory Communication System, Germany (2012)

    Google Scholar 

  13. Nia, M.A., Ruiz-Martínez, A.: Systematic literature review on the state of the art and future research work in anonymous communications systems. Comput. Electr. Eng. 69, 497–520 (2017)

    Google Scholar 

  14. Ruiz-Martínez, A.: A survey on solutions and main free tools for privacy enhancing Web communications. J. Network Comput. Appl. 35(5), 1473–1492 (2012)

    Article  Google Scholar 

  15. Kelly, D., Raines, R., Baldwin, R., Grimaila, M., Mullins, B.: Exploring extant and emerging issues in anonymous networks: a taxonomy and survey of protocols and metrics. IEEE Commun. Surv. Tutorials 14(2), 579–606 (2012)

    Article  Google Scholar 

  16. Yang, M., Luo, J., Ling, Z., Fu, X., Yu, W.: De-anonymizing and countermeasures in anonymous communication networks. IEEE Comm. Magazine 53(4), 60–66 (2015)

    Article  Google Scholar 

  17. Li, B., Erdin, E., Gunes, M.H., Bebis, G., Shipley, T.: An overview of anonymity technology usage. Comput. Commun. 36(12), 1269–1283 (2013)

    Article  Google Scholar 

  18. Goldschlag, D.M., Reed, M.G., Syverson, P.F.: Hiding routing information. In: Information Hiding, pp. 137–150 (1996)

    Chapter  Google Scholar 

  19. Øverlier, L., Syverson, P.: Improving efficiency and simplicity of tor circuit establishment and hidden services. In: Privacy Enhancing Technologies, pp. 134–152 (2007)

    Google Scholar 

  20. Koscher, K., et al.: Experimental security analysis of a modern automobile. In: 2010 IEEE Symposium on Security and Privacy, pp. 447–462 (2010)

    Google Scholar 

  21. Al-kahtani, M.S.: Survey on security attacks in Vehicular Ad hoc Networks (VANETs). In: 6th International Conference on Signal Processing and Communication Systems (2012)

    Google Scholar 

  22. Mejri, M.N., Hamdi, M.: Recent advances in cryptographic solutions for vehicular networks. In: 2015 International Symposium on Networks, Computers and Communications (ISNCC), pp. 1–7 (2015)

    Google Scholar 

Download references

Acknowledgments

This work has been partially supported by project TIN2017-86885-R (Hacia la continuidad de servicios emergentes a partir de objetos inteligentes basados en IOT) and by the European Commission Horizon 2020 Programme under grant agreement number H2020-ICT-2014-2/671672 - SELFNET (Framework for Self-Organized Network Management in Virtualized and Software Defined Networks).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mehran Alidoost Nia .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Nia, M.A., Ruiz-Martínez, A. (2019). Workload Distribution for Supporting Anonymous Communications in Automotive Network. In: Thampi, S., Madria, S., Wang, G., Rawat, D., Alcaraz Calero, J. (eds) Security in Computing and Communications. SSCC 2018. Communications in Computer and Information Science, vol 969. Springer, Singapore. https://doi.org/10.1007/978-981-13-5826-5_10

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-5826-5_10

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-5825-8

  • Online ISBN: 978-981-13-5826-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics