Abstract
Automotive systems are widely upgraded with Internet-based applications. In these applications, we could be interested in preserving anonymity of communications and that senders (automotive system) could communicate in an anonymous way. For this purpose, we need to introduce the model of an anonymous communication system in automotive systems. The design of this system requires a workload model in the system. In this paper, we present how to distribute this workload in a Controller Area Network (CAN)-based automotive system so that anonymous communications are feasible at the same time we make sure sensitive jobs meet their deadlines. We proposed a systematic method in order to deal with incorporating anonymity service into the automotive system. The proposed system has been modelled and simulated using RTaW-Sim for a VOLVO XC90 car. The results show that this model can be applied successfully to automotive systems.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
National Vulnerability Database, “CVSS Severity Distribution Over Time,” Annual report of NIST, Last updated January 2016
Nisch, P.: Security Issues in Modern Automotive Systems (2012). http://www.panisch.com
Koscher, K.: Securing embedded systems: analyses of modern automotive systems and enabling near-real time dynamic analysis. Doctor of Philosophy Thesis, University of Washington (2014)
Dingledine, R., Mathewson, N., Syverson, N.: Tor: the second-generation onion router. In: Proceedings of the 13th USENIX Security Symposium (2004)
Nia, M.A., Babulak, E., Fabian, B., Atani, R.E.: An analytical perspective to traffic engineering in anonymous communication systems. In: Progress in Computer Sciences and Information Technology International Conference, Malaysia, pp. 1–6 (2016)
Nia, M.A., Atani, R.E., Haghi, A.K.: Ubiquitous IoT structure via homogeneous data type modelling. In: 7th International Symposium on Telecommunications (IST), Tehran (2014)
Nia, M.A., Atani, R.E., Ruiz-Martínez, A.: Privacy enhancement in anonymous network channels using multimodality injection. Security Comm. Networks 8(16), 2917–2932 (2015)
Bosch, “CAN Specification version 2.0”, Robert Bosch GmbH, Postfach 30 02 40, D-70442, Stuttgart (1991)
Fuchs, K., Herrmann, D., Federrath, H.: Workload modelling for mix-based anonymity services. Comput. Secur. 52, 221–233 (2015)
Khan, D.A., Davis, R.I., Navet, N.: Schedulability Analysis of CAN with non-abortable transmission requests. In: Proceedings 16th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA 2011), 5–9 September (2011)
Koscher, K., et al.: Experimental security analysis of a modern automobile. In: Proceeding of IEEE Symposium on Security and Privacy, May 2010
Meumeu-Yomsi, P., Bertrand, D., Navet, N., Davis, R.: Controller Area Network (CAN): response time analysis with offsets. In: Proceedings of the 9th IEEE International Workshop on Factory Communication System, Germany (2012)
Nia, M.A., Ruiz-Martínez, A.: Systematic literature review on the state of the art and future research work in anonymous communications systems. Comput. Electr. Eng. 69, 497–520 (2017)
Ruiz-Martínez, A.: A survey on solutions and main free tools for privacy enhancing Web communications. J. Network Comput. Appl. 35(5), 1473–1492 (2012)
Kelly, D., Raines, R., Baldwin, R., Grimaila, M., Mullins, B.: Exploring extant and emerging issues in anonymous networks: a taxonomy and survey of protocols and metrics. IEEE Commun. Surv. Tutorials 14(2), 579–606 (2012)
Yang, M., Luo, J., Ling, Z., Fu, X., Yu, W.: De-anonymizing and countermeasures in anonymous communication networks. IEEE Comm. Magazine 53(4), 60–66 (2015)
Li, B., Erdin, E., Gunes, M.H., Bebis, G., Shipley, T.: An overview of anonymity technology usage. Comput. Commun. 36(12), 1269–1283 (2013)
Goldschlag, D.M., Reed, M.G., Syverson, P.F.: Hiding routing information. In: Information Hiding, pp. 137–150 (1996)
Øverlier, L., Syverson, P.: Improving efficiency and simplicity of tor circuit establishment and hidden services. In: Privacy Enhancing Technologies, pp. 134–152 (2007)
Koscher, K., et al.: Experimental security analysis of a modern automobile. In: 2010 IEEE Symposium on Security and Privacy, pp. 447–462 (2010)
Al-kahtani, M.S.: Survey on security attacks in Vehicular Ad hoc Networks (VANETs). In: 6th International Conference on Signal Processing and Communication Systems (2012)
Mejri, M.N., Hamdi, M.: Recent advances in cryptographic solutions for vehicular networks. In: 2015 International Symposium on Networks, Computers and Communications (ISNCC), pp. 1–7 (2015)
Acknowledgments
This work has been partially supported by project TIN2017-86885-R (Hacia la continuidad de servicios emergentes a partir de objetos inteligentes basados en IOT) and by the European Commission Horizon 2020 Programme under grant agreement number H2020-ICT-2014-2/671672 - SELFNET (Framework for Self-Organized Network Management in Virtualized and Software Defined Networks).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Nia, M.A., Ruiz-Martínez, A. (2019). Workload Distribution for Supporting Anonymous Communications in Automotive Network. In: Thampi, S., Madria, S., Wang, G., Rawat, D., Alcaraz Calero, J. (eds) Security in Computing and Communications. SSCC 2018. Communications in Computer and Information Science, vol 969. Springer, Singapore. https://doi.org/10.1007/978-981-13-5826-5_10
Download citation
DOI: https://doi.org/10.1007/978-981-13-5826-5_10
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-5825-8
Online ISBN: 978-981-13-5826-5
eBook Packages: Computer ScienceComputer Science (R0)