Security-Aware Design Methodology and Optimization for Automotive Systems
Chung-Wei Lin, Bowen Zheng, Qi Zhu, Alberto Sangiovanni-Vincentelli

Citation
Chung-Wei Lin, Bowen Zheng, Qi Zhu, Alberto Sangiovanni-Vincentelli. "Security-Aware Design Methodology and Optimization for Automotive Systems". submitted to ACM Transactions on Design Automation of Electronic Systems (TODAES), November 2015.

Abstract
In this paper, we address both of security and safety requirements and solve security-aware design problems for the Controller Area Network (CAN) protocol and Time Division Multiple Access (TDMA) based protocols. To provide insights and guidelines for other similar security problems with limited resources and strict timing constraints, we propose a general security-aware design methodology to address security with other design constraints in a holistic framework and optimize design objectives. The security-aware design methodology is further applied to solve a security-aware design problem for Vehicle-to-Vehicle (V2V) communications with the Dedicated Short-Range Communication (DSRC) technology. Experimental results demonstrate the effectiveness of our approaches in system design without violating design constraints and indicate that it is necessary to consider security together with other metrics during design stages.

Electronic downloads


Internal. This publication has been marked by the author for TerraSwarm-only distribution, so electronic downloads are not available without logging in.
Citation formats  
  • HTML
    Chung-Wei Lin, Bowen Zheng, Qi Zhu, Alberto
    Sangiovanni-Vincentelli. <a
    href="http://www.terraswarm.org/pubs/696.html"
    >Security-Aware Design Methodology and Optimization for
    Automotive Systems</a>, <i>submitted to ACM
    Transactions on Design Automation of Electronic Systems
    (TODAES)</i>, November 2015.
  • Plain text
    Chung-Wei Lin, Bowen Zheng, Qi Zhu, Alberto
    Sangiovanni-Vincentelli. "Security-Aware Design
    Methodology and Optimization for Automotive Systems".
    <i>submitted to ACM Transactions on Design Automation
    of Electronic Systems (TODAES)</i>, November 2015.
  • BibTeX
    @article{LinZhengZhuSangiovanniVincentelli15_SecurityAwareDesignMethodologyOptimizationForAutomotive,
        author = {Chung-Wei Lin and Bowen Zheng and Qi Zhu and
                  Alberto Sangiovanni-Vincentelli},
        title = {Security-Aware Design Methodology and Optimization
                  for Automotive Systems},
        journal = {submitted to ACM Transactions on Design Automation
                  of Electronic Systems (TODAES)},
        month = {November},
        year = {2015},
        abstract = {In this paper, we address both of security and
                  safety requirements and solve security-aware
                  design problems for the Controller Area Network
                  (CAN) protocol and Time Division Multiple Access
                  (TDMA) based protocols. To provide insights and
                  guidelines for other similar security problems
                  with limited resources and strict timing
                  constraints, we propose a general security-aware
                  design methodology to address security with other
                  design constraints in a holistic framework and
                  optimize design objectives. The security-aware
                  design methodology is further applied to solve a
                  security-aware design problem for
                  Vehicle-to-Vehicle (V2V) communications with the
                  Dedicated Short-Range Communication (DSRC)
                  technology. Experimental results demonstrate the
                  effectiveness of our approaches in system design
                  without violating design constraints and indicate
                  that it is necessary to consider security together
                  with other metrics during design stages.},
        URL = {http://terraswarm.org/pubs/696.html}
    }
    

Posted by Elizabeth Coyne on 10 Nov 2015.
Groups: services

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.