747 research outputs found
B-FERL: Blockchain based Framework for Securing Smart Vehicles
The ubiquity of connecting technologies in smart vehicles and the incremental
automation of its functionalities promise significant benefits, including a
significant decline in congestion and road fatalities. However, increasing
automation and connectedness broadens the attack surface and heightens the
likelihood of a malicious entity successfully executing an attack. In this
paper, we propose a Blockchain based Framework for sEcuring smaRt vehicLes
(B-FERL). B-FERL uses permissioned blockchain technology to tailor information
access to restricted entities in the connected vehicle ecosystem. It also uses
a challenge-response data exchange between the vehicles and roadside units to
monitor the internal state of the vehicle to identify cases of in-vehicle
network compromise. In order to enable authentic and valid communication in the
vehicular network, only vehicles with a verifiable record in the blockchain can
exchange messages. Through qualitative arguments, we show that B-FERL is
resilient to identified attacks. Also, quantitative evaluations in an emulated
scenario show that B-FERL ensures a suitable response time and required storage
size compatible with realistic scenarios. Finally, we demonstrate how B-FERL
achieves various important functions relevant to the automotive ecosystem such
as trust management, vehicular forensics and secure vehicular networks.Comment: 11 Pages, 8 Figure
Federated blockchain-based tracking and liability attribution framework for employees and cyber-physical objects in a smart workplace
The systematic integration of the Internet of Things (IoT) and Cyber-Physical Systems (CPS) into the supply chain to increase operational efficiency and quality has also introduced new complexities to the threat landscape. The myriad of sensors could increase data collection capabilities for businesses to facilitate process automation aided by Artificial Intelligence (AI) but without adopting an appropriate Security-by-Design framework, threat detection and response are destined to fail. The emerging concept of Smart Workplace incorporates many CPS (e.g. Robots and Drones) to execute tasks alongside Employees both of which can be exploited as Insider Threats. We introduce and discuss forensic-readiness, liability attribution and the ability to track moving Smart SPS Objects to support modern Digital Forensics and Incident Response (DFIR) within a defence-in-depth strategy. We present a framework to facilitate the tracking of object behaviour within Smart Controlled Business Environments (SCBE) to support resilience by enabling proactive insider threat detection. Several components of the framework were piloted in a company to discuss a real-life case study and demonstrate anomaly detection and the emerging of behavioural patterns according to objects' movement with relation to their job role, workspace position and nearest entry or exit. The empirical data was collected from a Bluetooth-based Proximity Monitoring Solution. Furthermore, a key strength of the framework is a federated Blockchain (BC) model to achieve forensic-readiness by establishing a digital Chain-of-Custody (CoC) and a collaborative environment for CPS to qualify as Digital Witnesses (DW) to support post-incident investigations
Networked world: Risks and opportunities in the Internet of Things
The Internet of Things (IoT) â devices that are connected to the Internet and collect and use data to operate â is about to transform society. Everything from smart fridges and lightbulbs to remote sensors and cities will collect data that can be analysed and used to provide a wealth of bespoke products and services. The impacts will be huge - by 2020, some 25 billion devices will be connected to the Internet with some studies estimating this number will rise to 125 billion in 2030. These will include many things that have never been connected to the Internet before. Like all new technologies, IoT offers substantial new opportunities which must be considered in parallel with the new risks that come with it. To make sense of this new world, Lloydâs worked with University College Londonâs (UCL) Department of Science, Technology, Engineering and Public Policy (STEaPP) and the PETRAS IoT Research Hub to publish this report. âNetworked worldâ analyses IoTâs opportunities, risks and regulatory landscape. It aims to help insurers understand potential exposures across marine, smart homes, water infrastructure and agriculture while highlighting the implications for insurance operations and product development. The report also helps risk managers assess how this technology could impact their businesses and consider how they can mitigate associated risks
A Systematic Literature Review on Automotive Digital Forensics: Challenges, Technical Solutions and Data Collection
A modern vehicle has a complex internal architecture and is wirelessly connected to the Internet, other vehicles, and the infrastructure. The risk of cyber attacks and other criminal incidents along with recent road accidents caused by autonomous vehicles calls for more research on automotive digital forensics. Failures in automated driving functions can be caused by hardware and software failures and cyber security issues. Thus, it is imperative to be able to determine and investigate the cause of these failures, something which requires trustable data. However, automotive digital forensics is a relatively new field for the automotive where most existing self-monitoring and diagnostic systems in vehicles only monitor safety-related events. To the best of our knowledge, our work is the first systematic literature review on the current research within this field. We identify and assess over 300 papers published between 2006 - 2021 and further map the relevant papers to different categories based on identified focus areas to give a comprehensive overview of the forensics field and the related research activities. Moreover, we identify forensically relevant data from the literature, link the data to categories, and further map them to required security properties and potential stakeholders. Our categorization makes it easy for practitioners and researchers to quickly find relevant work within a particular sub-field of digital forensics. We believe our contributions can guide digital forensic investigations in automotive and similar areas, such as cyber-physical systems and smart cities, facilitate further research, and serve as a guideline for engineers implementing forensics mechanisms
Society 5.0: A New Challenge to Legal Norms
Society 5.0 is a new term used to indicate the future world. This society is based on ubiquity, learning machines, the internet of things, big data, cloud computing, cryptography, and biometrics. All these technologies will be merged to create a new mode of life. The new way of life will inevitably influence human beingsâ values, concepts, and conduct. The result of these changes will consequently bring challenges to many legal areas. This paper addresses the challenges that brought society 5.0 to legal norms. It utilises the analytical approach to examine the capability of pre-existing legal norms to cope with new realities created by society 5.0. The paper analyses the legal implications of society 5.0 in their sociological context. It presents a jurisprudential vision to establish legal norms compatible with the new society. Three fundamental principles should be considered to establish new legal. First, social facts that trigger legal regulation can simultaneously occur in multiple places. Secondly, what the study called duality of legal rules will not survive in society 5.0 era. Third, the paper turns the spotlight on new intelligent systems which may introduce new law addressees
Blockchain-Based Land Registration System: A Conceptual Framework
Land registration authorities are frequently held accountable for the alleged mismanagement and manipulation of land records in various countries. Pakistanâs property records are especially vulnerable to falsification and corruption because of the countryâs poverty. Different parties therefore claim varying degrees of authority over a specific piece of land. Given the fact that this data has been consolidated, it has become significantly more vulnerable to security threats. The goal of decentralized system research has been to increase the reliability of these systems. In order to fix the flaws of centralized systems, blockchain-based decentralized systems are currently in development. By using significant land record registration models as the basis for this research, we hope to create a proof-of-concept system or framework for future use. Pakistanâs land registration agency will benefit from our proposed conceptual framework. For the Pakistani government to implement a decentralized land record registry system, we propose a conceptual framework that outlines the essential components.publishedVersio
A comprehensive survey of V2X cybersecurity mechanisms and future research paths
Recent advancements in vehicle-to-everything (V2X) communication have notably improved existing transport systems by enabling increased connectivity and driving autonomy levels. The remarkable benefits of V2X connectivity come inadvertently with challenges which involve security vulnerabilities and breaches. Addressing security concerns is essential for seamless and safe operation of mission-critical V2X use cases. This paper surveys current literature on V2X security and provides a systematic and comprehensive review of the most relevant security enhancements to date. An in-depth classification of V2X attacks is first performed according to key security and privacy requirements. Our methodology resumes with a taxonomy of security mechanisms based on their proactive/reactive defensive approach, which helps identify strengths and limitations of state-of-the-art countermeasures for V2X attacks. In addition, this paper delves into the potential of emerging security approaches leveraging artificial intelligence tools to meet security objectives. Promising data-driven solutions tailored to tackle security, privacy and trust issues are thoroughly discussed along with new threat vectors introduced inevitably by these enablers. The lessons learned from the detailed review of existing works are also compiled and highlighted. We conclude this survey with a structured synthesis of open challenges and future research directions to foster contributions in this prominent field.This work is supported by the H2020-INSPIRE-5Gplus project (under Grant agreement No. 871808), the âMinisterio de Asuntos EconĂłmicos y Transformacion Digitalâ and the European Union-NextGenerationEU in the frameworks of the âPlan de RecuperaciĂłn, TransformaciĂłn y Resilienciaâ and of the âMecanismo de RecuperaciĂłn y Resilienciaâ under references TSI-063000-2021-39/40/41, and the CHIST-ERA-17-BDSI-003 FIREMAN project funded by the Spanish National Foundation (Grant PCI2019-103780).Peer ReviewedPostprint (published version
- âŠ