Security-Aware Design Methodology and Optimization for Automotive Systems
Chung-Wei Lin, Bowen Zheng, Qi Zhu, Alberto Sangiovanni-Vincentelli

Citation
Chung-Wei Lin, Bowen Zheng, Qi Zhu, Alberto Sangiovanni-Vincentelli. "Security-Aware Design Methodology and Optimization for Automotive Systems". ACM Transactions on Design Automation of Electronic Systems, September 2015.

Abstract
In this paper, we address both of security and safety requirements and solve security-aware design problems for the Controller Area Network (CAN) protocol and Time Division Multiple Access (TDMA) based protocols. To provide insights and guidelines for other similar security problems with limited resources and strict timing constraints, we propose a general security-aware design methodology to address security with other design constraints in a holistic framework and optimize design objectives. The security-aware design methodology is further applied to solve a security-aware design problem for Vehicle-to-Vehicle (V2V) communications with the Dedicated Short-Range Communication (DSRC) technology. Experimental results demonstrate the effectiveness of our approaches in system design without violating design constraints and indicate that it is necessary to consider security together with other metrics during design stages.

Electronic downloads


Internal. This publication has been marked by the author for TerraSwarm-only distribution, so electronic downloads are not available without logging in.
Citation formats  
  • HTML
    Chung-Wei Lin, Bowen Zheng, Qi Zhu, Alberto
    Sangiovanni-Vincentelli. <a
    href="http://www.terraswarm.org/pubs/590.html"
    >Security-Aware Design Methodology and Optimization for 
    Automotive Systems</a>, <i>ACM Transactions on
    Design Automation of Electronic Systems</i>, September
    2015.
  • Plain text
    Chung-Wei Lin, Bowen Zheng, Qi Zhu, Alberto
    Sangiovanni-Vincentelli. "Security-Aware Design
    Methodology and Optimization for  Automotive Systems".
    <i>ACM Transactions on Design Automation of Electronic
    Systems</i>, September 2015.
  • BibTeX
    @article{LinZhengZhuSangiovanniVincentelli15_SecurityAwareDesignMethodologyOptimizationForAutomotive,
        author = {Chung-Wei Lin and Bowen Zheng and Qi Zhu and
                  Alberto Sangiovanni-Vincentelli},
        title = {Security-Aware Design Methodology and Optimization
                  for  Automotive Systems},
        journal = {ACM Transactions on Design Automation of
                  Electronic Systems},
        month = {September},
        year = {2015},
        abstract = {In this paper, we address both of security and
                  safety requirements and solve security-aware
                  design problems for the Controller Area Network
                  (CAN) protocol and Time Division Multiple Access
                  (TDMA) based protocols. To provide insights and
                  guidelines for other similar security problems
                  with limited resources and strict timing
                  constraints, we propose a general security-aware
                  design methodology to address security with other
                  design constraints in a holistic framework and
                  optimize design objectives. The security-aware
                  design methodology is further applied to solve a
                  security-aware design problem for
                  Vehicle-to-Vehicle (V2V) communications with the
                  Dedicated Short-Range Communication (DSRC)
                  technology. Experimental results demonstrate the
                  effectiveness of our approaches in system design
                  without violating design constraints and indicate
                  that it is necessary to consider security together
                  with other metrics during design stages.},
        URL = {http://terraswarm.org/pubs/590.html}
    }
    

Posted by Barb Hoversten on 9 Jul 2015.
Groups: tools

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.