Problemy Upravleniya
RUS  ENG    JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PACKAGE AMSBIB  
General information
Latest issue
Archive
Impact factor

Search papers
Search references

RSS
Latest issue
Current issues
Archive issues
What is RSS



Probl. Upr.:
Year:
Volume:
Issue:
Page:
Find






Personal entry:
Login:
Password:
Save password
Enter
Forgotten password?
Register


Probl. Upr., 2020, Issue 3, Pages 49–58 (Mi pu1191)  

Information technologies controls

Security threat assessment methods for unmanned vehicles in a smart city

V. G. Promyslov, K. V. Semenkov, E. Ph. Jharko

V.A. Trapeznikov Institute of Control Sciences of Russian Academy of Sciences, Moscow, Russia

Abstract: This paper presents a comprehensive cybersecurity model for autonomous vehicles (AV) system in framework of the smart city. We consider a problem of information flow description for a real AV system in the frame of discretional security models. The definition of safe data transfer for some types of information exchange between the system assets is presented. Some techniques for asset classification in frame of Biba and Bell-LaPadula models taking into account information links between the assets are introduced. We discuss the complexity and ambiguousness of the «integrity» definitions in relation to cybersecurity provision and emphasize the significance of its extension to the equipment and data processing methods. This approach is considered to shift the focus to the system analysis and system vulnerability removal and to develop the protection upon the system internal properties. Dynamical methods of cybersecurity architecture synthesis for transport systems with AVs are considered. The methods are shown to lessen computational complexity of system modelling. Instead of analyzing the complete security graph, one may analyze an induced subgraph for a given AV. The vertices (assets) of full security graph are excluded from the consideration if they are at a great «distance» from the analyzed AV. Formulae for the distance calculation are provided for some cases. Some examples of cybersecurity architecture analysis and synthesis for autonomous vehicles are presented.

Keywords: cybersecurity, autonomous vehicles, smart city, security architecture, classification, clustering, security graph, take-grant model.

Funding Agency Grant Number
Russian Foundation for Basic Research 19-29-06044_мк
The study (Sections 3 and 4) was performed with partial financial support of Russian Foundation of Basic Research, project no. 19-29-06044.


DOI: https://doi.org/10.25728/pu.2020.3.6

Full text: PDF file (328 kB)
First page: PDF file
References: PDF file   HTML file

UDC: 519.8
Received: 22.01.2020
Revised: 17.02.2020
Accepted:23.03.2020

Citation: V. G. Promyslov, K. V. Semenkov, E. Ph. Jharko, “Security threat assessment methods for unmanned vehicles in a smart city”, Probl. Upr., 2020, no. 3, 49–58

Citation in format AMSBIB
\Bibitem{ProSemZha20}
\by V.~G.~Promyslov, K.~V.~Semenkov, E.~Ph.~Jharko
\paper Security threat assessment methods for unmanned vehicles in a smart city
\jour Probl. Upr.
\yr 2020
\issue 3
\pages 49--58
\mathnet{http://mi.mathnet.ru/pu1191}
\crossref{https://doi.org/10.25728/pu.2020.3.6}


Linking options:
  • http://mi.mathnet.ru/eng/pu1191
  • http://mi.mathnet.ru/eng/pu/v3/p49

    SHARE: VKontakte.ru FaceBook Twitter Mail.ru Livejournal Memori.ru


    Citing articles on Google Scholar: Russian citations, English citations
    Related articles on Google Scholar: Russian articles, English articles
  • Проблемы управления
    Number of views:
    This page:46
    References:3
    First page:4

     
    Contact us:
     Terms of Use  Registration to the website  Logotypes © Steklov Mathematical Institute RAS, 2022