Administrator by China Associction for Science and Technology
Sponsored by China Society of Automotive Engineers
Published by AUTO FAN Magazine Co. Ltd.

Automotive Engineering ›› 2023, Vol. 45 ›› Issue (9): 1553-1562.doi: 10.19562/j.chinasae.qcgc.2023.ep.004

Special Issue: 智能网联汽车技术专题-控制2023年

Previous Articles     Next Articles

Quantitative Evaluation and Analysis of On-board Network Components Risk Rate Based on AFC-TARA

Zheng Zuo1,Yunpeng Wang1,Bin Ma1,2,Bosong Zou3,Yaoguang Cao4,Shichun Yang1()   

  1. 1.School of Transportation Science and Engineering,Beihang University,Beijing  102206
    2.College of Communication Engineering,Jilin University,Changchun  130022
    3.China Software Testing Center,Beijing  100038
    4.Research Institute for Frontier Science,Beihang University,Beijing  102206
  • Received:2022-09-08 Revised:2022-10-09 Online:2023-09-25 Published:2023-09-23
  • Contact: Shichun Yang E-mail:yangshichun@buaa.edu.cn

Abstract:

The first step of information security design is threat analysis and risk assessment (TARA), which determines security requirements and objectives, and provides a basis for the forward development of information security and the repair of security vulnerabilities. However, the current TARA can only evaluate the impact of malicious attack and security vulnerabilities, which can’t support quantitative evaluation of the effectiveness of protection strategies. Therefore, an attack and fix combined threat analysis and risk assessment (AFC-TARA) method is proposed in this paper. By converting the security state of the system-level on-board network architecture into a continuous-time Markov chain model, and associating the vulnerability mining, vulnerability repair and security defense strategy with the transition rate, a system-level on-board network architecture security assessment and analysis that comprehensively considers attack variables and defense variables are finally realized.

Key words: information security, intelligent connected vehicles, threat analysis and risk assessment, Markov model, malicious attack, security protection