Advertisement

Workload Distribution for Supporting Anonymous Communications in Automotive Network

  • Mehran Alidoost NiaEmail author
  • Antonio Ruiz-Martínez
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 969)

Abstract

Automotive systems are widely upgraded with Internet-based applications. In these applications, we could be interested in preserving anonymity of communications and that senders (automotive system) could communicate in an anonymous way. For this purpose, we need to introduce the model of an anonymous communication system in automotive systems. The design of this system requires a workload model in the system. In this paper, we present how to distribute this workload in a Controller Area Network (CAN)-based automotive system so that anonymous communications are feasible at the same time we make sure sensitive jobs meet their deadlines. We proposed a systematic method in order to deal with incorporating anonymity service into the automotive system. The proposed system has been modelled and simulated using RTaW-Sim for a VOLVO XC90 car. The results show that this model can be applied successfully to automotive systems.

Keywords

Anonymous communication systems Privacy Automotive systems Cyber-physical systems security 

Notes

Acknowledgments

This work has been partially supported by project TIN2017-86885-R (Hacia la continuidad de servicios emergentes a partir de objetos inteligentes basados en IOT) and by the European Commission Horizon 2020 Programme under grant agreement number H2020-ICT-2014-2/671672 - SELFNET (Framework for Self-Organized Network Management in Virtualized and Software Defined Networks).

References

  1. 1.
    National Vulnerability Database, “CVSS Severity Distribution Over Time,” Annual report of NIST, Last updated January 2016Google Scholar
  2. 2.
    Nisch, P.: Security Issues in Modern Automotive Systems (2012). http://www.panisch.com
  3. 3.
    Koscher, K.: Securing embedded systems: analyses of modern automotive systems and enabling near-real time dynamic analysis. Doctor of Philosophy Thesis, University of Washington (2014)Google Scholar
  4. 4.
    Dingledine, R., Mathewson, N., Syverson, N.: Tor: the second-generation onion router. In: Proceedings of the 13th USENIX Security Symposium (2004)Google Scholar
  5. 5.
    Nia, M.A., Babulak, E., Fabian, B., Atani, R.E.: An analytical perspective to traffic engineering in anonymous communication systems. In: Progress in Computer Sciences and Information Technology International Conference, Malaysia, pp. 1–6 (2016)Google Scholar
  6. 6.
    Nia, M.A., Atani, R.E., Haghi, A.K.: Ubiquitous IoT structure via homogeneous data type modelling. In: 7th International Symposium on Telecommunications (IST), Tehran (2014)Google Scholar
  7. 7.
    Nia, M.A., Atani, R.E., Ruiz-Martínez, A.: Privacy enhancement in anonymous network channels using multimodality injection. Security Comm. Networks 8(16), 2917–2932 (2015)CrossRefGoogle Scholar
  8. 8.
    Bosch, “CAN Specification version 2.0”, Robert Bosch GmbH, Postfach 30 02 40, D-70442, Stuttgart (1991)Google Scholar
  9. 9.
    Fuchs, K., Herrmann, D., Federrath, H.: Workload modelling for mix-based anonymity services. Comput. Secur. 52, 221–233 (2015)CrossRefGoogle Scholar
  10. 10.
    Khan, D.A., Davis, R.I., Navet, N.: Schedulability Analysis of CAN with non-abortable transmission requests. In: Proceedings 16th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA 2011), 5–9 September (2011)Google Scholar
  11. 11.
    Koscher, K., et al.: Experimental security analysis of a modern automobile. In: Proceeding of IEEE Symposium on Security and Privacy, May 2010Google Scholar
  12. 12.
    Meumeu-Yomsi, P., Bertrand, D., Navet, N., Davis, R.: Controller Area Network (CAN): response time analysis with offsets. In: Proceedings of the 9th IEEE International Workshop on Factory Communication System, Germany (2012)Google Scholar
  13. 13.
    Nia, M.A., Ruiz-Martínez, A.: Systematic literature review on the state of the art and future research work in anonymous communications systems. Comput. Electr. Eng. 69, 497–520 (2017)Google Scholar
  14. 14.
    Ruiz-Martínez, A.: A survey on solutions and main free tools for privacy enhancing Web communications. J. Network Comput. Appl. 35(5), 1473–1492 (2012)CrossRefGoogle Scholar
  15. 15.
    Kelly, D., Raines, R., Baldwin, R., Grimaila, M., Mullins, B.: Exploring extant and emerging issues in anonymous networks: a taxonomy and survey of protocols and metrics. IEEE Commun. Surv. Tutorials 14(2), 579–606 (2012)CrossRefGoogle Scholar
  16. 16.
    Yang, M., Luo, J., Ling, Z., Fu, X., Yu, W.: De-anonymizing and countermeasures in anonymous communication networks. IEEE Comm. Magazine 53(4), 60–66 (2015)CrossRefGoogle Scholar
  17. 17.
    Li, B., Erdin, E., Gunes, M.H., Bebis, G., Shipley, T.: An overview of anonymity technology usage. Comput. Commun. 36(12), 1269–1283 (2013)CrossRefGoogle Scholar
  18. 18.
    Goldschlag, D.M., Reed, M.G., Syverson, P.F.: Hiding routing information. In: Information Hiding, pp. 137–150 (1996)CrossRefGoogle Scholar
  19. 19.
    Øverlier, L., Syverson, P.: Improving efficiency and simplicity of tor circuit establishment and hidden services. In: Privacy Enhancing Technologies, pp. 134–152 (2007)Google Scholar
  20. 20.
    Koscher, K., et al.: Experimental security analysis of a modern automobile. In: 2010 IEEE Symposium on Security and Privacy, pp. 447–462 (2010)Google Scholar
  21. 21.
    Al-kahtani, M.S.: Survey on security attacks in Vehicular Ad hoc Networks (VANETs). In: 6th International Conference on Signal Processing and Communication Systems (2012)Google Scholar
  22. 22.
    Mejri, M.N., Hamdi, M.: Recent advances in cryptographic solutions for vehicular networks. In: 2015 International Symposium on Networks, Computers and Communications (ISNCC), pp. 1–7 (2015)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.School of Electrical and Computer EngineeringUniversity of TehranTehranIran
  2. 2.Department of Information and Communications EngineeringFaculty of Computer ScienceMurciaSpain

Personalised recommendations