Vulnerability Analysis of Real-Time Operating Systems for Wireless Sensor Networks

  • M. RajeshEmail author
  • B. SreevidyaEmail author
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1089)


The faultless operation of systems which are safety-critical like the anti-lock braking system (ABS), fuel control system (especially during cruise control), traction control system, etc., is equally dependent on both the logical as well as the temporal correctness of the output generated, and hence, systems like these can be called as the real-time systems (RTS), specifically, hard real-time systems. In this paper, various security issues relevant to such automotive systems have been studied and tested. Based on the observations made, a feasibility study is done on using OSEK/VDX for wireless sensor network applications.


Automotive systems Connected car Security Wireless sensor network 


  1. 1.
    Yu, W.D., Baheti, D., Wai, J.: Real-Time Operating System Security. Computer Engineering Department, San Jose State University, San Jose, 95192-0180Google Scholar
  2. 2.
    Kiszka, J., Wagner, B.: Modelling security risks in real-time operating systems. In: 5th IEEE International Conference on Industrial Informatics (2007)Google Scholar
  3. 3.
    Lemieux, J.: Programming in the OSEK/VDX Environment. CMP Books, Lawrence, Kansas (2001)Google Scholar
  4. 4.
    Peter, H.F.: Real-time application development with OSEK: a review of the OSEK standards (2003)Google Scholar
  5. 5.
    Yoshikawa, M., Sugioka, K., Nozaki, Y., Asahi, K.: Secure in-vehicle systems against Trojan attacks. In: 14th International Conference on Computer and Information Science, pp. 29–33. IEEE/ACIS (2015)Google Scholar
  6. 6.
    Bécsi, T., Aradi, S., Gáspár, P.: Security issues and vulnerabilities in connected car systems. In: International Conference on Models and Technologies for Intelligent Transportation Systems (MT-ITS), pp. 477–482. IEEE (2015)Google Scholar
  7. 7.
    Sagstetter, F., Lukasiewycz, M., Steinhorst, S., Wolf, M., Bouard, A., Harris, W.R., Jha, S., Peyrin, T., Poschmann, A., Chakraborty, S.: Security challenges in automotive hardware/software architecture design. In: Design, Automation and Test in Europe Conference and Exhibition (DATE), pp. 458–463. IEEE (2013)Google Scholar
  8. 8.
    Whaiduzzaman, M., Sookhak, M., Gani, A., Buyya, R.: A survey on vehicular cloud computing. J. Netw. Comput. Appl. 40, 325–344 (2014)CrossRefGoogle Scholar
  9. 9.
    Pillai, A.S., Isha, T.B.: ERTSim: an embedded real-time task simulator for scheduling. In: IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), Madurai, India, pp. 724–727 (2013)Google Scholar
  10. 10.
    Pillai, A.S., Punnekkat, S., Isha, T.B.: Energy minimization in real time embedded systems by control of context switches. In: Proceedings of Second International Conference on Smart Technologies for Materials, Communication, Controls, Computing and Energy (ICS), Chennai, India, pp. 428–432 (2013)Google Scholar
  11. 11.
    Shantilal Patel, J., Chavda, V.M.: Security vulnerability and robust security requirements using key management in sensor network. Int. J. Grid Distrib. Comput. 7(3), 23–28 (2014)CrossRefGoogle Scholar
  12. 12.
    Chockalingam, S., Lallie, H.S.: Alarming! security aspects of the wireless vehicle: review. Intl J. Cyber-Secur. Digit. Forensics (IJCSDF) 200–208 (2014)Google Scholar
  13. 13.
    Han, K., Weimerskirch, A., Shin, K.G.: Automotive cyber security for in-vehicle communication. IOT Q. 6(1), 22–25 (2014)Google Scholar
  14. 14.
    Adib, F.M., Hajji, H.M.: VSpyware: spyware in VANETs. In: 35th Conference on Local Computer Networks (LCN), pp. 621–624. IEEE (2010)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringAmrita School of Engineering, Amrita Vishwa VidyapeethamBengaluruIndia

Personalised recommendations