Article
Version 1
Preserved in Portico This version is not peer-reviewed
Towards Security-by-design in Automotive Development Process
Version 1
: Received: 24 November 2020 / Approved: 25 November 2020 / Online: 25 November 2020 (14:00:18 CET)
Version 2 : Received: 8 December 2020 / Approved: 9 December 2020 / Online: 9 December 2020 (10:59:57 CET)
Version 2 : Received: 8 December 2020 / Approved: 9 December 2020 / Online: 9 December 2020 (10:59:57 CET)
How to cite: Jeong, S.; Kang, S.; Kim, S. Towards Security-by-design in Automotive Development Process. Preprints 2020, 2020110644. https://doi.org/10.20944/preprints202011.0644.v1 Jeong, S.; Kang, S.; Kim, S. Towards Security-by-design in Automotive Development Process. Preprints 2020, 2020110644. https://doi.org/10.20944/preprints202011.0644.v1
Abstract
Although traditional automotive development has mainly focused on functional safety, as the number of automotive hacking cases has increased due to the growing Internet connectivity of vehicles, security is also becoming more important. Accordingly, international organizations are preparing regulations to ensure security on automotive development by emphasizing the concept of security-by-design. The problem, however, is that no specific methodology has been suggested. In this paper, we propose specific security-by-design methodology for automotive development based on standards related to security-by-design. With our methodology, automotive manufacturers can consider aspects of trustworthiness, and can also respond to the upcoming cybersecurity regulation.
Keywords
Automotive development; Secure SDLC; Evidence-based standard; ISO/SAE 21434; UNECE cybersecurity regulation
Subject
Computer Science and Mathematics, Security Systems
Copyright: This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Comments (0)
We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.
Leave a public commentSend a private comment to the author(s)
* All users must log in before leaving a comment