Cyber Security Requirements Engineering
Cyber Security Requirements Engineering
Cyber Security Requirements Engineering
Practice
Methods
Print Mail
Security is a quality attribute which interacts heavily with other such attributes, including availability,
safety, and robustness. It is the sum of all of the attributes of an information system or product which
contributes towards ensuring that processing, storing, and communicating of information sufficiently
protects confidentiality, integrity, and authenticity. Cyber security implies that it is not possible to do
anything with the processed or managed information which is not explicitly intended by the specification
of the embedded system [1] [2].
To better illustrate evolving cyber security needs, we will look to modern automotive systems. Figure 1
shows the interaction of functions in their distributed networks being an essential part for our today’s
modern infrastructures with their needs for safety and comfort. Besides the further development of
innovative sensors like radar and camera systems and the analysis of the signals in highly complex
systems, the connected cars will be a driving factor for tomorrow‘s innovation. Internet connections will
not only provide the need for information to the passenger - functions like eCall, communication
between cars, and car to infrastructure (vehicle2x) shows high potential for revolutionizing the individual
traffic. This includes the improvement of the traffic flow controlled by intelligent traffic lights, warnings
from roadside stations, or brake indication of adjacent cars. This builds the basis for enhanced driver
assistant systems and automated driving. But the connection to the outer world also bears the risk for
attacks to the car.
Figure 1 shows interworking for vehicle2x and external communication that are already available today
or will become available in the near future. Each connection to the car has a potential risk for an attack,
regardless whether it is wireless or wired - only the threat is different. The access through a connector is
only possible for a limited amount of cars, whereas a far field connection can be accessed from
anywhere in the world. But also near field connections play an important role, such as a tire pressure
monitoring system, Bluetooth, and wireless LAN. Security and reliability of these connections will be
essential for the acceptance and success of these systems. With the introduction of this technology
precautions must be taken to increase the reliability and to reduce the vulnerability to the system.
Functional safety needs cyber security. Based on the specific challenges of cyber security, OEMs and
suppliers have to realize an effective protection against manipulations of automotive electronic and
electric (E/E) systems. Key points in the development of protected E/E systems are the proper
identification of security requirements, the systematic realization of security functions, and a security
validation to demonstrate that security requirements have been met. The following items need to be
considered to achieve security in the car development process:
Standardized process models for a systematic approach which are anchored in the complete
development process. This starts in the requirements analysis phase, and continues through the
design and development to the test and integration of components and the network.
Reliable protocols that are state-of-the-art and meet long-term security demands. Related to
security, this is often combined with cryptographic keys. So a key management over the lifecycle
of the vehicle must be maintained.
In-vehicle networks and a system architecture that provide flexibility and scalability and are
designed with consideration of security aspects.