Working Paper Article Version 2 This version is not peer-reviewed

Towards Security-by-design in Automotive Development Process

Version 1 : Received: 24 November 2020 / Approved: 25 November 2020 / Online: 25 November 2020 (14:00:18 CET)
Version 2 : Received: 8 December 2020 / Approved: 9 December 2020 / Online: 9 December 2020 (10:59:57 CET)

How to cite: Jeong, S.; Kang, S.; Kim, S. Towards Security-by-design in Automotive Development Process. Preprints 2020, 2020110644 Jeong, S.; Kang, S.; Kim, S. Towards Security-by-design in Automotive Development Process. Preprints 2020, 2020110644

Abstract

Although traditional automotive development has mainly focused on functional safety, as the number of automotive hacking cases has increased due to the growing Internet connectivity of automotive control systems, security is also becoming more important. Accordingly, various international organizations are preparing cybersecurity regulations or standards to ensure security in automotive development by emphasizing the concept of security-by-design(i.e. security engineering) which emphasizes trustworthiness from the beginning of development. The problem, however, is that no specific methodology has been suggested. In this paper, we propose a specific security-by-design methodology for automotive development based on Secure System Development Life Cycle (secure SDLC) standards and evidence-based standards. Our methodology could be easily used in the actual field as it is more general and detailed than existing secure SDLC standards and research. Also, since it satisfies all requirements of United Nations Economic Commission for Europe (UNECE) regulation, automobile manufacturers could respond to the upcoming cybersecurity regulation with our methodology.

Subject Areas

Automotive development; Secure SDLC; Evidence-based standard; ISO/SAE 21434; UNECE cybersecurity regulation

Comments (1)

Comment 1
Received: 9 December 2020
Commenter: Seungyeon Jeong
Commenter's Conflict of Interests: Author
Comment: The Manuscript has been revised based on the editor's and reviewers' comments.
+ Respond to this comment

We encourage comments and feedback from a broad range of readers. See criteria for comments and our diversity statement.

Leave a public comment
Send a private comment to the author(s)
Views 0
Downloads 0
Comments 1
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.