Security guidelines for cloud-based event data recorders in automotive environments |
|
Event data recorders (EDRs) are one of the most important components installed in automotive road vehicles to record vehicle status, vehicle movements and user inputs during crashes. By analysing the event data, the cause of a crash can be understood and eventually, used to improve safety in automotive environments. A data storage system for automated driving is also an important component to record data that will give a clear picture of the interactions between the driver and the automated driving system. Conventional event data recorders, however, record and manage the whole data locally and in this way, the data could come under threat of loss and destruction. Cloud computing is being considered as an enabler of network access to a scalable and elastic pool of shareable physical or virtual resources with self-service provisioning and administration on-demand. Industries such as the aviation industry are already attempting to apply cloud services to event data recording systems to increase safety in the aviation environment. According to the current trend of connectivity among vehicles, EDRs and the data storage systems for automated driving will be implemented to increase their overall safety. However, they have various vulnerabilities in the process of collecting, transferring, storing, managing, and using the recorded data according to the distinctive characteristics of the automotive environment. Therefore, it is necessary to study these vulnerabilities, security requirements, and use cases for cloud-based data recorders in automotive environments.Recommendation ITU-T X.1380 provides security guidelines for cloud-based data recorders in automotive environments. It describes threats, vulnerabilities, security requirements, and use cases for cloud-based data recorders in automotive environments. |
|
Citation: |
https://handle.itu.int/11.1002/1000/15106 |
Series title: |
X series: Data networks, open system communications and security X.1300-X.1499: Secure applications and services (II) X.1370-X.1399: Intelligent transportation system (ITS) security |
Approval date: |
2023-03-03 |
Provisional name: | X.edr-sec |
Approval process: | TAP |
Status: |
In force |
Maintenance responsibility: |
ITU-T Study Group 17 |
Further details: |
Patent statement(s)
Development history
[9 related work items in progress]
|
|
|
Ed. |
ITU-T Recommendation |
Status |
Summary |
Table of Contents |
Download |
1
|
X.1380 (03/2023)
|
In force
|
here
|
here
|
here
|
Title |
Approved on |
Download |
Guidelines for identity-based cryptosystems used for cross-domain secure communications
|
2023
|
here
|
Overview of hybrid approaches for key exchange with quantum key distribution
|
2022
|
here
|
Guidelines for security management of using artificial intelligence technology
|
2022
|
here
|
Successful use of security standards (2nd edition)
|
2020
|
here
|
Description of the incubation mechanism and ways to improve it
|
2020
|
here
|
Strategic approaches to the transformation of security studies
|
2020
|
here
|
|