Log your car: The non-invasive vehicle forensics

Digital forensics is becoming an important feature for many embedded devices. In automotive systems, digital forensics involves multiple electronic control units (ECUs) used to support the connected and intelligent vehicle’s technology. Digital evidence from these ECUs can be used in forensics...

وصف كامل

محفوظ في:
التفاصيل البيبلوغرافية
المؤلفون الرئيسيون: Mansor, Hafizah, Markantonakis, Konstantinos, Akram, Raja Naeem, Mayes, Keith, Gurulian, Iakovos, ,
التنسيق: Conference or Workshop Item
اللغة:English
منشور في: IEEE 2016
الموضوعات:
الوصول للمادة أونلاين:http://irep.iium.edu.my/58105/7/58105%20Log%20your%20car.pdf
http://irep.iium.edu.my/58105/
الوسوم: إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
id my.iium.irep.58105
record_format dspace
spelling my.iium.irep.581052019-08-09T08:02:01Z http://irep.iium.edu.my/58105/ Log your car: The non-invasive vehicle forensics Mansor, Hafizah Markantonakis, Konstantinos Akram, Raja Naeem Mayes, Keith Gurulian, Iakovos , T10.5 Communication of technical information Digital forensics is becoming an important feature for many embedded devices. In automotive systems, digital forensics involves multiple electronic control units (ECUs) used to support the connected and intelligent vehicle’s technology. Digital evidence from these ECUs can be used in forensics investigation and analysis. Such a mechanism can potentially facilitate crash investigation, insurance claims and crime investigation. Issues related to forensics include the authenticity, integrity and privacy of the data. In this paper, the security of the forensic process and data in automotive systems is analysed. We propose an efficient, secure, privacy-preserving and reliable mechanism to provide a forensics data collection and storage process. A diagnostic application for smart phones, DiaLOG, is incorporated in the proposed process that uses a secure protocol to communicate the collected forensic data to a secure cloud storage. The proposed protocol for communicating forensic data is implemented to measure performance results and formally analysed using Scyther and CasperFDR with no known attack found. IEEE 2016 Conference or Workshop Item PeerReviewed application/pdf en http://irep.iium.edu.my/58105/7/58105%20Log%20your%20car.pdf Mansor, Hafizah and Markantonakis, Konstantinos and Akram, Raja Naeem and Mayes, Keith and Gurulian, Iakovos and UNSPECIFIED (2016) Log your car: The non-invasive vehicle forensics. In: TrustCom 2016: The 15th IEEE International Conference on Trust, Security, and Privacy in Computing and Communications, 23rd-26th August 2016, Tianjin, China. 10.1109/TrustCom.2016.0164
institution Universiti Islam Antarabangsa Malaysia
building IIUM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider International Islamic University Malaysia
content_source IIUM Repository (IREP)
url_provider http://irep.iium.edu.my/
language English
topic T10.5 Communication of technical information
spellingShingle T10.5 Communication of technical information
Mansor, Hafizah
Markantonakis, Konstantinos
Akram, Raja Naeem
Mayes, Keith
Gurulian, Iakovos
,
Log your car: The non-invasive vehicle forensics
description Digital forensics is becoming an important feature for many embedded devices. In automotive systems, digital forensics involves multiple electronic control units (ECUs) used to support the connected and intelligent vehicle’s technology. Digital evidence from these ECUs can be used in forensics investigation and analysis. Such a mechanism can potentially facilitate crash investigation, insurance claims and crime investigation. Issues related to forensics include the authenticity, integrity and privacy of the data. In this paper, the security of the forensic process and data in automotive systems is analysed. We propose an efficient, secure, privacy-preserving and reliable mechanism to provide a forensics data collection and storage process. A diagnostic application for smart phones, DiaLOG, is incorporated in the proposed process that uses a secure protocol to communicate the collected forensic data to a secure cloud storage. The proposed protocol for communicating forensic data is implemented to measure performance results and formally analysed using Scyther and CasperFDR with no known attack found.
format Conference or Workshop Item
author Mansor, Hafizah
Markantonakis, Konstantinos
Akram, Raja Naeem
Mayes, Keith
Gurulian, Iakovos
,
author_facet Mansor, Hafizah
Markantonakis, Konstantinos
Akram, Raja Naeem
Mayes, Keith
Gurulian, Iakovos
,
author_sort Mansor, Hafizah
title Log your car: The non-invasive vehicle forensics
title_short Log your car: The non-invasive vehicle forensics
title_full Log your car: The non-invasive vehicle forensics
title_fullStr Log your car: The non-invasive vehicle forensics
title_full_unstemmed Log your car: The non-invasive vehicle forensics
title_sort log your car: the non-invasive vehicle forensics
publisher IEEE
publishDate 2016
url http://irep.iium.edu.my/58105/7/58105%20Log%20your%20car.pdf
http://irep.iium.edu.my/58105/
_version_ 1643619660519702528
score 13.251813