2022
DOI: 10.3390/jcp2030037
|View full text |Cite
|
Sign up to set email alerts
|

Generic Patterns for Intrusion Detection Systems in Service-Oriented Automotive and Medical Architectures

Abstract: To implement new software functions and more flexible updates in the future as well as to provide cloud-based functionality, the service-oriented architecture (SOA) paradigm is increasingly being integrated into automotive electrical and electronic architecture (E/E architectures). In addition to the automotive industry, the medical industry is also researching SOA-based solutions to increase the interoperability of devices (vendor-independent). The resulting service-oriented communication is no longer fully s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3

Relationship

2
1

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 42 publications
0
4
0
Order By: Relevance
“…As this paper concentrates on a single device, the approach can be applied to interoperable medical devices in an SDC network (compare with the approach presented in [54]). The different devices in the network may observe each other, creating a more robust system of systems.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…As this paper concentrates on a single device, the approach can be applied to interoperable medical devices in an SDC network (compare with the approach presented in [54]). The different devices in the network may observe each other, creating a more robust system of systems.…”
Section: Discussionmentioning
confidence: 99%
“…If the estimated value is an anomaly, the UI raises an alarm triggered by the dynamic check. In a real-world OR scenario, we consider the backend system either as part of the hospital IT, as a dedicated cloud server provided by the device manufacturer, or as a supervision system directly in the OR, as proposed in [54]. In the latter scenario, the OR table would send the estimation data to the OR monitoring system via a SDC network, which has more computational resources than the embedded system of the OR table.…”
Section: Distributed Anomaly Detectionmentioning
confidence: 99%
“…Since the integration of SOA in the automotive and medical industries is increasing, the shift in communication patterns will also impact information security measures. In [ 67 ], the authors compared different SOA protocols in these industries and explained the underlying communication patterns, showing that both domains can exploit synergies. They also presented a methodology for developing an SOA-based Intrusion Detection System (IDS) by deriving relevant features.…”
Section: Related Workmentioning
confidence: 99%
“…The cybersecurity goals result in the following requirements (see also [ 19 , 67 ]): R1 Security properties (authenticity, integrity, confidentiality) must be ensured for network communication. R2 Patient harm resulting from the misuse of connectivity interfaces needs to always be avoided by the system.…”
Section: Heavens 20 Use Casementioning
confidence: 99%