Log Your Car : The Non-invasive Vehicle Forensics. / Mansor, Hafizah; Markantonakis, Konstantinos; Akram, Raja; Mayes, Keith; Gurulian, Iakovos.

15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16). ed. / Yang Xiang; Kui Ren; Dengguo Feng. IEEE Computer Society, 2017. p. 974-982.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Published

Standard

Log Your Car : The Non-invasive Vehicle Forensics. / Mansor, Hafizah; Markantonakis, Konstantinos; Akram, Raja; Mayes, Keith; Gurulian, Iakovos.

15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16). ed. / Yang Xiang; Kui Ren; Dengguo Feng. IEEE Computer Society, 2017. p. 974-982.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Harvard

Mansor, H, Markantonakis, K, Akram, R, Mayes, K & Gurulian, I 2017, Log Your Car: The Non-invasive Vehicle Forensics. in Y Xiang, K Ren & D Feng (eds), 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16). IEEE Computer Society, pp. 974-982. https://doi.org/10.1109/TrustCom.2016.0164

APA

Mansor, H., Markantonakis, K., Akram, R., Mayes, K., & Gurulian, I. (2017). Log Your Car: The Non-invasive Vehicle Forensics. In Y. Xiang, K. Ren, & D. Feng (Eds.), 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16) (pp. 974-982). IEEE Computer Society. https://doi.org/10.1109/TrustCom.2016.0164

Vancouver

Mansor H, Markantonakis K, Akram R, Mayes K, Gurulian I. Log Your Car: The Non-invasive Vehicle Forensics. In Xiang Y, Ren K, Feng D, editors, 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16). IEEE Computer Society. 2017. p. 974-982 https://doi.org/10.1109/TrustCom.2016.0164

Author

Mansor, Hafizah ; Markantonakis, Konstantinos ; Akram, Raja ; Mayes, Keith ; Gurulian, Iakovos. / Log Your Car : The Non-invasive Vehicle Forensics. 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16). editor / Yang Xiang ; Kui Ren ; Dengguo Feng. IEEE Computer Society, 2017. pp. 974-982

BibTeX

@inproceedings{73ab28f1364c4d45a3f45ebb9e66eb7e,
title = "Log Your Car: The Non-invasive Vehicle Forensics",
abstract = "Digital forensics is becoming an important feature for many embedded devices. In automotive systems, digital forensics involves multiple electronic control units (ECUs) used to support the connected and intelligent vehicle{\textquoteright}s technology. Digital evidence from these ECUs can be used in forensics investigation and analysis. Such a mechanism can potentially facilitate crash investigation, insurance claims and crime investigation. Issues related to forensics include the authenticity, integrity and privacy of the data. In this paper, the security of the forensic process and data in automotive systems is analysed. We propose an efficient, secure, privacy- preserving and reliable mechanism to provide a forensics data collection and storage process. A diagnostic application for smart phones, DiaLOG, is incorporated in the proposed process that uses a secure protocol to communicate the collected forensic data to a secure cloud storage. The proposed protocol for communicating forensic data is implemented to measure performance results and formally analysed using Scyther and CasperFDR with no known attack found.",
author = "Hafizah Mansor and Konstantinos Markantonakis and Raja Akram and Keith Mayes and Iakovos Gurulian",
year = "2017",
month = feb
day = "9",
doi = "10.1109/TrustCom.2016.0164",
language = "English",
isbn = "978-1-5090-3206-8",
pages = "974--982",
editor = "Yang Xiang and Kui Ren and Dengguo Feng",
booktitle = "15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16)",
publisher = "IEEE Computer Society",

}

RIS

TY - GEN

T1 - Log Your Car

T2 - The Non-invasive Vehicle Forensics

AU - Mansor, Hafizah

AU - Markantonakis, Konstantinos

AU - Akram, Raja

AU - Mayes, Keith

AU - Gurulian, Iakovos

PY - 2017/2/9

Y1 - 2017/2/9

N2 - Digital forensics is becoming an important feature for many embedded devices. In automotive systems, digital forensics involves multiple electronic control units (ECUs) used to support the connected and intelligent vehicle’s technology. Digital evidence from these ECUs can be used in forensics investigation and analysis. Such a mechanism can potentially facilitate crash investigation, insurance claims and crime investigation. Issues related to forensics include the authenticity, integrity and privacy of the data. In this paper, the security of the forensic process and data in automotive systems is analysed. We propose an efficient, secure, privacy- preserving and reliable mechanism to provide a forensics data collection and storage process. A diagnostic application for smart phones, DiaLOG, is incorporated in the proposed process that uses a secure protocol to communicate the collected forensic data to a secure cloud storage. The proposed protocol for communicating forensic data is implemented to measure performance results and formally analysed using Scyther and CasperFDR with no known attack found.

AB - Digital forensics is becoming an important feature for many embedded devices. In automotive systems, digital forensics involves multiple electronic control units (ECUs) used to support the connected and intelligent vehicle’s technology. Digital evidence from these ECUs can be used in forensics investigation and analysis. Such a mechanism can potentially facilitate crash investigation, insurance claims and crime investigation. Issues related to forensics include the authenticity, integrity and privacy of the data. In this paper, the security of the forensic process and data in automotive systems is analysed. We propose an efficient, secure, privacy- preserving and reliable mechanism to provide a forensics data collection and storage process. A diagnostic application for smart phones, DiaLOG, is incorporated in the proposed process that uses a secure protocol to communicate the collected forensic data to a secure cloud storage. The proposed protocol for communicating forensic data is implemented to measure performance results and formally analysed using Scyther and CasperFDR with no known attack found.

U2 - 10.1109/TrustCom.2016.0164

DO - 10.1109/TrustCom.2016.0164

M3 - Conference contribution

SN - 978-1-5090-3206-8

SP - 974

EP - 982

BT - 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16)

A2 - Xiang, Yang

A2 - Ren, Kui

A2 - Feng, Dengguo

PB - IEEE Computer Society

ER -