Научно-технические ведомости СПбГПУ: Экономические науки (Aug 2021)
Characteristics of vulnerability zones and threats sources for information security by the operation of unmanned vehicles in an intelligent transport system
Abstract
The full-scale deployment of intelligent transport systems with automated vehicles and associated road infrastructure in urbanized spaces not only opens up additional prospects for increasing the efficiency of the transportation industry, but also leads to the emergence of additional sources of threats, risks and areas of vulnerability of such systems. With the expansion of the range of various kinds of threats to disrupt the normal functioning of unmanned road transport (CAV), including the impact on the channels of information interaction of all road users and elements of the road infrastructure within the framework of the intelligent transport system (ITS), further improvement of the norms and requirements of legal and technical regulation of creation and the operation of CAV. This is an expansion of the field and tasks of testing the safety of automobile public, personal, commercial and special vehicles, including through the verification of information security during the validation and verification of both CAV and ITS components. Within the framework of a systematic approach using methods of content, logical and comparative analysis, the subject area of the study was clarified, the state of regulatory requirements of national regulators for ensuring information security of connected and automated vehicles was characterized, methodological approaches to testing information security of automated road traffic within the framework of intelligent transport were considered. systems. The study made it possible to: determine the list of safety requirements for unmanned vehicles; to clarify the concepts in the field of ensuring information security of the operation of CAV and the functioning of ITS in the context of the transition to mobile communications of the 5G generation; summarize the characteristics of typical zones of vulnerabilities and potential attacks; classify information security threat agents in CAV architecture and ITS infrastructure. The paper presents a conceptual approach to the identification of a complex model of threats to information security of the technological platform of information interaction "unmanned vehicle-road infrastructure". The study, based on the analysis of security requirements for unmanned vehicles and clarification of concepts in the field of information security for the operation of CAV and the functioning of ITS in the transition to mobile communications of the 5G generation, made it possible to obtain the following results: to determine the composition of typical zones of vulnerabilities and potential attacks; characterize the spectrum of the main threats, classify the main agents of information security threats in the CAV architecture and ITS infrastructure. The applied value of the obtained research results lies in the possibility of using the presented model of information security threats CAV in the development of methodological approaches and analytical tools for organizing and testing in the framework of laboratory experiments and field tests of various types of deliberate violations of communication channels of individual CAV devices, a group of autonomous vehicles and a separate CAV with ITS. After the regulatory requirements are consolidated in the national information security standard CAV, a possible direction for further research may be the development of technological and economic models for testing information security within the framework of ITS for the national certification system CAV of various types.
Keywords