On the Security of an IoT-based Intelligent Transportation Service

Within the Internet of Things (IoT) ecosystem, an intelligent transportation service may incorporate data sharing with third-party services to enhance fast and accurate decision-making. In essence, this IoT-based transportation service may dynamically adapt an extra-domain one and adjusts several service lifecycle and key-processes, such as the fleet management. The depth of this adaptation can be highlighted by possible changes of the service’s security. However, the literature seems to lack an IoT-based service security assessment which also considers such IoT features. In this work, we rely on the stochastic modeling method to depict the data flow changes in regard to the fleet management using the Petri net ontology. The fleet management process is evaluated in two customised real-life scenarios to highlight how third-party data flow changes can affect this process lifecycle. Then, we assess the security for the two scenarios to estimate the degree in which the service is affected. The modeling process and the security assessment show that the third-party data type is related to the transportation service and the fleet management key-process in terms of their operation and security.

[1]  Tony Kenyon Transportation Cyber-Physical Systems Security and Privacy , 2018 .

[2]  Hiroaki Tanaka,et al.  Modeling of Infection Phenomenon and Evaluation of Mitigation Methods for IoT Malware Mirai by Agent-Oriented Petri Net PN2 , 2018, 2018 IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW).

[3]  Christos Douligeris,et al.  A DSS model for IoT-based intelligent transportation systems , 2017, 2017 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT).

[4]  Zhiqiang Ma,et al.  Trustworthiness Modeling and Analysis of Cyber-physical Manufacturing Systems , 2017, IEEE Access.

[5]  Christos Douligeris,et al.  Transport services within the IoT ecosystem using localisation parameters , 2016, 2016 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT).

[6]  Catherine Mulligan,et al.  From Machine-to-Machine to the Internet of Things - Introduction to a New Age of Intelligence , 2014 .

[7]  Cristina Alcaraz,et al.  A Survey of IoT-Enabled Cyberattacks: Assessing Attack Paths to Critical Infrastructures and Services , 2018, IEEE Communications Surveys & Tutorials.

[8]  Waldemar Grabski,et al.  Distributed algorithm for empty vehicles management in personal rapid transit (PRT) network , 2017, ArXiv.

[9]  Xavier Fernando,et al.  Fog Assisted Driver Behavior Monitoring for Intelligent Transportation System , 2017, 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall).

[10]  Shingo Yamaguchi,et al.  On service orchestration of cyber physical system and its verification based on Petri net , 2016, 2016 IEEE 5th Global Conference on Consumer Electronics.

[11]  Shingo Yamaguchi,et al.  On service security analysis for event log of IoT system based on data Petri net , 2017, 2017 IEEE International Symposium on Consumer Electronics (ISCE).

[12]  Aditya Khamparia,et al.  Threat driven modeling framework using petri nets for e-learning system , 2016, SpringerPlus.

[13]  Sidi-Mohammed Senouci,et al.  Green fleet management architecture: Application to economic itinerary planning , 2012, 2012 IEEE Globecom Workshops.

[14]  MengChu Zhou,et al.  Opportunistic cyberphysical services: A novel paradigm for the future Internet of Things , 2018, 2018 IEEE 4th World Forum on Internet of Things (WF-IoT).

[15]  Benedetto Barabino,et al.  Managing Data and Rethinking Applications in an Innovative Mid-sized Bus Fleet , 2017 .