{"id":1425,"date":"2022-08-28T08:59:56","date_gmt":"2022-08-28T12:59:56","guid":{"rendered":"https:\/\/carleton.ca\/cybersea\/?p=1425"},"modified":"2026-01-26T10:41:50","modified_gmt":"2026-01-26T15:41:50","slug":"new-publication-a-threat-model-and-security-recommendations-for-iot-sensors-in-connected-vehicle-networks","status":"publish","type":"post","link":"https:\/\/carleton.ca\/cybersea\/2022\/new-publication-a-threat-model-and-security-recommendations-for-iot-sensors-in-connected-vehicle-networks\/","title":{"rendered":"New Publication: A Threat Model and Security Recommendations for IoT Sensors in Connected Vehicle Networks"},"content":{"rendered":"\n<section class=\"w-screen px-6 cu-section cu-section--white ml-offset-center md:px-8 lg:px-14\">\n    <div class=\"space-y-6 cu-max-w-child-5xl  md:space-y-10 cu-prose-first-last\">\n\n            <div class=\"cu-textmedia flex flex-col lg:flex-row mx-auto gap-6 md:gap-10 my-6 md:my-12 first:mt-0 max-w-5xl\">\n        <div class=\"justify-start cu-textmedia-content cu-prose-first-last\" style=\"flex: 0 0 100%;\">\n            <header class=\"font-light prose-xl cu-pageheader md:prose-2xl cu-component-updated cu-prose-first-last\">\n                                    <h1 class=\"cu-prose-first-last font-semibold !mt-2 mb-4 md:mb-6 relative after:absolute after:h-px after:bottom-0 after:bg-cu-red after:left-px text-3xl md:text-4xl lg:text-5xl lg:leading-[3.5rem] pb-5 after:w-10 text-cu-black-700 not-prose\">\n                        New Publication: A Threat Model and Security Recommendations for IoT Sensors in Connected Vehicle Networks\n                    <\/h1>\n                \n                                \n                            <\/header>\n\n                    <\/div>\n\n            <\/div>\n\n    <\/div>\n<\/section>\n\n<p>Our publication &#8220;<a href=\"https:\/\/doi.org\/10.1109\/VTC2022-Spring54318.2022.9860359\">A Threat Model and Security Recommendations for IoT Sensors in Connected Vehicle Networks<\/a>&#8221; is now available online. This paper proposes a novel STRIDE-based threat model for IoT sensors in connected vehicle networks aimed at addressing these challenges. Using a reference architecture of a connected vehicle, we identify system assets in connected vehicle sub-systems such as devices and peripherals that mostly involve sensors. Moreover, we provide a prioritized set of security recommendations, with consideration to the feasibility and deployment challenges, which enables practical applicability of the developed threat model to help specify security requirements to protect critical assets within the sensor network. It was presented at the <a href=\"https:\/\/events.vtsociety.org\/vtc2022-spring\/\">2022 IEEE 95th Vehicular Technology Conference: (VTC2022-Spring)<\/a> in June 2022. See <a href=\"https:\/\/carleton.ca\/cybersea\/publications\/\">Publications<\/a>&nbsp;for more details!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Our publication &#8220;A Threat Model and Security Recommendations for IoT Sensors in Connected Vehicle Networks&#8221; is now available online. This paper proposes a novel STRIDE-based threat model for IoT sensors in connected vehicle networks aimed at addressing these challenges. Using a reference architecture of a connected vehicle, we identify system assets in connected vehicle sub-systems [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":431,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[41],"tags":[],"class_list":["post-1425","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-publication"],"acf":{"cu_post_thumbnail":""},"_links":{"self":[{"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/posts\/1425","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/comments?post=1425"}],"version-history":[{"count":2,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/posts\/1425\/revisions"}],"predecessor-version":[{"id":1427,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/posts\/1425\/revisions\/1427"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/media\/431"}],"wp:attachment":[{"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/media?parent=1425"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/categories?post=1425"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/tags?post=1425"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}