Skip to main content

Vehicle cybersecurity guidebook published

SAE International has published its guidebook on vehicle cybersecurity, SAE J3061: Cybersecurity Guidebook for Cyber-Physical Vehicle Standards, which establishes a set of high-level guiding principles for cybersecurity as it relates to cyber-physical vehicle systems. The guidebook includes: Definition of a complete lifecycle process framework that can be tailored and utilised within each organisation’s development processes to incorporate cybersecurity into cyber-physical vehicle systems from concept ph
January 21, 2016 Read time: 2 mins
567 SAE International has published its guidebook on vehicle cybersecurity, SAE J3061: Cybersecurity Guidebook for Cyber-Physical Vehicle Standards, which establishes a set of high-level guiding principles for cybersecurity as it relates to cyber-physical vehicle systems.

The guidebook includes: Definition of a complete lifecycle process framework that can be tailored and utilised within each organisation’s development processes to incorporate cybersecurity into cyber-physical vehicle systems from concept phase through production, operation, service, and decommissioning;  Information on some common existing tools and methods used when designing, verifying and validating cyber-physical vehicle systems; Basic guiding principles on cybersecurity for vehicle systems; The foundation for further standards development activities in vehicle cybersecurity.

“This first in the world SAE Recommended Practice for automotive cyber security was developed by an international group of top experts in the field,” said Jack Pokrzywa, director of ground vehicle standards for SAE International.

“It describes commonly structured process to ensure that cybersecurity is built in to the design throughout all phases of product development from concept through product design, verification/validation, deployment, service & disposal. As a result, the likelihood of a successful attack is reduced.”

Related Content

  • Counting the environmental costs of ITS deployment
    October 29, 2015
    David Crawford looks at the latest thinking about calculating the benefits associated with the environmental side of ITS schemes. The penny is dropping that some environmental costs “are being shifted outside the traditional bounds of evaluation methods” for ITS-based road transport projects, according to researchers at the UK University of Leeds’ Institute for Transport Studies.
  • Healthy prospects for floating vehicle data systems
    February 3, 2012
    Elmar Brockfeld, Alexander Sohr and Peter Wagner from the German Aerospace Center's Institute of Transport Systems look at the prospects for floating vehicle data systems. Although Floating Vehicle Data (FVD) or probe vehicle fleets have been around for about a decade, the idea behind them is of course much older: from probe vehicles that flow with the traffic it should be possible to get a precise, fast and spatially near-complete picture of the prevailing traffic flow conditions in an area under surveilla
  • Cybercrime is not a remote threat for toll operations
    February 8, 2017
    The rise of cybercrime is starting to impact tolling concessions, as Colin Sowman discovers. Yahoo’s revelation that it has taken two years to discover that it had suffered a security breach resulting in hackers stealing the details of 500 million users is shocking - although the hackers only gained access to users’ names, contact details and encrypted passwords.
  • Tunnel simulators vital for real world tunnel management
    January 23, 2012
    Guillaume Ponsar, tunnel safety engineer with Egis Road Operation, writes about the advantages to be gained from the use of tunnel simulators. Major tunnel disasters over the last decade and more have shown how swiftly and badly a simple crash or fire may evolve should the wrong actions be taken by control room operators or traffic managers. Global safety issues and the reactions of operations staff have now become the principal concerns for Operations and Maintenance (O&M) service providers. As a result, n