HATARA: A Novel Approach by Fusion of HARA and TARA For System Safety and Security Analysis
HATARA: A Novel Approach by Fusion of HARA and TARA For System Safety and Security Analysis
ISSN No:-2456-2165
The evolving dynamics of automotive systems, B. Significance of Comprehensive Safety And Security
marked by increased connectivity and automation, call for Analysis:-
a fundamental alteration in system development The paramount importance of a thorough safety and
paradigms. This alteration should be oriented towards a security analysis in contemporary automotive systems is
comprehensive approach, prioritizing the concurrent and indisputable. An all-encompassing strategy is essential, as
intertwined demands of functional safety and separate examinations of safety or security fail to
cybersecurity to ensure the robustness and resilience of adequately address the array of risks present in
vehicles in the contemporary, interconnected, and techno- sophisticated, interlinked systems. The interrelationship
logically advanced landscape [5]. between safety and security implies that a deficiency in
one domain can substantially affect the other [1].
A. Motivation and Objective:-
The impetus for amalgamating Hazard Analysis and The convergence of operational and informational
Risk Assessment (HARA) with Threat Analysis and Risk technologies in vehicular systems has ushered in novel
Assessment (TARA) emanates from the progressively vulnerabilities and threats. For example, connected
converging realms of safety and security in contemporary vehicles are prone to cyber-attacks, which could
automotive systems. The distinction between safety and jeopardize data integrity and the vehicle’s physical
security risks is progressively diminishing within functioning. This reality necessitates the inclusion of
autonomous and connected vehicles. Safety risks, cybersecurity threats in the comprehensive safety risk
traditionally linked with vehicular sys-tem malfunctions, assessment of vehicles [5].
are now intricately connected with security risks,
originating from the potentiality of malevolent cyber Furthermore, as vehicles increasingly rely on
incursions [3]. advanced algorithms and electronic control systems for
autonomous operation, the imperative for an integrated
This amalgamation’s principal aim is to formulate an approach to safety and security becomes more
all-encompassing methodology, addressing both safety pronounced. The reliability of these systems hinges not
and security risks under a singular framework. This solely on their operational efficiency under standard
unified approach is imperative for augmenting the conditions but also on their robustness against malicious
robustness and resilience of automotive systems. As intrusions and other security perils [3].
vehicles increasingly depend on electronic and software
components and interface with external networks, the A holistic analysis guarantees that safety measures to
likelihood of safety hazards emerging from cybersecurity mitigate specific risks do not unintentionally create new
vulnerabilities intensifies [5]. Consequently, a vulnerabilities. For instance, safety mechanisms designed
methodology that concurrently considers both safety and to override driver control in particular scenarios must be
security is indispensable. impervious to cyber-attacks or unauthorized interference
[1].
An additional incentive for integrating HARA and
TARA lies in the evolving spectrum of threats within the The amalgamation of safety and security analysis is
automotive sector. The progression of connected and crucial in confronting the entire risk spectrum of modern
autonomous vehicles heralds the emergence of unforeseen automotive systems. This integrated methodology is
novel threats. These threats jeopardize vehicular data advantageous for identifying and mitigating risks and
security and may culminate in physical detriment, essential for sustaining consumer confidence and assuring
underscoring the necessity of integrating safety and the enduring success of automotive technologies [5].
security evaluations [1], [8].
Benefits and Challenges Associated with HATARA:-
Moreover, this objective encompasses refining the The Integrated HATARA (Hazard Analysis and
development process by presenting a holistic perspective Threat Assessment Risk Analysis) Methodology presents
of the risk landscape. This comprehensive outlook numerous advantages and challenges in its application.
facilitates the identification of intersecting areas between
safety and security, thereby preventing redundant efforts
and ensuring that mitigation strategies are harmoniously
aligned [1].
Table 1 Key Features of Iso 26262 and Iso 21434 [15], [16]
Key Features ISO 26262 ISO 21434
Scope Addresses potential hazards caused by
malfunctions in electronic and Addresses the cybersecurity risks inherent in the
electrical systems in vehicles design and development of car electronics
Lifecycle Framework Provides a framework for the entire Provides a framework for the entire lifecycle of
lifecycle of auto- motive electronic auto- motive electronic and electrical safety-
and electrical safety-related systems related systems
Risk-Based Approach Has a risk-based approach for Has a risk-based approach for determining risk
determining risk classes classes
Validation and Confirmation Measures Provides requirements for validation Provides requirements for validation and
and confirmation measures confirmation measures
Functional Safety vs Cybersecurity Focuses on functional safety Focuses on cybersecurity
- Addresses the cybersecurity risks inherent in the
Gap Filling design and development of car electronics
Detailed Guidelines and Provides a set of detailed guidelines -
Requirements for Functional Safety and requirements for functional safety
Automotive Cyber security Engineering - Provides a framework for automotive
cybersecurity engineering
Standard Terminology and Methods for -
Risk Assessment in the Field of Establishes a common terminology and methods
Cybersecurity for risk assessment in the field of cybersecurity
Addressing Differences: Acknowledge that ISO 26262 introducing an innovative, all-encompassing method for
is dedicated to functional safety, whereas ISO 21434 amalgamating safety and security risk assessments. This
focuses on cybersecurity. These differences should be approach fills the prevailing void in automotive system
reconciled to afford equal importance to operational development, where safety and security have traditionally
safety and cybersecurity. been addressed in isolation [21]. Furthermore, the study
Filling the Gaps: ISO 21434 complements ISO 26262 offers guidance and suggestions for future research
by addressing cybersecurity risks, a dimension not endeavors, pointing towards potential avenues for
covered by ISO 26262. This complementary nature advancing and refining integrated safety and security
should be integral to the integration process. frameworks.
Developing a Unified Approach: Formulate a cohesive
strategy for functional safety and cybersecurity, under- D. Importance and Challenges
standing that cybersecurity is an extension of safety
rather than an isolated discipline. In-Depth Evaluation of the Present Approaches: The
Continuous Improvement: Persistently enhance and research critically examines existing practices in
up-date the integrated approach as both standards automotive safety and security, underscoring the
evolve and new challenges and risks emerge. necessity of an integrated methodology in response to
the dynamic evolution of automotive technologies and
The objective is to ensure that automotive products threats.
and vehicles are compliant and ready for the market, Recognition of Deficiencies in Current Strategies: It
balancing cybersecurity and functional safety. This acknowledges the shortcomings of current methods,
endeavour requires an appreciation of the notably the absence of a cohesive framework that
interconnectedness of these two standards, recognizing concurrently caters to safety and security aspects in
them as complementary facets of automotive systems’ automotive systems [22].
safety and security. Innovations and Contributions Rendered by
HATARA: The HATARA model introduces
C. Overview and Contributions:- significant advancements in risk assessment practices
The HATARA methodology is meticulously by integrating safety and security analyses. This
delineated showcasing its implementation in the case of integrated approach not only bolsters risk management
an autonomous vehicle. This illustration is a practical effectiveness but also aids in fostering more resilient
testament to its applicability and effectiveness within the automotive systems.
automotive sector. A primary contribution of this study is
Criteria for Hazard and Threat Identification: Prioritization of Risks: Post-integration, risks are
Establishing specific criteria for hazard and threat prioritized based on the assessment outcomes, which
identification is vital. This ensures the analysis is directs the focus toward the most critical areas for
targeted and relevant and effectively identifies mitigation strategies.
potential safety and security risks [30].
Mitigation Strategy Development:
Data Collection:
Formulating Comprehensive Strategies: The
Gathering Data: Collecting pertinent data on potential development of mitigation strategies encompasses
hazards and threats involves consulting expert considerations of system design, operational
opinions, examining historical data, utilizing procedures, and emergency response plans, ensuring
predictive models, and tapping into industry-specific both safety and security risks are addressed [22].
knowledge bases [18]. Maintaining a Balanced Approach: It is crucial to
Utilizing Various Information Sources: Employing a ensure that the mitigation strategies are balanced,
range of sources, such as incident reports, simulation safeguarding against compromising one system aspect
outcomes, and industry trends, is crucial for an (safety or security) for the other.
exhaustive and accurate data collection process.
Documentation and Reporting: In the HATARA
Risk Analysis: process, meticulous documentation and
comprehensive reporting are pivotal for ensuring
Severity and Likelihood Evaluation: The process transparency and accountability across the risk
involves a detailed assessment of the severity and assessment and mitigation stages.
likelihood of the identified hazards and threats. This
evaluation can be conducted through quantitative tools Process Documentation: Documenting each phase of
like risk matrices or qualitative methods, including the HATARA method is critical. This documentation
expert opinions [20]. details the methodologies employed, data gathered,
Employing Varied Risk Assessment Techniques: decisions made, and the reasoning behind each
Using diverse risk assessment methods is instrumental decision. Such thorough documentation is
in gauging the potential impacts of the identified risks instrumental in establishing a transparent, traceable
on the automotive system. record of the risk assessment and mitigation strategies,
aiding in internal reviews and external audits [25].
Integration of Findings: Reporting: The preparation of exhaustive reports
is essential in summarizing the outcomes of the risk
Cross-referencing Hazards and Threats: Identifying assessment and the implemented mitigation strategies.
potential overlaps or interdependencies between These reports should delineate the identified risks, their
hazards and threats is vital, as this step is critical to a potential impacts, the measures taken for mitigation, and
thorough risk assessment. This identification aids in any remaining risks. They act as a critical communication
comprehending the intricate relationship between mediumfor stakeholders, offering insights into the
safety and security risks [31]. efficacy of the risk management process [32].
Fig 2 Integration of Automotive Safety (ISO 26262) and Security (ISO/SAE 21434) in Co-engineering Approach [42]
Integrated Verification and Validation: In the realm quality. The primary divergence lies in the necessity to
of verification and validation as expounded in this test specific safety or security mechanisms, which are
treatise, particularly on the right flank of the V-model, the ancillary to the nominal functioning of the product.
scope A for synergistic approaches is significantly Nevertheless, the methodologies for testing these
amplified. This is particularly true for the use case under mechanisms frequently overlap with those used for
scrutiny. The synergies in question predominantly pertain standard procedures.
to testing environments and methodologies employed for
dual aspects. A pivotal observation is that the majority of Three principal domains that stand to gain from
testing mandated by prevailing standards is not integrated engineering strategies have been identified on
exclusively oriented toward safety or cybersecurity. the right side of the composite development lifecycle.
Instead, it is directed at ensuring overarching product These domains encompass the testing environments, the