Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
Applied Sciences
An automobile is a computer on wheels after the integration of electronics. This handshake of electronics and mechanical systems makes a vehicle smart, and comfortable; driver assistance for achieving this involves data exchange and surroundings sensing. Devices such as sensors, telematics, protocols, etc., are responsible for data exchange and data sensing. This process contains some loopholes that are the preliminary sources for the attacker to attack the vulnerable devices to control the vehicle. This article provides a review of possible attacks and defenses on autonomous and connected vehicles. The attacker’s area of autonomous and connected vehicles is classified into three categories that are safety system attacks, connectivity attacks, and diagnostics attacks, and provided all possible defenses for those attacks. In addition, we provided an analysis of the domain to understand the scenarios in this domain, recommendations, and future scope in this area for further work.
JAREE (Journal on Advanced Research in Electrical Engineering)
Connected and Autonomous Vehicles (CAVs) are a crucial breakthrough in the automotive industry and a magnificent step toward a safe, secure, and intelligent transportation system (ITS). CAVs offer tremendous benefits to our society and environment, such as mitigation of traffic accidents, reduction in traffic congestion, fewer emissions of harmful gases, etc. However, emerging automotive technology also has some serious safety concerns. One of them is cyber security. Conventional vehicles are less prone to cyber-attacks, but CAVs are more susceptible to such events as they communicate with the surrounding infrastructure and other vehicles. To gather data for a better perception of their surroundings, CAVs are outfitted with state-of-the-art sensors and modules like LiDAR, GPS, RADAR, onboard computers, cameras, etc. Hackers, terrorist organizations, and vandals can manipulate this sensor data or may access the primary control by cyber-attack, which may result in enormous fatalities....
2014
Vehicle automation has been one of the fundamental applications within the field of intelligent transportation systems (ITS) since the start of ITS research in the mid-1980s. For most of this time, it has been generally viewed as a futuristic concept that is not close to being ready for deployment. However, recent development of “self-driving” cars and the announcement by car manufacturers of their deployment by 2020 show that this is becoming a reality. The ITS industry has already been focusing much of its attention on the concepts of “connected vehicles” (United States) or “cooperative ITS” (Europe). These concepts are based on communication of data among vehicles (V2V) and/or between vehicles and the infrastructure (V2I/I2V) to provide the information needed to implement ITS applications. The separate threads of automated vehicles and cooperative ITS have not yet been thoroughly woven together, but this will be a necessary step in the near future because the cooperative exchange of data will provide vital inputs to improve the performance and safety of the automation systems. Thus, it is important to start thinking about the cybersecurity implications of cooperative automated vehicle systems. In this paper, we investigate the potential cyberattacks specific to automated vehicles, with their special needs and vulnerabilities. We analyze the threats on autonomous automated vehicles and cooperative automated vehicles. This analysis shows the need for considerably more redundancy than many have been expecting. We also raise awareness to generate discussion about these threats at this early stage in the development of vehicle automation systems.
Transport and Telecommunication Journal
An autonomous vehicle (AV) is a vehicle that operates and performs tasks under its own power. Some features of autonomous vehicle are sensing the environment, collecting information and managing communication with other vehicles. Many autonomous vehicles in development use a combination of cameras, sensors, GPS, radar, LiDAR, and on-board computers. These technologies work together to map the vehicle’s position and its proximity to everything around it. Because of their reliance on these sorts of technologies, which are easily accessible to tampering, a autonomous vehicles are susceptible to cyber attacks if an attacker can discover a weakness in a certain type of vehicle or in a company’s electronic system. This lack of information security can lead to criminal and terrorist acts that eventually cost lives. This paper gives an overview of cyber attack scenarios relating to autonomous vehicles. The cyber security concept proposed here uses biometric data for message authentication a...
European Journal of Science and Technology, 2022
2022 Design, Automation & Test in Europe Conference & Exhibition (DATE)
ArXiv, 2020
The transportation system is rapidly evolving with new connected and automated vehicle (CAV) technologies that integrate CAVs with other vehicles and roadside infrastructure in a cyberphysical system (CPS). Through connectivity, CAVs affect their environments and vice versa, increasing the size of the cyberattack surface and the risk of exploitation of security vulnerabilities by malicious actors. Thus, greater understanding of potential CAV-CPS cyberattacks and of ways to prevent them is a high priority. In this article we describe CAV-CPS cyberattack surfaces and security vulnerabilities, and outline potential cyberattack detection and mitigation strategies. We examine emerging technologies - artificial intelligence, software-defined networks, network function virtualization, edge computing, information-centric and virtual dispersive networking, fifth generation (5G) cellular networks, blockchain technology, and quantum and postquantum cryptography - as potential solutions aiding ...
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
JETS 66.4, 2023
La filosofía en el Perú. El Perú en la filosofía, 2024
Journal of Comparative Literature and Aesthetics, 2024
Online Learning, 2024
HAL (Le Centre pour la Communication Scientifique Directe), 2016
Beyond Ibn Tibbon: Additional Medieval Hebrew Translations of the Kuzari, 2023
MMWR. Morbidity and Mortality Weekly Report, 2020
Case Reports in Oncological Medicine, 2015
The Scientific World Journal, 2020
Recent Advances in Scoliosis, 2012
Acta Botanica Brasilica, 2007
Arquivos de Gastroenterologia, 2014