Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3368756.3368979acmotherconferencesArticle/Chapter ViewAbstractPublication PagessmartcityappConference Proceedingsconference-collections
research-article

Security study and challenges of connected autonomous vehicles

Published: 02 October 2019 Publication History

Abstract

Around the world, many national and international projects in the governmental, industrial and academic sectors are devoted to connected vehicles or autonomous vehicles. Several relevant industry standards are being created to prepare for the maturity of these emerging technologies. In this work, we aim to organize and discuss different attacks that can bring harm to a connected autonomous vehicles system. We will first explore the context of connected autonomous vehicles as well as its security and challenges. Then we will take examples of some known attacks along with a proposed ranking that can be used to classify various attack scenarios by their severity, finally we will finish our paper with a discussion of the attacks and their impacts on the road whether it be pedestrians or animals.

References

[1]
Thing, V. L. L., & Wu, J. (2016). Autonomous Vehicle Security: A Taxonomy of Attacks and Defences. 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), p 166--168.
[2]
Yu, B., Bai, F., & Dressler, F. (2018). Connected and Autonomous Vehicles. IEEE Internet Computing, 22(3), 4--5.
[3]
Orjuela, Rodolfo & Ledy, Jonathan and Lauffenburger, Jean-Philippe & Basset, Michel. (2018). AUTONOMOUS VEHICLES AND THE TECHNOLOGICAL RISK: WHERE DOES IT COME AND WHERE DOES IT GO?
[4]
Inria-autonomous and connected vehicles, current challenges and research pathways (white paper).
[5]
Julien Rullier, Vincent Favre. Safety and autonomous vehicles: which factors of influence to take into account? Lambda Congress Mu 21, "Risk Management and Digital Transformation: Opportunities and Threats", Oct 2018, Reims, France. <hal02065178>.
[6]
4 the lidar and the autonomous car - Moodle INSA Rouen.
[7]
The autonomous vehicle: Perception by LiDAR. Aurélie Bracco, Azzedine Benhamed, Laure Delon, Robin Langlois, Kousai Smeda, Souha Makni 2018.
[8]
Mohamed Zayed. Intelligent Vehicles: Study and development of an intelligent vision sensor for the virtual coupling. domain_other. University of Science and Technology Lille - Lille I, 2005. French. <Tel-00141213>.
[9]
Sung, K., Min, K., & Choi, J. (2018). Driving information logger with in-vehicle communication for autonomous vehicle research. 2018 20th International Conference on Advanced Communication Technology (ICACT).
[10]
Molina, C. B. S. T., Almeida, J. R. de, Vismari, L. F., Gonzalez, R. I. R., Naufal, J. K., & Camargo, J. B. (2017). Assuring Fully Autonomous Vehicles Safety by Design: The Autonomous Vehicle Control (AVC) Module Strategy. 2017 47th Annual.
[11]
Cherfi, A., Arbaretier, E., & Zhao, L. (2016). Safety-safety of autonomous vehicles: stakes and locks. Lambda Mu 20 Congress of Control of Risks and Dependability.
[12]
Jape, P. R., & Jape, S. R. (2018). Virtual GPS Guided Autonomous Wheel Chair or Vehicle. 2018 3rd International Conference for Convergence in Technology (I2CT).
[13]
Jamming and Spoofing Attacks: Physical Layer Cybersecurity Threats to Autonomous Vehicle Systems by Samuelson-Glushko Technology Law & Policy Clinic (TLPC).

Cited By

View all
  • (2022)Robo-Rage Against the Machine: Abuse, Sabotage, and Bullying of Robots and Autonomous VehiclesGood Robot, Bad Robot10.1007/978-3-031-14013-6_8(205-244)Online publication date: 1-Oct-2022
  • (2021)Cybersecurity Test Range for Autonomous Vehicle Shuttles2021 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)10.1109/EuroSPW54576.2021.00031(239-248)Online publication date: Sep-2021

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
SCA '19: Proceedings of the 4th International Conference on Smart City Applications
October 2019
788 pages
ISBN:9781450362894
DOI:10.1145/3368756
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 02 October 2019

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. attacks
  2. classification
  3. connected autonomous vehicles
  4. security
  5. sensors

Qualifiers

  • Research-article

Conference

SCA2019

Acceptance Rates

Overall Acceptance Rate 183 of 487 submissions, 38%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)38
  • Downloads (Last 6 weeks)1
Reflects downloads up to 03 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2022)Robo-Rage Against the Machine: Abuse, Sabotage, and Bullying of Robots and Autonomous VehiclesGood Robot, Bad Robot10.1007/978-3-031-14013-6_8(205-244)Online publication date: 1-Oct-2022
  • (2021)Cybersecurity Test Range for Autonomous Vehicle Shuttles2021 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)10.1109/EuroSPW54576.2021.00031(239-248)Online publication date: Sep-2021

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media