Pedestrian Notification Methods in Autonomous Vehicles for Multi-Class Mobility-on-Demand Service

Author(s):  
Evelyn Florentine ◽  
Mark Adam Ang ◽  
Scott Drew Pendleton ◽  
Hans Andersen ◽  
Marcelo H. Ang
Author(s):  
Scott Drew Pendleton ◽  
Hans Andersen ◽  
Xiaotong Shen ◽  
You Hong Eng ◽  
Chen Zhang ◽  
...  

2021 ◽  
pp. 1-1
Author(s):  
Arash Bozorgchenani ◽  
Daniele Tarchi ◽  
Walter Cerroni

Electronics ◽  
2021 ◽  
Vol 10 (10) ◽  
pp. 1220
Author(s):  
Chee Wei Lee ◽  
Stuart Madnick

Urban mobility is in the midst of a revolution, driven by the convergence of technologies such as artificial intelligence, on-demand ride services, and Internet-connected and self-driving vehicles. Technological advancements often lead to new hazards. Coupled with the increased levels of automation and connectivity in the new generation of autonomous vehicles, cybersecurity is emerging as a key threat affecting these vehicles. Traditional hazard analysis methods treat safety and security in isolation and are limited in their ability to account for interactions among organizational, sociotechnical, human, and technical components. In response to these challenges, the cybersafety method, based on System Theoretic Process Analysis (STPA and STPA-Sec), was developed to meet the growing need to holistically analyze complex sociotechnical systems. We applied cybersafety to coanalyze safety and security hazards, as well as identify mitigation requirements. The results were compared with another promising method known as Combined Harm Analysis of Safety and Security for Information Systems (CHASSIS). Both methods were applied to the Mobility-as-a-Service (MaaS) and Internet of Vehicles (IoV) use cases, focusing on over-the-air software updates feature. Overall, cybersafety identified additional hazards and more effective requirements compared to CHASSIS. In particular, cybersafety demonstrated the ability to identify hazards due to unsafe/unsecure interactions among sociotechnical components. This research also suggested using CHASSIS methods for information lifecycle analysis to complement and generate additional considerations for cybersafety. Finally, results from both methods were backtested against a past cyber hack on a vehicular system, and we found that recommendations from cybersafety were likely to mitigate the risks of the incident.


2014 ◽  
Vol 31 (3) ◽  
pp. 444-458
Author(s):  
María Teresa González-Aparicio ◽  
R. García ◽  
J.L. Brugos ◽  
Xabiel G. Pañeda ◽  
D. Melendi ◽  
...  

2021 ◽  
Author(s):  
Tingting Dong ◽  
Xiaotong Sun ◽  
Qi Luo ◽  
Jian Wang ◽  
Yafeng Yin
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document