scholarly journals Towards a Severity Assessment Method for Potential Cyber Attacks to Connected and Autonomous Vehicles

2020 ◽  
Vol 2020 ◽  
pp. 1-15
Author(s):  
Qiyi He ◽  
Xiaolin Meng ◽  
Rong Qu

CAV (connected and autonomous vehicle) is a crucial part of intelligent transportation systems. CAVs utilize both sensors and communication components to make driving decisions. A large number of companies, research organizations, and governments have researched extensively on the development of CAVs. The increasing number of autonomous and connected functions however means that CAVs are exposed to more cyber security vulnerabilities. Unlike computer cyber security attacks, cyber attacks to CAVs could lead to not only information leakage but also physical damage. According to the UK CAV Cyber Security Principles, preventing CAVs from cyber security attacks need to be considered at the beginning of CAV development. In this paper, a large set of potential cyber attacks are collected and investigated from the aspects of target assets, risks, and consequences. Severity of each type of attacks is then analysed based on clearly defined new set of criteria. The levels of severity for the attacks can be categorized as critical, important, moderate, and minor. Mitigation methods including prevention, reduction, transference, acceptance, and contingency are then suggested. It is found that remote control, fake vision on cameras, hidden objects to LiDAR and Radar, spoofing attack to GNSS, and fake identity in cloud authority are the most dangerous and of the highest vulnerabilities in CAV cyber security.

2018 ◽  
Vol 19 (4) ◽  
pp. 325-334 ◽  
Author(s):  
Jamal Raiyn

Abstract An autonomous vehicle (AV) is a vehicle that operates and performs tasks under its own power. Some features of autonomous vehicle are sensing the environment, collecting information and managing communication with other vehicles. Many autonomous vehicles in development use a combination of cameras, sensors, GPS, radar, LiDAR, and on-board computers. These technologies work together to map the vehicle’s position and its proximity to everything around it. Because of their reliance on these sorts of technologies, which are easily accessible to tampering, a autonomous vehicles are susceptible to cyber attacks if an attacker can discover a weakness in a certain type of vehicle or in a company’s electronic system. This lack of information security can lead to criminal and terrorist acts that eventually cost lives. This paper gives an overview of cyber attack scenarios relating to autonomous vehicles. The cyber security concept proposed here uses biometric data for message authentication and communication, and projects stored and new data based on iris recognition. Iris recognition system can provide other knowledge about drivers as well, such as how tired and sleepy they might be while driving, and they are designed to encrypt the vehicle-to-vehicle and vehicle-to-environment communication based on encryption security mechanisms.


2021 ◽  
Vol 54 (4) ◽  
pp. 1-37
Author(s):  
Azzedine Boukerche ◽  
Xiren Ma

Vision-based Automated Vehicle Recognition (VAVR) has attracted considerable attention recently. Particularly given the reliance on emerging deep learning methods, which have powerful feature extraction and pattern learning abilities, vehicle recognition has made significant progress. VAVR is an essential part of Intelligent Transportation Systems. The VAVR system can fast and accurately locate a target vehicle, which significantly helps improve regional security. A comprehensive VAVR system contains three components: Vehicle Detection (VD), Vehicle Make and Model Recognition (VMMR), and Vehicle Re-identification (VRe-ID). These components perform coarse-to-fine recognition tasks in three steps. In this article, we conduct a thorough review and comparison of the state-of-the-art deep learning--based models proposed for VAVR. We present a detailed introduction to different vehicle recognition datasets used for a comprehensive evaluation of the proposed models. We also critically discuss the major challenges and future research trends involved in each task. Finally, we summarize the characteristics of the methods for each task. Our comprehensive model analysis will help researchers that are interested in VD, VMMR, and VRe-ID and provide them with possible directions to solve current challenges and further improve the performance and robustness of models.


2003 ◽  
Vol 1858 (1) ◽  
pp. 148-157 ◽  
Author(s):  
Sherif Ishak

Little information has been successfully extracted from the wealth of data collected by intelligent transportation systems. Such information is needed for the efficiency of operations and management functions of traffic-management centers. A new set of second-order statistical measures derived from texture characterization techniques in the field of digital image analysis is presented. The main objective is to improve the data-analysis tools used in performance-monitoring systems and assessment of level of service. The new measures can extract properties such as smoothness, homogeneity, regularity, and randomness in traffic operations directly from constructed spatiotemporal traffic contour maps. To avoid information redundancy, a correlation matrix was examined for nearly 14,000 15-min speed contour maps generated for a 3.4-mi freeway section over a period of 5 weekdays. The result was a set of three second-order measures: angular second moment, contrast, and entropy. Each measure was analyzed to examine its sensitivity to various traffic conditions, expressed by the overall speed mean of each contour map. The study also presented a tentative approach, similar to the conventional one used in the Highway Capacity Manual, to evaluate the level of service for each contour map. The new set of level-of-service criteria can be applied in real time by using a stand-alone module that was developed in the study. The module can be readily implemented online and allows traffic-management center operators to tune a large set of related parameters.


2020 ◽  
Vol 10 (18) ◽  
pp. 6306 ◽  
Author(s):  
Luke Butler ◽  
Tan Yigitcanlar ◽  
Alexander Paz

Transportation disadvantage is about the difficulty accessing mobility services required to complete activities associated with employment, shopping, business, essential needs, and recreation. Technological innovations in the field of smart mobility have been identified as a potential solution to help individuals overcome issues associated with transportation disadvantage. This paper aims to provide a consolidated understanding on how smart mobility innovations can contribute to alleviate transportation disadvantage. A systematic literature review is completed, and a conceptual framework is developed to provide the required information to address transportation disadvantage. The results are categorized under the physical, economic, spatial, temporal, psychological, information, and institutional dimensions of transportation disadvantage. The study findings reveal that: (a) Primary smart mobility innovations identified in the literature are demand responsive transportation, shared transportation, intelligent transportation systems, electric mobility, autonomous vehicles, and Mobility-as-a-Services. (b) Smart mobility innovations could benefit urban areas by improving accessibility, efficiency, coverage, flexibility, safety, and the overall integration of the transportation system. (c) Smart mobility innovations have the potential to contribute to the alleviation of transportation disadvantage. (d) Mobility-as-a-Service has high potential to alleviate transportation disadvantage primarily due to its ability to integrate a wide-range of services.


2019 ◽  
Vol 65 (4) ◽  
pp. 1-9
Author(s):  
Milan Zlatkovic ◽  
Andalib Shams

As traffic congestion increases day by day, it becomes necessary to improve the existing roadway facilities to maintain satisfactory operational and safety performances. New vehicle technologies, such as Connected and Autonomous Vehicles (CAV) have a potential to significantly improve transportation systems. Using the advantages of CAVs, this study developed signalized intersection control strategy algorithm that optimizes the operations of CAVs and allows signal priority for connected platoons. The algorithm was tested in VISSIM microsimulation using a real-world urban corridor. The tested scenarios include a 2040 Do-Nothing scenario, and CAV alternatives with 25%, 50%, 75% and 100% CAV penetration rate. The results show a significant reduction in intersection delays (26% - 38%) and travel times (6% - 20%), depending on the penetration rate, as well as significant improvements on the network-wide level. CAV penetration rates of 50% or more have a potential to significantly improve all operational measures of effectiveness.


Author(s):  
Victor J. D. Tsai ◽  
Jyun-Han Chen ◽  
Hsun-Sheng Huang

Traffic sign detection and recognition (TSDR) has drawn considerable attention on developing intelligent transportation systems (ITS) and autonomous vehicle driving systems (AVDS) since 1980’s. Unlikely to the general TSDR systems that deal with real-time images captured by the in-vehicle cameras, this research aims on developing techniques for detecting, extracting, and positioning of traffic signs from Google Street View (GSV) images along user-selected routes for low-cost, volumetric and quick establishment of the traffic sign infrastructural database that may be associated with Google Maps. The framework and techniques employed in the proposed system are described.


2021 ◽  
Vol 2021 ◽  
pp. 1-16
Author(s):  
Mohammad Khashayarfard ◽  
Habibollah Nassiri

Human error is one of the leading causes of accidents. Distraction, fatigue, poor visibility, speeding, and other such errors made by drivers can cause accidents. With the rapid advancements in automation technologies, transportation planners have strived to use Intelligent Transportation Systems (ITS) to minimize human error. In this study, the effect of Autonomous Vehicles (AVs) on the number of potential conflicts at two unsignalized intersections is investigated by using a microsimulation model in PTV Vissim software. For human-driven cars, the factor that is considered for calibration is driver distraction mainly caused by reading or writing text messages on a cellphone while driving. This factor can be estimated using driving simulators. In this paper, five different scenarios were defined for simulation, in addition to the primary state, according to the different market penetration rates of AVs in Vissim. Safety assessment was performed by the Surrogate Safety Assessment Model (SSAM) using Time to Collision (TTC) and Deceleration Rate to Avoid Crashes (DRAC) indicators to determine the number of accidents. It was concluded that the presence of 100% of AVs could reduce the potential for accidents by up to 93%.


2021 ◽  
Vol 11 (19) ◽  
pp. 9089
Author(s):  
Radwa Ahmed Osman ◽  
Ahmed Kadry Abdelsalam

Recent autonomous intelligent transportation systems commonly adopt vehicular communication. Efficient communication between autonomous vehicles-to-everything (AV2X) is mandatory to ensure road safety by decreasing traffic jamming, approaching emergency vehicle warning, and assisting in low visibility traffic. In this paper, a new adaptive AV2X model, based on a novel optimization method to enhance the connectivity of the vehicular networks, is proposed. The presented model optimizes the inter-vehicle position to communicate with the autonomous vehicle (AV) or to relay information to everything. Based on the system quality-of-service (QoS) being achieved, a decision will be taken whether the transmitting AV communicates directly to the destination or through cooperative communication. To achieve the given objectives, the best position of the relay-vehicle issue was mathematically formulated as a constrained optimization problem to enhance the communication between AV2X under different environmental conditions. To illustrate the effectiveness of the proposed model, the following factors are considered: distribution of vehicles, vehicle density, vehicle mobility and speed. Simulation results show how the proposed model outperforms other previous models and enhances system performance in terms of four benchmark aspects: throughput (S), packet loss rate (PLR), packet delivery ratio (PDR) and average delivery latency (DL).


Sign in / Sign up

Export Citation Format

Share Document