scholarly journals Threats and Alert Analytics in Autonomous Vehicles

10.29007/j6h1 ◽  
2020 ◽  
Author(s):  
Aakanksha Rastogi ◽  
Kendall Nygard

Autonomous vehicles or self-driving cars emerged with a promise to deliver a driving experience that is safe, secure, law-abiding, alleviates traffic congestion and reduces traffic accidents. These self-driving cars predominantly rely on wireless technology, vehicular ad-hoc networks (VANETs) and Vehicle to Vehicle (V2V) networks, Road Side Units (RSUs), Millimeter Wave radars, light detection and ranging (LiDAR), sensors and cameras, etc. Since these vehicles are so dexterous and equipped with such advanced driver assistance technological features, their dexterity invites threats, vulnerabilities and hacking attacks. This paper aims to understand and study the technology behind these self-driving cars and explore, identify and address popular threats, vulnerabilities and hacking attacks to which these cars are prone. This paper also establishes a relationship between these threats, trust and reliability. An analysis of the alert systems in self-driving cars is also presented.

2013 ◽  
pp. 354-375
Author(s):  
Md. Imrul Hassan ◽  
Hai L. Vu ◽  
Taka Sakurai

It is envisaged that supporting vehicle-to-vehicle and vehicle-to-infrastructure communications with a Vehicular Ad-Hoc Network (VANET) can improve road safety and increase transportation efficiency. Among the candidate applications of VANETs, cooperative collision avoidance (CCA) has attracted considerable interest as it can significantly improve road safety. Due to the ad hoc nature of these highly dynamic networks, no central coordination or handshaking protocol can be assumed and safety applications must broadcast information of interest to many surrounding cars by sharing a single channel in a distributed manner. This gives rise to one of the key challenges in vehicle-to-vehicle communication systems, namely, the development of an efficient and reliable medium access control (MAC) protocol for CCA. In this chapter, we provide an overview of proposed MAC protocols for VANETs and describe current standardization activities. We then focus on the performance of the IEEE 802.11 carrier sense multiple access (CSMA) based MAC protocol that is being standardized by the IEEE standards body for VANET applications. In particular, we review prominent existing analytical models and study their advantages, disadvantages and their suitability for performance evaluation of the MAC protocol for VANETs. After a discussion of the shortcomings of these models, we develop a new analytical model in the second half of the chapter. Explicit expressions are derived for the mean and standard deviation of the packet delay, as well as for the packet delivery ratio (PDR) at the MAC layer in an unsaturated network formed by moving vehicles on a highway. We validate the analytical results using extensive simulations and show that good accuracy can be achieved with the proposed model for a range of topologies and traffic load conditions. More importantly, using the model, we show that hidden terminals can have a severe, detrimental impact on the PDR, which may compromise the reliability required for safety applications.


Cyber Crime ◽  
2013 ◽  
pp. 1695-1710
Author(s):  
S. S. Manvi ◽  
M. S. Kakkasageri

This chapter presents the emerging security issues in Vehicular Ad hoc Networks (VANETs) for e-business along with some of the solutions provided by the research community. The VANET will facilitate new applications for e-business that will revolutionize the driving experience, providing everything from instant, localized traffic updates to warning signals when the vehicle ahead abruptly brakes. In the emerging global economy, e-business has increasingly become a necessary component of business strategy and a strong catalyst for economic development. In near future, vehicles may be equipped with short-range radios capable of communicating with other vehicles and highway infrastructure using a VANET. However, providing security in VANETs for e-business raises privacy concerns that must be considered. The deployment of VANETs for e-business is rapidly approaching, and their success and safety will depend on viable security solutions acceptable to consumers, manufacturers and governments.


Author(s):  
Jie Zhang

An increasingly large number of cars are being equipped with GPS and Wi-Fi devices, forming vehicular ad-hoc networks (VANETs) and enabling vehicle to vehicle communication with the goal of providing increased passenger and road safety. However, dishonest peers (vehicles) in a VANET may send out false information to maximize their own utility. Given the dire consequences of acting on false information in this context, there is a serious need to establish trust among peers. This article first discusses the challenges for trust management caused by the important characteristics of VANET environments, and identifies desired properties that effective trust management should incorporate in order to address the challenges. The author then surveys and evaluates existing trust models in VANETs, and points out that none of the trust models has achieved all the properties. Finally, the author proposes some important future directions for research towards effective trust management for VANETs.


2018 ◽  
Vol 7 (2.31) ◽  
pp. 245
Author(s):  
Tanuja Kayarga ◽  
H M. Navyashree

In the recent times due to the increase of vehicular nodes in a vehicular communication network, there is a need of developing efficient systems in order to optimize the vehicular traffic congestion issues in urban areas. The current research trends shows that most of the conventional studies focused on developing fuzzy inference systems based vehicular traffic congestion model which has gained lots of attention on detecting and minimizing the congestion levels.We have proposed a new approach towards detection and controlling of traffic congestion in VANET. The proposed system utilizes the communication channels very efficiently and irrespective of any kind of overload. This proposed system aims to introduce a novel framework for identifying traffic jam on Vehicular Ad-hoc Networks. In order to detect and minimize the level of congestion our approach will use a fuzzy logic based approach to notify the drivers about available routes during the traffic congestion. An experimental prototype will be set up to enable the graphical simulation.


2011 ◽  
Vol 219-220 ◽  
pp. 351-357 ◽  
Author(s):  
Jin Song Gui ◽  
Zhi Gang Chen ◽  
Xiao Heng Deng

In vehicular ad hoc networks, uncooperative behaviors will impact the reliability of comfort applications, as well as drivers’ decisions, and even invoke serious traffic accidents. In this paper, we propose a novel game incentive scheme to stimulate cooperation among vehicle nodes, consider selfish nodes’ expectations to future payoff and their long-term desires for profit, and show analytically the three incentive-compatible conditions under which selfish nodes will be deterred from cheating by the subsequent punishments. We also discuss the impact on selfish nodes’ behavior, which is caused by their willingness for future collaboration, the parameter values of punishment mechanism and the variation of network load. Simulation results show that, the increase of network load and the deterioration of node’s future profit expectation will motivate nodes toward self-interested action, but our scheme can neutralize this tendency by the careful configuration of punishment parameters, and have favorable incentive effect.


2020 ◽  
Vol 21 (3) ◽  
pp. 425-440 ◽  
Author(s):  
Sumit Kumar ◽  
Jaspreet Singh

The new age of the Internet of Things (IoT) is motivating the advancement of traditional Vehicular Ad-Hoc Networks (VANETs) into the Internet of Vehicles (IoV). This paper is an overview of smart and secure communications to reduce traffic congestion using IoT based VANETs, known as IoV networks. Studies and observations made in this paper suggest that the practice of combining IoT and VANET for a secure combination has rarely practiced. IoV uses real-time data communication between vehicles to everything (V2X) using wireless communication devices based on fog/edge computing; therefore, it has considered as an application of Cyber-physical systems (CPS). Various modes of V2X communication with their connecting technologies also discussed. This paper delivers a detailed introduction to the Internet of Vehicles (IoV) with current applications, discusses the architecture of IoV based on currently existing communication technologies and routing protocols, presenting different issues in detail, provides several open research challenges and the trade-off between security and privacy in the area of IoV has reviewed. From the analysis of previous work in the IoV network, we concluded the utilization of artificial intelligence and machine learning concept is a beneficial step toward the future of IoV model.


2012 ◽  
Vol 8 (2) ◽  
pp. 153-172 ◽  
Author(s):  
Hajar Mousannif ◽  
Ismail Khalil ◽  
Stephan Olariu

The past decade has witnessed the emergence of Vehicular Ad-hoc Networks (VANET), specializing from the well-known Mobile Ad Hoc Networks (MANET) to Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) wireless communications. While the original motivation for Vehicular Networks was to promote traffic safety, recently it has become increasingly obvious that Vehicular Networks open new vistas for Internet access, providing weather or road condition, parking availability, distributed gaming, and advertisement. In previous papers [27,28], we introduced Cooperation as a Service (CaaS); a new service-oriented solution which enables improved and new services for the road users and an optimized use of the road network through vehicle's cooperation and vehicle-to-vehicle communications. The current paper is an extension of the first ones; it describes an improved version of CaaS and provides its full implementation details and simulation results. CaaS structures the network into clusters, and uses Content Based Routing (CBR) for intra-cluster communications and DTN (Delay–and disruption-Tolerant Network) routing for inter-cluster communications. To show the feasibility of our approach, we implemented and tested CaaS using Opnet modeler software package. Simulation results prove the correctness of our protocol and indicate that CaaS achieves higher performance as compared to an Epidemic approach.


Sign in / Sign up

Export Citation Format

Share Document