Secure Operations of Connected and Autonomous Vehicles

被引:20
作者
Han, Jinpeng [1 ,2 ]
Ju, Zhiyang [3 ]
Chen, Xiaoguang [4 ]
Yang, Manzhi [4 ]
Zhang, Hui [5 ]
Huai, Rouxing [6 ]
机构
[1] Xi An Jiao Tong Univ, Sch Software Engn, Xian 710049, Peoples R China
[2] Shanghai Artificial Intelligence Lab, Shanghai 200232, Peoples R China
[3] Beijing Inst Technol, Sch Mech Engn, Beijing 100081, Peoples R China
[4] Macau Univ Sci & Technol, Macau Inst Syst Engn, Macau 999078, Peoples R China
[5] Beihang Univ, Sch Transportat Sci Engn, Beijing 102206, Peoples R China
[6] Huairou Acad Parallel Sensing, Beijing 101407, Peoples R China
来源
IEEE TRANSACTIONS ON INTELLIGENT VEHICLES | 2023年 / 8卷 / 11期
关键词
Connected vehicles; Connected and autonomous vehicles; cybersecurity; vehicle security operation center; ATTACK DETECTION; EFFICIENT AUTHENTICATION; STATE ESTIMATION; COMMUNICATION; CONTROLLER; INFRASTRUCTURE; CHALLENGES; PLATOONS; SYSTEMS; SERVICE;
D O I
10.1109/TIV.2023.3304762
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With features of collaborative interaction and autonomous decision-making, connected and autonomous vehicles (CAVs) offer a viable solution for a sustainable and efficient future of transportation. However, with the development of CAVs, questions have been raised about weaknesses in cybersecurity and autonomous driving capabilities. In particular, CAVs provide new opportunities for cyberattackers, posing a significant threat to future road and vehicle data security. Therefore, this paper provides a comprehensive analysis of the cybersecurity environment of CAVs. First, we propose a systematic classification of six security threats from cybersecurity principles: false data, information theft, privilege escalation, block communication, and time delay. We review the cybersecurity environment of CAVs from a lifecycle perspective, covering aspects from development to accident, and present the existing cybersecurity countermeasures. These involve security standards designation, verification and validation of vehicle networks, resilient strategies for self-defined driving, and attack detection and digital forensics. Finally, based on our systematic review, we propose a conceptual vehicle security operations center (VSOC) framework that provides valuable inspiration and references for future research and industrial applications for CAVs cybersecurity.
引用
收藏
页码:4484 / 4497
页数:14
相关论文
共 139 条
[1]   MARINE: Man-in-the-Middle Attack Resistant Trust Model in Connected Vehicles [J].
Ahmad, Farhan ;
Kurugollu, Fatih ;
Adnane, Asma ;
Hussain, Rasheed ;
Hussain, Fatima .
IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (04) :3310-3322
[2]   Man-In-The-Middle Attacks in Vehicular Ad-Hoc Networks: Evaluating the Impact of Attackers' Strategies [J].
Ahmad, Farhan ;
Adnane, Asma ;
Franqueira, Virginia N. L. ;
Kurugollu, Fatih ;
Liu, Lu .
SENSORS, 2018, 18 (11)
[3]   Using discriminant analysis to detect intrusions in external communication for self-driving vehicles [J].
Alheeti, Khattab M. Ali ;
Gruebler, Anna ;
McDonald-Maier, Klaus .
DIGITAL COMMUNICATIONS AND NETWORKS, 2017, 3 (03) :180-187
[4]   Impact of Jamming Attacks on Vehicular Cooperative Adaptive Cruise Control Systems [J].
Alipour-Fanid, Amir ;
Dabaghchian, Monireh ;
Zeng, Kai .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (11) :12679-12693
[5]  
[Anonymous], 2020, SAC Standard GB/T 38628-2020
[6]   Novel Deep Learning-Enabled LSTM Autoencoder Architecture for Discovering Anomalous Events From Intelligent Transportation Systems [J].
Ashraf, Javed ;
Bakhshi, Asim D. ;
Moustafa, Nour ;
Khurshid, Hasnat ;
Javed, Abdullah ;
Beheshti, Amin .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2021, 22 (07) :4507-4518
[7]   Broadcast Authentication in Latency-Critical Applications: On the Efficiency of IEEE 1609.2 [J].
Baee, Mir Ali Rezazadeh ;
Simpson, Leonie ;
Foo, Ernest ;
Pieprzyk, Josef .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2019, 68 (12) :11577-11587
[8]   Performance Evaluation for Secure Communications in Mobile Internet of Vehicles With Joint Reactive Jamming and Eavesdropping Attacks [J].
Bajracharya, Chandra .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2022, 23 (11) :22563-22570
[9]   Privacy-Preserving Blockchain-Based Energy Trading Schemes for Electric Vehicles [J].
Baza, Mohamed ;
Sherif, Ahmed ;
Mahmoud, Mohamed M. E. A. ;
Bakiras, Spiridon ;
Alasmary, Waleed ;
Abdallah, Mohamed ;
Lin, Xiaodong .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021, 70 (09) :9369-9384
[10]   Autonomous Vehicles Security: Challenges and Solutions Using Blockchain and Artificial Intelligence [J].
Bendiab, Gueltoum ;
Hameurlaine, Amina ;
Germanos, Georgios ;
Kolokotronis, Nicholas ;
Shiaeles, Stavros .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2023, 24 (04) :3614-3637