Automated city shuttles: Mapping the key challenges in cybersecurity, privacy and standards to future developments

被引:12
作者
Benyahya, Meriem [1 ]
Collen, Anastasija [1 ]
Kechagia, Sotiria [2 ]
Nijdam, Niels Alexander [1 ]
机构
[1] Univ Geneva, Ctr Univ Informat, Geneva Sch Econ & Management, Geneva, Switzerland
[2] Univ Geneva, Fac Law, Geneva, Switzerland
基金
欧盟地平线“2020”;
关键词
Automated city shuttles; Connected automated vehicles; Shared mobility; Cybersecurity; Data privacy; AUTONOMOUS VEHICLES; INTRUSION DETECTION; SECURITY; COMMUNICATION; SERVICES; ATTACKS; SYSTEMS;
D O I
10.1016/j.cose.2022.102904
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Automated City Shuttles (ACSs) aim to shape the future public transportation and provide more effi-cient and accessible mobility in smart cities. With the absence of a driver, such mini-busses process the sensors' inputs and exchanged data with other vehicles and intelligent transport systems to achieve a real time assimilation of its surroundings. Consequently, the technologies supporting the driverless function-alities ushered new cybersecurity risks and data privacy breaches. Unfortunately, several studies mostly focus on individual Connected-Automated Vehicles (CAV), though intrinsic underpinnings of the ACS's threat vectors remain unexplored. In the present paper, we considerably extend that investigation by proposing a comprehensive state of the art with farsighted analyses addressing security threats and data privacy concerns from both technical and legal perspectives to thwart potential attacks. Moreover, as ex-isting approaches have not provided yet a clear road map about ACS's security standards, the present work sheds light on recent and up to date standards and standardisation bodies dealing with cyberse-curity and privacy issues in the automated driving ecosystem. This paper presents an analysis debating the trade-off between maximising the ACS benefits and minimising the associated security vulnerabilities and attacks through an overview of technical and legal mitigation strategies. .(c) 2022 The Author(s). Published by Elsevier Ltd. This is an open access article under the CC BY license ( http://creativecommons.org/licenses/by/4.0/ )
引用
收藏
页数:23
相关论文
共 233 条
  • [1] ACEA, 2020, ACEA COMM EDPB GUID
  • [2] Security for 5G and Beyond
    Ahmad, Ijaz
    Shahabuddin, Shahriar
    Kumar, Tanesh
    Okwuibe, Jude
    Gurtov, Andrei
    Ylianttila, Mika
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (04) : 3682 - 3722
  • [3] State of the Art of Automated Buses
    Ainsalu, Jaagup
    Arffman, Ville
    Bellone, Mauro
    Ellner, Maximilian
    Haapamaki, Taina
    Haavisto, Noora
    Josefson, Ebba
    Ismailogullari, Azat
    Lee, Bob
    Madland, Olav
    Madzulis, Raitis
    Muur, Jaanus
    Makinen, Sami
    Nousiainen, Ville
    Pilli-Sihvola, Eetu
    Rutanen, Eetu
    Sahala, Sami
    Schonfeldt, Boris
    Smolnicki, Piotr Marek
    Soe, Ralf-Martin
    Saaski, Juha
    Szymanska, Magdalena
    Vaskinn, Ingar
    Aman, Milla
    [J]. SUSTAINABILITY, 2018, 10 (09)
  • [4] Al Mamun A, 2018, 2018 INTERNATIONAL CONFERENCE OF ELECTRICAL AND ELECTRONIC TECHNOLOGIES FOR AUTOMOTIVE
  • [5] Intelligent intrusion detection in external communication systems for autonomous vehicles
    Alheeti, Khattab M. Ali
    McDonald-Maier, Klaus
    [J]. SYSTEMS SCIENCE & CONTROL ENGINEERING, 2018, 6 (01): : 48 - 56
  • [6] An efficient conditional privacy-preserving authentication scheme for Vehicle-To-Infrastructure communication in VANETs
    Ali, Ikram
    Li, Fagen
    [J]. VEHICULAR COMMUNICATIONS, 2020, 22
  • [7] Security and privacy using one-round zero-knowledge proofs
    Almuhammadi, S
    Neuman, C
    [J]. CEC 2005: SEVENTH IEEE INTERNATIONAL CONFERENCE ON E-COMMERCE TECHNOLOGY, PROCEEDINGS, 2005, : 435 - 438
  • [8] [Anonymous], 2010, 102893 ETSI TR
  • [9] [Anonymous], 2018, 262621 ISO
  • [10] [Anonymous], 2021, CENTC278