Security Modeling of Autonomous Systems: A Survey

被引:35
作者
Jahan, Farha [1 ]
Sun, Weiqing [1 ]
Niyaz, Quamar [2 ]
Alam, Mansoor [1 ]
机构
[1] Univ Toledo, Toledo, OH 43606 USA
[2] Purdue Univ Northwest, Hammond, IN 46323 USA
关键词
Cybersecurity; modeling; autonomous system (AS); Unmanned Aerial Vehicles (UAVs); driverless car; robots; CYBER-PHYSICAL SYSTEMS; GOAL-DRIVEN AUTONOMY; SITUATION AWARENESS; UNMANNED SYSTEMS; AUTOMATION; FRAMEWORK; PERFORMANCE; CHALLENGES; WORKLOAD; ATTACKS;
D O I
10.1145/3337791
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Autonomous systems will soon be integrating into our lives as home assistants, delivery drones, and driverless cars. The implementation of the level of automation in these systems from being manually controlled to fully autonomous would depend upon the autonomy approach chosen to design these systems. This article reviews the historical evolution of autonomy, its approaches, and the current trends in related fields to build robust autonomous systems. Toward such a goal and with the increased number of cyberattacks, the security of these systems needs special attention from the research community. To gauge the extent to which research has been done in this area, we discuss the cybersecurity of these systems. It is essential to model the system from a security perspective, identify the threats and vulnerabilities, and then model the attacks. A survey in this direction explores the theoretical/analytical system and attack models that have been proposed over the years and identifies the research gap that needs to be addressed by the research community.
引用
收藏
页数:34
相关论文
共 208 条
[1]  
Abdul-Ghani HA, 2018, INT J ADV COMPUT SC, V9, P355
[2]   Survey on RGB, 3D, Thermal, and Multimodal Approaches for Facial Expression Recognition: History, Trends, and Affect-Related Applications [J].
Adrian Corneanu, Ciprian ;
Oliu Simon, Marc ;
Cohn, Jeffrey F. ;
Escalera Guerrero, Sergio .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2016, 38 (08) :1548-1568
[3]  
Akram RN, 2016, IEEE TRUST BIG, P606, DOI [10.1109/TrustCom.2016.0116, 10.1109/TrustCom.2016.115]
[4]  
Al-kahtani MohammedSaeed., 2012, Signal Processing and Communication Systems (ICSPCS), 2012 6th International Conference on, P1, DOI DOI 10.1109/ICSPCS.2012.6507953
[5]   Cyber-Attack Modeling Analysis Techniques: An Overview [J].
AL-Mohannadi, Hamad ;
Mirza, Qublai ;
Namanya, Anitta ;
Awan, Irfan ;
Cullen, Andrea ;
Disso, Jules .
2016 IEEE 4TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD WORKSHOPS (FICLOUDW), 2016, :69-76
[6]  
Albani Dario., 2017, 2017 14th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS), P1, DOI DOI 10.1109/AVSS.2017.8078478
[7]  
Alemzadeh Homa, 2016, 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). Proceedings, P395, DOI 10.1109/DSN.2016.43
[8]   Cyber-physical systems and their security issues [J].
Alguliyev, Rasim ;
Imamverdiyev, Yadigar ;
Sukhostat, Lyudmila .
COMPUTERS IN INDUSTRY, 2018, 100 :212-223
[9]  
[Anonymous], SPECIAL PUBLICATION
[10]  
[Anonymous], SECURITY ROBOT ACCID