A coalitional security game against data integrity attacks in autonomous vehicle networks

A Anwar, T Halabi, M Zulkernine - Vehicular Communications, 2022 - Elsevier
Autonomous Vehicles (AV) possess an automated driving system that allows the vehicle to
respond to external conditions and provide advanced and intelligent transportation services …

[PDF][PDF] Evaluations of cyber attacks on cooperative control of connected and autonomous vehicles at bottleneck points

HM Ahmad, E Sabouni, W Xiao… - … on Vehicles Security …, 2023 - par.nsf.gov
In this paper we analyze the effect of cyberattacks on cooperative control of connected and
autonomous vehicles (CAVs) at traffic bottleneck points. We focus on three types of such …

Cooperative perception for safe control of autonomous vehicles under lidar spoofing attacks

H Zhang, Z Li, S Cheng, A Clark - arXiv preprint arXiv:2302.07341, 2023 - arxiv.org
Autonomous vehicles rely on LiDAR sensors to detect obstacles such as pedestrians, other
vehicles, and fixed infrastructures. LiDAR spoofing attacks have been demonstrated that …

RiderAuth: A cancelable touch-signature based rider authentication scheme for driverless taxis

S Gupta, K Raja, F Martinelli, B Crispo - Journal of Information Security and …, 2022 - Elsevier
Driverless taxis are now closer to their worldwide launch, however, unsupervised physical
access to the riders can pose unexpected safety and security risks to the connected and …

A puf-based lightweight and secure mutual authentication mechanism for remote keyless entry systems

RP Parameswarath, B Sikdar - GLOBECOM 2022-2022 IEEE …, 2022 - ieeexplore.ieee.org
Keyless entry systems in cars give users the flexibility of unlocking the car door without using
physical keys. Remote Keyless Entry (RKE) system is one of the common types of keyless …

[HTML][HTML] An automotive reference testbed with trusted security services

T Lenard, B Genge, P Haller, A Collen, NA Nijdam - Electronics, 2023 - mdpi.com
While research in the field of automotive systems inclined in the past years towards
technologies such as Vehicle-to-Everything (V2X) or Connected and Automated Vehicle …

An investigation of cyber-attacks and security mechanisms for connected and autonomous vehicles

S Gupta, C Maple, R Passerone - IEEE Access, 2023 - ieeexplore.ieee.org
Connected and autonomous vehicles (CAVs) can fulfill the emerging demand for smart
transportation on a global scale. Such innovations for transportation can bring manyfold …

Trust-based adversary detection in edge computing assisted vehicular networks

NV Abhishek, TJ Lim - Journal of Communications and …, 2022 - ieeexplore.ieee.org
Low-latency requirements of vehicular networks can be met by installing mobile edge hosts
that implement mobile edge computing in the roadside units (RSUs). Adversaries can …

Multichain-Assisted Lightweight Security for Code Mutated False Data Injection Attacks in Connected Autonomous Vehicles

SJ Siddiqi, B Tahir, MA Jan… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Intelligent Transportation Systems (ITSs) comprise a whole infrastructure of conventional
vehicles, Connected Autonomous Vehicles (CAVs), roadside units, and communication …

A Systematic Mapping of Autonomous Vehicle Prototypes: Trends and Opportunities

E Silva, F Soares, W Souza… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Autonomous driving vehicles (ADVs) are the next significant evolution in transportation
systems. Using machine learning techniques supported by strong processing units and …