A Zero Trust Architecture for Connected and Autonomous Vehicles

J Anderson, Q Huang, L Cheng… - IEEE Internet Computing, 2023 - ieeexplore.ieee.org
Connected and autonomous vehicles (CAVs) are the future of personal and public
transportation, but many security issues exist related to the communication and activity of …

A zero trust architecture for next generation automobiles

VB Kondaveety, H Lamkuche, S Prasad - AIP Conference Proceedings, 2022 - pubs.aip.org
Connected cars and autonomous cars are a subset of the next-generation automobile where
the decision to drive is dependent and driven on data generated by various sensors …

A Survey of Security Mechanisms for Edge Computing based Connected Autonomous Vehicles

S Gupta, C Maple - Authorea Preprints, 2023 - techrxiv.org
Connected and autonomous vehicles (CAVs) can fulfill the emerging demand for smart
transportation on a global scale. Such innovations for transportation can bring manyfold …

Towards zero trust security in connected vehicles: A comprehensive survey

M Annabi, A Zeroual, N Messai - Computers & Security, 2024 - Elsevier
Zero Trust is the new cybersecurity model that challenges the traditional one by promoting
continuous verification of users, devices, and applications, whatever their position or origin …

Design and analysis of secure and dependable automotive CPS: A steer-by-wire case study

A Munir, F Koushanfar - IEEE Transactions on Dependable and …, 2018 - ieeexplore.ieee.org
The next generation of automobiles (also known as cybercars) will increasingly incorporate
electronic control units (ECUs) in novel automotive control applications. Recent work has …

Emerging privacy and trust issues for autonomous vehicle systems

TH Nguyen, TG Vu, HL Tran… - 2022 International …, 2022 - ieeexplore.ieee.org
In the awakening of cutting-edge technology, companies such as Apple, Waymo, and Tesla
are racing to launch the industry's first fully autonomous car. Besides the technical …

Designing security for in-vehicle networks: a Body Control Module (BCM) centered viewpoint

B Groza, HE Gurban, PS Murvay - 2016 46th Annual IEEE/IFIP …, 2016 - ieeexplore.ieee.org
The overabundance of attacks reported on in-vehicle networks triggered reactions from both
the academic research communities and industry professionals. However, designing …

Securing vehicle-to-everything (V2X) communication platforms

M Hasan, S Mohan, T Shimizu… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Modern vehicular wireless technology enables vehicles to exchange information at any time,
from any place, to any network-forms the vehicle-to-everything (V2X) communication …

Cyber security analysis of connected vehicles

MD Mwanje, O Kaiwartya, M Aljaidi… - IET Intelligent …, 2024 - Wiley Online Library
The sensor‐enabled in‐vehicle communication and infrastructure‐centric vehicle‐to‐
everything (V2X) communications have significantly contributed to the spark in the amount of …

Security and privacy in automotive on-board networks

H Schweppe - 2012 - pastel.hal.science
Electronic equipment has become an integral part of a vehicle's network architecture, which
consists of multiple buses and microcontrollers called Electronic Control Units (ECUs) …