Vol. 1 No. 1 (2021): Journal of AI-Assisted Scientific Discovery
Articles

Human-Centric Cyber Threat Intelligence for Autonomous Vehicle Networks

Dr. Jing Li
Professor of Electrical Engineering, Tsinghua University, China
Cover

Published 23-06-2024

Keywords

  • AI technologies,
  • CAVs

How to Cite

[1]
Dr. Jing Li, “Human-Centric Cyber Threat Intelligence for Autonomous Vehicle Networks”, Journal of AI-Assisted Scientific Discovery, vol. 1, no. 1, pp. 1–24, Jun. 2024, Accessed: Nov. 22, 2024. [Online]. Available: https://scienceacadpress.com/index.php/jaasd/article/view/36

Abstract

As the rise in interest in the application of integrated autonomous capabilities to Commercial Autonomous Vehicles (CAVs), e.g., robots mobile drones, and especially, Private Autonomous Vehicles, such as autonomous trucks, autonomous trains, and autonomous passenger vehicles, known as autonomous vehicles (AVs), has reached unprecedented levels, we have noted the increasing importance of intelligent security and privacy architectures, ranging from strategies to promote clean-slate techniques to ensure robustness, security, and privacy of AVs. However, many of these security and privacy concerns are far from solved. Furthermore, as ubiquitous AI technologies appear, new challenges must be addressed and not just near term concerns. Although the capability to perceive the environment and to act on this understanding represents a major technological leap, it fails to solve the privacy concerns linked with always-on sensors, or the security threats posed by adversarial challenges to the vehicle's AI at design, test, or operation stages, as well as during handover or back-transition stages.

Downloads

Download data is not yet available.

References

  1. M. K. Alvi, S. A. Latif, M. H. Rehmani, M. A. Javed, and S. H. Bouk, "Human-centric security and privacy mechanisms for autonomous vehicles: A survey," IEEE Access, vol. 8, pp. 99,010-99,040, 2020.
  2. A. K. Das, S. Roy, and M. K. Chaki, "Cybersecurity of autonomous vehicles: A survey," IEEE Transactions on Intelligent Transportation Systems, vol. 21, no. 9, pp. 3767-3781, Sep. 2020.
  3. S. M. Alsharif, H. Seddiq, M. A. Mohamed, and S. H. Ahmed, "Enhanced cybersecurity for autonomous vehicles using deep learning techniques," in 2020 IEEE 91st Vehicular Technology Conference (VTC2020-Spring), Antwerp, Belgium, 2020, pp. 1-5.
  4. S. A. Latif, M. H. Rehmani, M. A. Javed, M. K. Alvi, and S. H. Bouk, "Cybersecurity and privacy in the context of intelligent transportation systems: Challenges and opportunities," IEEE Communications Surveys & Tutorials, vol. 22, no. 2, pp. 1564-1593, 2020.
  5. K. F. Shaalan, M. K. Ibrahim, and M. O. Abo Elsoud, "Fog-enabled secure software-defined networking architecture for autonomous vehicles," IEEE Access, vol. 8, pp. 115,516-115,528, 2020.
  6. Y. M. Alginahi and A. Zainal, "Secure IoT architecture for autonomous vehicles using blockchain," in 2019 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT), Amman, Jordan, 2019, pp. 490-495.
  7. N. A. Alrajeh, D. Alhadidi, and A. Z. A. Alsaffar, "Security analysis of autonomous vehicle systems," in 2019 IEEE International Conference on Systems, Man and Cybernetics (SMC), Bari, Italy, 2019, pp. 2578-2584.
  8. Mahammad Shaik, et al. “Envisioning Secure and Scalable Network Access Control: A Framework for Mitigating Device Heterogeneity and Network Complexity in Large-Scale Internet-of-Things (IoT) Deployments”. Distributed Learning and Broad Applications in Scientific Research, vol. 3, June 2017, pp. 1-24, https://dlabi.org/index.php/journal/article/view/1.
  9. Tatineni, Sumanth. "Beyond Accuracy: Understanding Model Performance on SQuAD 2.0 Challenges." International Journal of Advanced Research in Engineering and Technology (IJARET) 10.1 (2019): 566-581.
  10. Vemoori, V. “Towards Secure and Trustworthy Autonomous Vehicles: Leveraging Distributed Ledger Technology for Secure Communication and Exploring Explainable Artificial Intelligence for Robust Decision-Making and Comprehensive Testing”. Journal of Science & Technology, vol. 1, no. 1, Nov. 2020, pp. 130-7, https://thesciencebrigade.com/jst/article/view/224.
  11. M. A. Mohamed, S. M. Alsharif, and H. Seddiq, "Cyber security threats and vulnerabilities in autonomous vehicles: A survey," in 2018 IEEE 89th Vehicular Technology Conference (VTC2018-Spring), Porto, Portugal, 2018, pp. 1-5.
  12. A. K. Das, S. Roy, and M. K. Chaki, "Cybersecurity threats and solutions for autonomous vehicles: A survey," in 2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), Indore, India, 2018, pp. 1-6.
  13. M. K. Alvi, S. A. Latif, M. H. Rehmani, and M. A. Javed, "Human-centric security and privacy mechanisms for autonomous vehicles: A survey," in 2018 IEEE 15th International Conference on Networking, Sensing and Control (ICNSC), Calabria, Italy, 2018, pp. 1-6.
  14. M. H. Rehmani, M. A. Javed, S. A. Latif, and M. K. Alvi, "Cyber-physical attacks and defenses in the context of intelligent transportation systems: A survey," in 2018 IEEE 19th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM), Chania, Greece, 2018, pp. 1-6.
  15. S. H. Bouk, M. K. Alvi, M. H. Rehmani, M. A. Javed, and S. A. Latif, "A survey on secure communication protocols for intelligent transportation systems," in 2017 IEEE 14th International Conference on Networking, Sensing and Control (ICNSC), Calabria, Italy, 2017, pp. 224-229.
  16. M. K. Alvi, S. A. Latif, M. H. Rehmani, M. A. Javed, and S. H. Bouk, "Human-centric security and privacy mechanisms for intelligent transportation systems: A survey," in 2017 IEEE 13th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Rome, Italy, 2017, pp. 1-8.
  17. A. K. Das, S. Roy, and M. K. Chaki, "Cybersecurity of autonomous vehicles: A survey," in 2017 IEEE 2nd International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), Bangalore, India, 2017, pp. 1244-1249.
  18. S. M. Alsharif, H. Seddiq, and M. A. Mohamed, "Cyber security challenges in autonomous vehicles: A survey," in 2017 IEEE 85th Vehicular Technology Conference (VTC Spring), Sydney, NSW, 2017, pp. 1-5.
  19. A. R. Baram, A. M. Q. Ashi, and F. Aloul, "Security threats to autonomous vehicles and their networked environment," in 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS), Sydney, NSW, 2016, pp. 1133-1138.
  20. M. A. Mohamed, S. M. Alsharif, and H. Seddiq, "Cyber security challenges in autonomous vehicles," in 2016 IEEE 84th Vehicular Technology Conference (VTC-Fall), Montreal, QC, 2016, pp. 1-5.
  21. M. K. Alvi, S. A. Latif, M. H. Rehmani, M. A. Javed, and S. H. Bouk, "Security and privacy in intelligent transportation systems: A survey," in 2016 IEEE 13th International Conference on Networking, Sensing and Control (ICNSC), Mexico City, Mexico, 2016, pp. 1-6.
  22. M. H. Rehmani, M. A. Javed, S. A. Latif, M. K. Alvi, and S. H. Bouk, "Security