Vol. 2 No. 1 (2022): Journal of AI-Assisted Scientific Discovery
Articles

Usability Evaluation of Cybersecurity Measures in Autonomous Vehicles: A Human-Computer Interaction Study

Dr. Anke Helsloot
Professor of Human-Computer Interaction, Eindhoven University of Technology, Netherlands
Cover

Published 24-06-2024

Keywords

  • cybersecurity,
  • Usability Evaluation,
  • (UE)

How to Cite

[1]
Dr. Anke Helsloot, “Usability Evaluation of Cybersecurity Measures in Autonomous Vehicles: A Human-Computer Interaction Study”, Journal of AI-Assisted Scientific Discovery, vol. 2, no. 1, pp. 1–24, Jun. 2024, Accessed: Nov. 22, 2024. [Online]. Available: https://scienceacadpress.com/index.php/jaasd/article/view/42

Abstract

This research aims to raise awareness, to close the gap between cybersecurity and Usability Evaluation (UE) principles, but also to open the discourse for emerging approaches to be different. Specific to automotive cybersecurity, to aid in the correct priorities and efficient collaborations between disciplines, a new automotive security ANT model is proposed. From there, the UE and cybersecurity requirements from standards are combined into a new research framework for automotive cybersecurity evaluation.

Downloads

Download data is not yet available.

References

  1. A. Mukherjee, R. S. Sherratt, and D. N. K. Jayakody, "Cyber-security in Autonomous Vehicles: Challenges and Solutions," IEEE Communications Surveys & Tutorials, vol. 21, no. 2, pp. 1558-1575, 2nd quarter 2019.
  2. T. Higuchi, Y. Kimura, and K. Watanabe, "Cybersecurity Risk Management System for Connected Autonomous Vehicles," IEEE Transactions on Intelligent Transportation Systems, vol. 22, no. 6, pp. 3338-3351, June 2021.
  3. A. Y. Javaid, W. Sun, V. K. Devabhaktuni, and M. Alam, "Cybersecurity Threats and Countermeasures in Autonomous Vehicle Networks," IEEE Communications Magazine, vol. 55, no. 12, pp. 142-149, Dec. 2017.
  4. C. Zhang, W. Lin, and L. Sun, "A Survey of Security and Privacy in Connected Autonomous Vehicles," IEEE Communications Surveys & Tutorials, vol. 22, no. 2, pp. 1228-1260, 2nd quarter 2020.
  5. X. Wu, X. Liu, and Y. Zhang, "Security and Privacy in Autonomous Vehicular Networks: Survey and Research Challenges," IEEE Internet of Things Journal, vol. 7, no. 12, pp. 11392-11414, Dec. 2020.
  6. H. Lu, X. Yang, and W. Huang, "Vulnerabilities and Security Challenges of Autonomous Vehicles," IEEE Access, vol. 8, pp. 133190-133210, 2020.
  7. P. J. Phillips et al., "An Introduction to Privacy and Security in Autonomous Vehicles," IEEE Transactions on Intelligent Transportation Systems, vol. 22, no. 7, pp. 4491-4503, July 2021.
  8. J. Petit and S. E. Shladover, "Potential Cyberattacks on Automated Vehicles," IEEE Transactions on Intelligent Transportation Systems, vol. 16, no. 2, pp. 546-556, April 2015.
  9. A. Greenberg, "Hackers Remotely Kill a Jeep on the Highway—With Me in It," IEEE Spectrum, vol. 53, no. 10, pp. 20-21, Oct. 2016.
  10. Tatineni, Sumanth. "Ethical Considerations in AI and Data Science: Bias, Fairness, and Accountability." International Journal of Information Technology and Management Information Systems (IJITMIS) 10.1 (2019): 11-21.
  11. Shaik, Mahammad, et al. "Granular Access Control for the Perpetually Expanding Internet of Things: A Deep Dive into Implementing Role-Based Access Control (RBAC) for Enhanced Device Security and Privacy." British Journal of Multidisciplinary and Advanced Studies 2.2 (2018): 136-160.
  12. Vemoori, V. “Towards Secure and Trustworthy Autonomous Vehicles: Leveraging Distributed Ledger Technology for Secure Communication and Exploring Explainable Artificial Intelligence for Robust Decision-Making and Comprehensive Testing”. Journal of Science & Technology, vol. 1, no. 1, Nov. 2020, pp. 130-7, https://thesciencebrigade.com/jst/article/view/224.
  13. H. Peng, H. Deng, and X. Xu, "A Trust-Based Data Fusion Method for Autonomous Vehicles Under Cybersecurity Attacks," IEEE Transactions on Intelligent Transportation Systems, vol. 23, no. 3, pp. 1632-1645, March 2022.
  14. Y. Li, H. Zhang, and H. Yin, "Secure Communication Protocol for Autonomous Vehicles," IEEE Transactions on Vehicular Technology, vol. 67, no. 8, pp. 6682-6692, Aug. 2018.
  15. T. Zhang et al., "A Survey on Cybersecurity of Autonomous Vehicles: Threats, Challenges, and Countermeasures," IEEE Access, vol. 8, pp. 168823-168852, 2020.
  16. M. Amoozadeh et al., "Security Vulnerabilities of Connected Vehicle Streams and Their Impact on Cooperative Driving," IEEE Communications Magazine, vol. 53, no. 6, pp. 126-132, June 2015.
  17. J. Liu, Y. Xiao, and S. Li, "Cybersecurity and Privacy Issues in Autonomous Vehicles: Survey and Future Directions," IEEE Wireless Communications, vol. 26, no. 4, pp. 38-44, Aug. 2019.
  18. S. R. Pokhrel and J. Choi, "Towards Blockchain-Based Decentralized Trust in Autonomous Vehicle Networks," IEEE Network, vol. 34, no. 6, pp. 72-78, Nov./Dec. 2020.
  19. C. Feng, Y. Shen, and X. Yan, "Cybersecurity for Cooperative Autonomous Driving: Threats and Countermeasures," IEEE Transactions on Intelligent Vehicles, vol. 5, no. 4, pp. 544-555, Dec. 2020.
  20. A. Doupe et al., "Security Challenges and Opportunities in Autonomous Vehicles," IEEE Security & Privacy, vol. 17, no. 1, pp. 16-24, Jan./Feb. 2019.
  21. S. Zheng, L. Wei, and Y. Zhang, "Security Analysis of Deep Learning Models for Autonomous Vehicles," IEEE Transactions on Intelligent Vehicles, vol. 6, no. 1, pp. 73-84, March 2021.
  22. Y. Lyu et al., "Enhanced Security and Privacy in Autonomous Vehicles," IEEE Transactions on Vehicular Technology, vol. 69, no. 4, pp. 4154-4167, April 2020.
  23. C. Liu et al., "Autonomous Vehicles in the Fog and Cloud: Security and Privacy Challenges and Solutions," IEEE Transactions on Intelligent Vehicles, vol. 6, no. 2, pp. 212-225, June 2021.