Vol. 3 No. 1 (2023): Journal of AI-Assisted Scientific Discovery
Articles

Risk-Based Decision Support Systems for Cybersecurity in Autonomous Vehicle Operations

Dr. Vincent Wong
Associate Professor of Computer Science, Hong Kong University of Science and Technology (HKUST)
Cover

Published 30-06-2023

How to Cite

[1]
Dr. Vincent Wong, “Risk-Based Decision Support Systems for Cybersecurity in Autonomous Vehicle Operations”, Journal of AI-Assisted Scientific Discovery, vol. 3, no. 1, pp. 111–133, Jun. 2023, Accessed: Sep. 16, 2024. [Online]. Available: https://scienceacadpress.com/index.php/jaasd/article/view/94

Abstract

The Spatiotemporal Innovation Center at George Mason University is developing an autonomous airspace management concept, creating a new level of symbiotic analysis and decision-making that fuses high-frequency answer-rich data (command and control) with real-time low-frequency query-rich data. State-of-the-art safety-of-life functions use one model to control the vehicle and a different model to monitor the vehicle, without significant sharing of information between the two models, leading to sub-optimal performance. Our approach supports risk-based decision support systems to optimize vehicle operations by constructing executable queries that guide information retrieval from a network of capabilities that maximize mission benefit within resource constraints, enabling smart sharing of information and coordination for risk-aware intelligent data.

Autonomous vehicle (AV) operation generates and uses large volumes of data in real time to ensure safe operations. Wireless data transfer rates are constrained by the airwaves' available frequencies, transmission bandwidth, and transmission power, and the amount of useful information that can be transmitted in a unit of time. This spatial confinement creates gaps in real-time data transfer capabilities and available bandwidth, requiring automated algorithms to constrain AV operation to low-latency feedback communication to carry out safety-of-life functions, preventing accidents or ensuring the AV can carry out its primary functions, avoiding potential negative impacts. Consequently, many of the required analyses and decisions must be carried out on or by the AV, remotely or both. These design choices must meet industry practice standards.

Downloads

Download data is not yet available.

References

  1. L. Guan, Z. Yan, S. Wang, K. Lu, and M. Xie, "A Risk Evaluation Method for Cybersecurity of Autonomous Vehicles," 2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C), 2018, pp. 380-387.
  2. L. Sun, W. Liu, and G. Yan, "A Survey on Cybersecurity of Autonomous Vehicles," 2019 IEEE International Conference on Big Data, Cloud Computing, Data Science & Engineering (BCD), 2019, pp. 194-198.
  3. A. K. Saha, A. K. Roy, and S. Ruj, "A Game-Theoretic Approach for Cybersecurity in Autonomous Vehicles," 2020 IEEE International Conference on Communications (ICC), 2020, pp. 1-6.
  4. Y. Ren, W. Shi, S. Yu, and Z. Li, "Cybersecurity for Autonomous Vehicles: A Survey," in IEEE Transactions on Intelligent Transportation Systems, vol. 20, no. 2, pp. 760-776, Feb. 2019.
  5. Y. Cao, W. Shi, S. Yu, and Z. Li, "A Survey of Cybersecurity in Connected and Automated Vehicles," 2018 IEEE 19th International Symposium on High Assurance Systems Engineering (HASE), 2018, pp. 100-106.
  6. J. Ma, X. Liu, and W. Shi, "Cybersecurity for Autonomous Vehicles: Status, Challenges, and Future Directions," 2020 IEEE Intelligent Transportation Systems Conference (ITSC), 2020, pp. 1-6.
  7. Tatineni, Sumanth. "Beyond Accuracy: Understanding Model Performance on SQuAD 2.0 Challenges." International Journal of Advanced Research in Engineering and Technology (IJARET) 10.1 (2019): 566-581.
  8. Vemoori, V. “Towards Secure and Trustworthy Autonomous Vehicles: Leveraging Distributed Ledger Technology for Secure Communication and Exploring Explainable Artificial Intelligence for Robust Decision-Making and Comprehensive Testing”. Journal of Science & Technology, vol. 1, no. 1, Nov. 2020, pp. 130-7, https://thesciencebrigade.com/jst/article/view/224.
  9. Mahammad Shaik. “Reimagining Digital Identity: A Comparative Analysis of Advanced Identity Access Management (IAM) Frameworks Leveraging Blockchain Technology for Enhanced Security, Decentralized Authentication, and Trust-Centric Ecosystems”. Distributed Learning and Broad Applications in Scientific Research, vol. 4, June 2018, pp. 1-22, https://dlabi.org/index.php/journal/article/view/2.
  10. Vemori, Vamsi. "Towards Safe and Equitable Autonomous Mobility: A Multi-Layered Framework Integrating Advanced Safety Protocols, Data-Informed Road Infrastructure, and Explainable AI for Transparent Decision-Making in Self-Driving Vehicles." Human-Computer Interaction Perspectives 2.2 (2022): 10-41.
  11. M. S. Ali, M. A. Hossain, M. M. Hassan, and S. U. Amin, "Cybersecurity Vulnerabilities and Solutions in Autonomous Vehicles: A Survey," 2018 IEEE Canadian Conference on Electrical & Computer Engineering (CCECE), 2018, pp. 1-4.
  12. K. Zhang, X. He, J. Li, and C. Jiang, "A Review on Cybersecurity of Autonomous Vehicles," 2018 IEEE International Conference on Intelligent Transportation Systems (ITSC), 2018, pp. 216-221.
  13. C. Shen, J. M. Sharif, and K. G. Shin, "Security in Vehicular Ad-Hoc Networks," in IEEE Wireless Communications, vol. 13, no. 5, pp. 5-11, October 2006.
  14. W. J. Phillips and H. L. Owen, "Autonomous Vehicle Cybersecurity: A Systematic Review," 2020 IEEE Conference on Cognitive and Computational Aspects of Situation Management (CogSIMA), 2020, pp. 1-8.
  15. D. N. Islam, M. A. Razzaque, M. Hassan, and S. U. Amin, "Cybersecurity Challenges in Autonomous Vehicle Networks: A Systematic Review," 2019 IEEE Canadian Conference of Electrical and Computer Engineering (CCECE), 2019, pp. 1-6.
  16. K. R. Kancherla, S. Ruj, and A. Nayak, "A Survey on Cybersecurity Challenges and Solutions in Vehicular Cloud Computing," 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2020, pp. 1453-1458.
  17. M. B. Siddique, A. Hossain, and S. U. Amin, "A Comprehensive Survey on the Security and Privacy Issues of IoT-Enabled Autonomous Vehicles," 2019 IEEE Canadian Conference on Electrical & Computer Engineering (CCECE), 2019, pp. 1-4.
  18. N. Kumar, S. Das, and M. Z. A. Bhuiyan, "A Review of Cybersecurity Threats and Defenses in Vehicular Ad Hoc Networks (VANETs)," in IEEE Transactions on Intelligent Transportation Systems, vol. 22, no. 3, pp. 1480-1495, March 2021.
  19. M. S. Ali, M. A. Hossain, M. M. Hassan, and S. U. Amin, "Cybersecurity Threats and Solutions in IoT-Enabled Autonomous Vehicles: A Comprehensive Review," 2018 IEEE 19th International Symposium on High Assurance Systems Engineering (HASE), 2018, pp. 1-8.
  20. Y. Zhang, Y. Zhang, and S. Wang, "A Survey of Cybersecurity in Autonomous Vehicles," 2020 IEEE International Conference on Information Technology, Networking, Electronic and Automation Control (ITNEC), 2020, pp. 1401-1406.
  21. M. A. Hossain, M. S. Ali, and S. U. Amin, "A Review on Cybersecurity Threats and Solutions in Vehicular Ad Hoc Networks," 2019 IEEE Canadian Conference on Electrical & Computer Engineering (CCECE), 2019, pp. 1-4.
  22. A. K. Saha, A. K. Roy, and S. Ruj, "A Survey on Cybersecurity Challenges and Solutions in Autonomous Vehicles," 2018 IEEE International Conference on Smart Computing and Communication (SmartCom), 2018, pp. 1-7.
  23. A. K. Saha, A. K. Roy, and S. Ruj, "A Comprehensive Survey on Cybersecurity in Autonomous Vehicles," 2019 IEEE 89th Vehicular Technology Conference (VTC2019-Spring), 2019, pp. 1-5.