Vol. 3 No. 2 (2023): Journal of AI-Assisted Scientific Discovery
Articles

Adaptive Cybersecurity Measures for Autonomous Vehicle Communication Networks

Dr. Eric Verschueren
Professor of Electrical Engineering, Ghent University, Belgium
Cover

Published 30-12-2023

How to Cite

[1]
Dr. Eric Verschueren, “Adaptive Cybersecurity Measures for Autonomous Vehicle Communication Networks”, Journal of AI-Assisted Scientific Discovery, vol. 3, no. 2, pp. 177–198, Dec. 2023, Accessed: Sep. 18, 2024. [Online]. Available: https://scienceacadpress.com/index.php/jaasd/article/view/96

Abstract

[1] A CAV (Connected Autonomous Vehicle) is a representative of the intelligent vehicle in the era, integrating vehicle electronics, V2x (Vehicle to Everything) communication, and artificial intelligence. According to the sensor data, vehicle state data and vehicle control commands, V2x communication, and system, subsystem and component characteristics and limitations, the network security detection, response and repair optimization in the adaptive cybersecurity defense of CAV are described. This work connected uplink intrusion detection and response in the CAV network from the broad aspects of detection technology, recognition and isolation of intrusion source, response and repair time optimization. The purpose of this work is to study the adaptive network security defense of CAV from the aspects of off-vehicle and on-vehicle human-machine interfaces.[2] The core of the CAV is to automatically connect vehicles with each other and various living and working objects through wireless communication technology, and use perception technology to realize environmental perception with various on-board sensors. The adaptive cybersecurity defense method and system based on V2x communication network is designed. When the vehicle detects abnormal network traffic and single-element performance state data, generates an alert and reports to the IDaaS(N) system as attack or fault source information, the IDaaS(N) system sends judgment and defense command to the V2x communication network elements and network drivers for the detection and response tool VNS countermeasures, the VNS countermeasures modify the driver of network elements as needed, reconfigure network topologies, and isolate the intrusion; when the abnormal network traffic continues for a certain time period, the adaptive cybersecurity defense system generates an intrusion report, alarm and response command for the human–machine interface, and judges the probability.

Downloads

Download data is not yet available.

References

  1. [1] V. Kumar Kukkala, S. Vignesh Thiruloga, and S. Pasricha, "Roadmap for Cybersecurity in Autonomous Vehicles," 2022. [PDF]
  2. [2] S. A. Abdel Hakeem, H. H. Hussein, and H. W. Kim, "Security Requirements and Challenges of 6G Technologies and Applications," 2022. ncbi.nlm.nih.gov
  3. [3] S. N. Saadatmand, "Finding the ground states of symmetric infinite-dimensional Hamiltonians: explicit constrained optimizations of tensor networks," 2019. [PDF]
  4. [4] Y. Baek and S. Shin, "CANon: Lightweight and Practical Cyber-Attack Detection for Automotive Controller Area Networks," 2022. ncbi.nlm.nih.gov
  5. [5] R. Singh Rathore, C. Hewage, O. Kaiwartya, and J. Lloret, "In-Vehicle Communication Cyber Security: Challenges and Solutions," 2022. ncbi.nlm.nih.gov
  6. [6] J. Manuel Lozano Domínguez and T. Jesús Mateo Sanguino, "Review on V2X, I2X, and P2X Communications and Their Applications: A Comprehensive Analysis over Time," 2019. ncbi.nlm.nih.gov
  7. [7] D. Haileselassie Hagos and D. B. Rawat, "Recent Advances in Artificial Intelligence and Tactical Autonomy: Current Status, Challenges, and Perspectives," 2022. ncbi.nlm.nih.gov
  8. [8] V. Linkov, P. Zámečník, D. Havlíčková, and C. W. Pai, "Human Factors in the Cybersecurity of Autonomous Vehicles: Trends in Current Research," 2019. ncbi.nlm.nih.gov
  9. Tatineni, Sumanth. "Compliance and Audit Challenges in DevOps: A Security Perspective." International Research Journal of Modernization in Engineering Technology and Science 5.10 (2023): 1306-1316.
  10. Vemori, Vamsi. "From Tactile Buttons to Digital Orchestration: A Paradigm Shift in Vehicle Control with Smartphone Integration and Smart UI–Unveiling Cybersecurity Vulnerabilities and Fortifying Autonomous Vehicles with Adaptive Learning Intrusion Detection Systems." African Journal of Artificial Intelligence and Sustainable Development3.1 (2023): 54-91.
  11. Shaik, Mahammad, Leeladhar Gudala, and Ashok Kumar Reddy Sadhu. "Leveraging Artificial Intelligence for Enhanced Identity and Access Management within Zero Trust Security Architectures: A Focus on User Behavior Analytics and Adaptive Authentication." Australian Journal of Machine Learning Research & Applications 3.2 (2023): 1-31.
  12. Tatineni, Sumanth. "Security and Compliance in Parallel Computing Cloud Services." International Journal of Science and Research (IJSR) 12.10 (2023): 972-1977.
  13. [13] S. Dolev, Łukasz Krzywiecki, N. Panwar, and M. Segal, "Vehicle Authentication via Monolithically Certified Public Key and Attributes," 2015. [PDF]
  14. [14] S. Ali Siddiqui, A. Mahmood, Q. Z. Sheng, H. Suzuki et al., "Towards a Machine Learning Driven Trust Management Heuristic for the Internet of Vehicles," 2023. ncbi.nlm.nih.gov
  15. [15] A. Dinesh Kumar, K. Naga Renu Chebrolu, V. R, and S. KP, "A Brief Survey on Autonomous Vehicle Possible Attacks, Exploits and Vulnerabilities," 2018. [PDF]
  16. [16] S. M Mostaq Hossain, S. Banik, T. Banik, and A. Md Shibli, "Survey on Security Attacks in Connected and Autonomous Vehicular Systems," 2023. [PDF]
  17. [17] S. Bharati, P. Podder, M. Rubaiyat Hossain Mondal, and M. Robiul Alam Robel, "Threats and Countermeasures of Cyber Security in Direct and Remote Vehicle Communication Systems," 2020. [PDF]
  18. [18] C. Oham, R. Jurdak, and S. Jha, "Risk Analysis Study of Fully Autonomous Vehicle," 2019. [PDF]
  19. [19] M. Hamad, A. Finkenzeller, M. Kühr, A. Roberts et al., "REACT: Autonomous Intrusion Response System for Intelligent Vehicles," 2024. [PDF]
  20. [20] S. Park and J. Y. Choi, "Hierarchical Anomaly Detection Model for In-Vehicle Networks Using Machine Learning Algorithms," 2020. ncbi.nlm.nih.gov
  21. [21] M. Chowdhury, M. Islam, and Z. Khan, "Security of Connected and Automated Vehicles," 2020. [PDF]
  22. [22] A. Qayyum, M. Usama, J. Qadir, and A. Al-Fuqaha, "Securing Connected & Autonomous Vehicles: Challenges Posed by Adversarial Machine Learning and The Way Forward," 2019. [PDF]
  23. [23] K. Bakhsh Kelarestaghi, M. Foruhandeh, K. Heaslip, and R. Gerdes, "Vehicle Security: Risk Assessment in Transportation," 2018. [PDF]
  24. [24] G. Cui, W. Zhang, Y. Xiao, L. Yao et al., "Cooperative Perception Technology of Autonomous Driving in the Internet of Vehicles Environment: A Review," 2022. ncbi.nlm.nih.gov
  25. [25] F. Berman, E. Cabrera, A. Jebari, and W. Marrakchi, "The impact universe—a framework for prioritizing the public interest in the Internet of Things," 2022. ncbi.nlm.nih.gov