Cyber-physical risks of hacked Internet-connected vehicles

@article{Vivek2019CyberphysicalRO,
  title={Cyber-physical risks of hacked Internet-connected vehicles},
  author={Skanda Vivek and David Yanni and Peter J. Yunker and Jesse L. Silverberg},
  journal={Physical review. E},
  year={2019},
  volume={100 1-1},
  pages={
          012316
        }
}
The integration of automotive technology with internet connectivity promises to both dramatically improve transportation while simultaneously introducing the potential for new unknown risks. Internet-connected vehicles are like digital data because they can be targeted for malicious hacking. Unlike digital data, however, internet-connected vehicles are cyberphysical systems that physically interact with each other and their environment. As such, the extension of cybersecurity concerns into the… Expand
Cyber security and its impact on CAV safety: Overview, policy needs and challenges
TLDR
This chapter attempts to link the two domains by reviewing recent approaches with regards to risk assessment for CAVs and cyber security, the impacts of cyber security on road safety and the corresponding challenges. Expand
Traffic networks are vulnerable to disinformation attacks
TLDR
This work considers urban traffic networks and focuses on fake information that manipulates drivers’ decisions to create congestion at a city scale, proving that finding an optimal solution is computationally intractable and implying that the adversary has no choice but to settle for suboptimal heuristics. Expand
Strategic Cyber Effects in Complex Systems: Understanding the US Air Transportation Sector
  • C. Harry, Skanda Vivek
  • Computer Science
  • 2021 13th International Conference on Cyber Conflict (CyCon)
  • 2021
TLDR
Graph networks of US air infrastructures from the Department of Transportation are used to develop the Strategic Disruption Index (SDI), a means to assess the loss of effective transportation network capacity of passengers resulting from various cyber attack scenarios. Expand
Why is Internet of Autonomous Vehicles not as Plug and Play as We Think ? Lessons to Be Learnt From Present Internet and Future Directions
TLDR
An extensive overview of the research challenges in the IAVs is presented and how the network-oriented cooperative client-server model will give way to a more unorthodox and ‘selfish’ decentralized and peer-to-peer (P2P) model is shown. Expand
In Defense of 5G: National Security and Patent Rights Under the Public Interest Factors
Section 337 of the Tariff Act of 1930 authorizes the International Trade Commission (ITC) to stop—or “exclude”—patent-infringing imports. Exclusion orders protect the country against unfair tradeExpand
Automotive in "The Stack": a Cross-sectional View of the Field from Earth, through Platforms and Nonhuman Users to Anti-Users
  • Giorgio Pizzi
  • Computer Science
  • 2020 AEIT International Conference of Electrical and Electronic Technologies for Automotive (AEIT AUTOMOTIVE)
  • 2020
TLDR
This article scans the automotive field and more in general mobility and smart cities, going up the six interconnected layers of The Stack (Earth – Cloud – City – Address – Interface – User), and introduces the "Anti-User", the category of users that are pushed towards a future sometimes utopian, dystopian scenarios also arise. Expand
Observability of Network Systems: A Critical Review of Recent Results
TLDR
This work reviews with a critical mindset the literature of observability of dynamical systems, counterpoising the pros and cons of different approaches in the context of network systems. Expand
Secure and secret cooperation in robot swarms
TLDR
The results presented in this work demonstrate the feasibility of using Merkle trees as a cooperation mechanism for swarm robotics systems in both simulation and real-robot experiments, which has implications for future decentralized robotics applications where security plays a crucial role. Expand
Managing for Security
Although security and safety can both be traced back to antiquity, security was only recognised as a serious problem in the 1980s. At that time safety had already an accepted set of methods andExpand
Selected Topics in Continuum Percolation Phase Transitions , Cover Times and Random Fractals
Mussini, F. 2019. Selected Topics in Continuum Percolation. Phase Transitions, Cover Times and Random Fractals. Uppsala Dissertations in Mathematics 117. 54 pp. Uppsala: Department of Mathematics.Expand
...
1
2
...

References

SHOWING 1-10 OF 44 REFERENCES
Cybersecurity in the age of autonomous vehicles, intelligent traffic controls and pervasive transportation networks
  • C. Axelrod
  • Computer Science
  • 2017 IEEE Long Island Systems, Applications and Technology Conference (LISAT)
  • 2017
TLDR
This paper discusses the cybersecurity consequences of the current uncoordinated evolution of these systems-of-systems and describes how such risks might be mitigated by, among other approaches, proactively introducing cybersecurity requirements early in the design, development and deployment process. Expand
Driving with Sharks: Rethinking Connected Vehicles with Vehicle Cybersecurity
TLDR
The in-vehicle network architecture is illustrated and the latest defending mechanisms designed to mitigate such threats including malware attacks, on-board diagnostic vulnerabilities, and automobile apps threats are demonstrated. Expand
Cyber Threats Facing Autonomous and Connected Vehicles: Future Challenges
TLDR
A large volume of publicly accessible literature is reviewed and compartmentalized based on the vulnerabilities identified and mitigation techniques developed to minimize future cyber security risks in the connected and autonomous vehicle sector. Expand
Security vulnerabilities of connected vehicle streams and their impact on cooperative driving
TLDR
This study presents a first look at the effects of security attacks on the communication channel as well as sensor tampering of a connected vehicle stream equipped to achieve CACC, and shows that an insider attack can cause significant instability in the CACC vehicle stream. Expand
Intrusion detection in VANETs through verification of vehicle movement data
TLDR
An innovative signature based intrusion detection method that verifies vehicle movement data by applying a plausibility model is proposed that can be used to detect on the one hand road side attackers simulating faked traffic congestions and on the other hand attackers that try to deny real congestions by inserting moving vehicles into the network. Expand
Cyber Security Deception
TLDR
This chapter discusses how the use of deception can play a prominent role in enhancing the security of current computer systems, and presents a framework where deception can be planned and integrated into computer defenses. Expand
Congested traffic states in empirical observations and microscopic simulations
  • Treiber, Hennecke, Helbing
  • Physics, Medicine
  • Physical review. E, Statistical physics, plasmas, fluids, and related interdisciplinary topics
  • 2000
TLDR
It is shown that the results of the microscopic model can be understood by formulating the theoretical phase diagram for bottlenecks in a more general way, and a local drop of the road capacity induced by parameter variations has essentially the same effect as an on-ramp. Expand
Switch between critical percolation modes in city traffic dynamics
TLDR
One mode of city traffic during nonrush hours or days off has similar critical percolation characteristics as small world networks, while the other mode during rush hours on working days tends to behave as a 2D lattice. Expand
Percolation of hierarchical networks and networks of networks
TLDR
This work develops an analytic solution for both single and interdependent networks of the hierarchical structure of many networks and finds that depending on the number of levels in the hierarchy there may be multiple transitions in the giant component (fraction of interconnected nodes), as the network separates at the various levels. Expand
Resilience of Self-Organised and Top-Down Planned Cities—A Case Study on London and Beijing Street Networks
TLDR
It is found that top-down planned Beijing with its higher average degree in the dual space and assortativity in the primal space is more robust than self-organised London using the measures of maximum and second largest cluster size and network efficiency. Expand
...
1
2
3
4
5
...