Privacy and Integrity Considerations in Hyperconnected Autonomous Vehicles
@article{Karnouskos2018PrivacyAI, title={Privacy and Integrity Considerations in Hyperconnected Autonomous Vehicles}, author={Stamatis Karnouskos and Florian Kerschbaum}, journal={Proceedings of the IEEE}, year={2018}, volume={106}, pages={160-170} }
The rapid advances in technology can be witnessed in the emergence of cyber–physical systems that pertain to several domains of our society. In transportation, we see the emergence of self-driving vehicles that utilize a multitude of sensors and intelligent learning techniques to navigate autonomously. Such vehicles are complex cyber–physical systems that are mobile and due to their sensor and intrinsic intelligence are able to collect, analyze, and capitalize upon an unprecedented amount of…
48 Citations
Emerging Privacy Challenges and Approaches in CAV Systems
- Computer ScienceLiving in the Internet of Things (IoT 2019)
- 2019
This work categorises the emerging privacy challenges and solutions for CAV systems and identifies the knowledge gap for future research, which will minimise and mitigate privacy concerns without hampering the efficacy of the functions.
Networks of Trusted Execution Environments for Data Protection in Cooperative Vehicular Systems
- Computer ScienceAdvances in Intelligent Systems and Computing
- 2020
A survey of Networks of Trusted Execution Environments (NTEE) architectures identifies three main families of consensus protocols and analyzes their architectures, performance, and security, including improvements brought by the TEE.
A Comparison of Privacy Enhancing Technologies in Internet of Vehicle Systems
- Computer Science
- 2020
This thesis follows a structured approach towards mitigating privacy leakage by applying the privacy enhancing technologies (PETs) identified in this thesis paper (encryption and attribute based credential), to help in protecting the information exchanged between each IoV’s involved in communication.
Security and Privacy Challenges in 5G-Enabled Vehicular Networks
- Computer ScienceIEEE Network
- 2020
The infrastructure of 5G-enabled vehicular networks is presented, the essential security and privacy aspects of V2X in LTE specified by 3GPP are introduced, and several candidate solutions are proposed, including secure group setup with privacy preservation, distributed group key management, and cooperative message authentication are proposed.
Cognitive Dynamic System for Future RACE Vehicles in Smart Cities: A Risk Control Perspective
- Computer ScienceIEEE Internet of Things Magazine
- 2019
A new class of future vehicles, namely risk-sensitive, autonomous, connected, and electric (RACE) vehicles, to cope with uncertain attacks and potential threats are envisioned.
A Blockchain-Enabled Federated Learning System with Edge Computing for Vehicular Networks
- Computer Science2021 IEEE Globecom Workshops (GC Wkshps)
- 2021
Bift is proposed: a fully decentralized machine learning system combined with federated learning and blockchain to provide a privacy-preserving ML process for CAVs to train machine learning models locally using their own driving data and upload the local models to the nearest mobile edge computing node (MECN) to get a better global model.
Challenges and Opportunities of Named Data Networking in Vehicle-To-Everything Communication: A Review
- Computer ScienceInf.
- 2018
A review of forwarding, caching, as well as simulation aspects for V2X communication with a focus on ICN, which suggests directions for further work in context of ICN (in particular Named Data Networking) to enable V2x communication providing a secure and efficient transport platform.
Security and Privacy
- Computer ScienceCellular V2X for Connected Automated Driving
- 2021
This chapter examines C‐V2X security through a more detailed study of different communication formats and interfaces through the standpoint of V2N communications and V2V/V2I interactions.
Toward Privacy-Preserving Valet Parking in Autonomous Driving Era
- Computer ScienceIEEE Transactions on Vehicular Technology
- 2019
Formal security analysis is given to show that the authentication, anonymity, and traceability can be reduced to standard hard assumptions, and performance evaluation demonstrates the proposed protocol is efficient and practical to be implemented in autonomous driving era.
B5G Ultrareliable Low Latency Networks for Efficient Secure Autonomous and Smart Internet of Vehicles
- Computer ScienceMathematical Problems in Engineering
- 2021
This paper has implemented and analyzed the Multiaccess Edge Computing- (MEC-) based architecture for 5G autonomous vehicles based on baseband units (BBU), performed Monte Carlo simulations and plotted curves of propagation latency, handling latency, and total latency in terms of vehicle density.
References
SHOWING 1-10 OF 64 REFERENCES
Security vulnerabilities of connected vehicle streams and their impact on cooperative driving
- Computer ScienceIEEE Communications Magazine
- 2015
This study presents a first look at the effects of security attacks on the communication channel as well as sensor tampering of a connected vehicle stream equipped to achieve CACC, and shows that an insider attack can cause significant instability in the CACC vehicle stream.
Security and Privacy in Smart City Applications: Challenges and Solutions
- Computer ScienceIEEE Communications Magazine
- 2017
This article first introduces promising smart city applications and architecture, then discusses several security and privacy challenges in these applications, and introduces some open issues for future research.
Preserving Location Privacy of Connected Vehicles With Highly Accurate Location Updates
- Computer ScienceIEEE Communications Letters
- 2017
Evaluations show that MOP provides strong privacy protection even under continuous and highly accurate location updates.
Security of Autonomous Systems Employing Embedded Computing and Sensors
- Computer ScienceIEEE Micro
- 2013
This column presents the latest insights on the technical challenges and opportunities associated with the security of autonomous systems from an embedded computing and sensors perspective.
Potential Cyberattacks on Automated Vehicles
- Computer ScienceIEEE Transactions on Intelligent Transportation Systems
- 2015
This paper investigates the potential cyberattacks specific to automated vehicles, with their special needs and vulnerabilities, and analyzes the threats on autonomous automated vehicles and cooperative automated vehicles.
Defending Connected Vehicles Against Malware: Challenges and a Solution Framework
- Computer ScienceIEEE Internet of Things Journal
- 2014
This paper identifies vehicle-specific challenges, discusses existing solutions and their limitations, and presents a cloud-assisted vehicle malware defense framework that can address these challenges.
Plug-In Privacy for Smart Metering Billing
- Computer SciencePETS
- 2011
A privacy-preserving protocol that enables billing with time-of-use tariffs without disclosing the actual consumption profile to the supplier and a performance evaluation of a prototypical implementation is given.
An access control concept for novel automotive HMI systems
- Computer ScienceSACMAT '14
- 2014
A formal model for defining and controlling the access to display areas is presented and proved the validity of this model, and a proof-of-concept implementation is presented to demonstrate the feasibility of the concept.
From Machine-to-Machine to the Internet of Things - Introduction to a New Age of Intelligence
- Computer Science
- 2014
Industrial Cyberphysical Systems: A Backbone of the Fourth Industrial Revolution
- BusinessIEEE Industrial Electronics Magazine
- 2017
Cyberphysical systems (CPSs) are perceived as the pivotal enabler for a new era of real-time Internetbased communication and collaboration among value-chain participants, e.g., devices, systems,…