Privacy and Integrity Considerations in Hyperconnected Autonomous Vehicles

@article{Karnouskos2018PrivacyAI,
  title={Privacy and Integrity Considerations in Hyperconnected Autonomous Vehicles},
  author={Stamatis Karnouskos and Florian Kerschbaum},
  journal={Proceedings of the IEEE},
  year={2018},
  volume={106},
  pages={160-170}
}
The rapid advances in technology can be witnessed in the emergence of cyber–physical systems that pertain to several domains of our society. In transportation, we see the emergence of self-driving vehicles that utilize a multitude of sensors and intelligent learning techniques to navigate autonomously. Such vehicles are complex cyber–physical systems that are mobile and due to their sensor and intrinsic intelligence are able to collect, analyze, and capitalize upon an unprecedented amount of… 

Figures and Tables from this paper

Emerging Privacy Challenges and Approaches in CAV Systems

This work categorises the emerging privacy challenges and solutions for CAV systems and identifies the knowledge gap for future research, which will minimise and mitigate privacy concerns without hampering the efficacy of the functions.

Networks of Trusted Execution Environments for Data Protection in Cooperative Vehicular Systems

A survey of Networks of Trusted Execution Environments (NTEE) architectures identifies three main families of consensus protocols and analyzes their architectures, performance, and security, including improvements brought by the TEE.

A Comparison of Privacy Enhancing Technologies in Internet of Vehicle Systems

This thesis follows a structured approach towards mitigating privacy leakage by applying the privacy enhancing technologies (PETs) identified in this thesis paper (encryption and attribute based credential), to help in protecting the information exchanged between each IoV’s involved in communication.

Security and Privacy Challenges in 5G-Enabled Vehicular Networks

The infrastructure of 5G-enabled vehicular networks is presented, the essential security and privacy aspects of V2X in LTE specified by 3GPP are introduced, and several candidate solutions are proposed, including secure group setup with privacy preservation, distributed group key management, and cooperative message authentication are proposed.

Cognitive Dynamic System for Future RACE Vehicles in Smart Cities: A Risk Control Perspective

A new class of future vehicles, namely risk-sensitive, autonomous, connected, and electric (RACE) vehicles, to cope with uncertain attacks and potential threats are envisioned.

A Blockchain-Enabled Federated Learning System with Edge Computing for Vehicular Networks

Bift is proposed: a fully decentralized machine learning system combined with federated learning and blockchain to provide a privacy-preserving ML process for CAVs to train machine learning models locally using their own driving data and upload the local models to the nearest mobile edge computing node (MECN) to get a better global model.

Challenges and Opportunities of Named Data Networking in Vehicle-To-Everything Communication: A Review

A review of forwarding, caching, as well as simulation aspects for V2X communication with a focus on ICN, which suggests directions for further work in context of ICN (in particular Named Data Networking) to enable V2x communication providing a secure and efficient transport platform.

Security and Privacy

This chapter examines C‐V2X security through a more detailed study of different communication formats and interfaces through the standpoint of V2N communications and V2V/V2I interactions.

Toward Privacy-Preserving Valet Parking in Autonomous Driving Era

Formal security analysis is given to show that the authentication, anonymity, and traceability can be reduced to standard hard assumptions, and performance evaluation demonstrates the proposed protocol is efficient and practical to be implemented in autonomous driving era.

B5G Ultrareliable Low Latency Networks for Efficient Secure Autonomous and Smart Internet of Vehicles

This paper has implemented and analyzed the Multiaccess Edge Computing- (MEC-) based architecture for 5G autonomous vehicles based on baseband units (BBU), performed Monte Carlo simulations and plotted curves of propagation latency, handling latency, and total latency in terms of vehicle density.

References

SHOWING 1-10 OF 64 REFERENCES

Security vulnerabilities of connected vehicle streams and their impact on cooperative driving

This study presents a first look at the effects of security attacks on the communication channel as well as sensor tampering of a connected vehicle stream equipped to achieve CACC, and shows that an insider attack can cause significant instability in the CACC vehicle stream.

Security and Privacy in Smart City Applications: Challenges and Solutions

This article first introduces promising smart city applications and architecture, then discusses several security and privacy challenges in these applications, and introduces some open issues for future research.

Preserving Location Privacy of Connected Vehicles With Highly Accurate Location Updates

Evaluations show that MOP provides strong privacy protection even under continuous and highly accurate location updates.

Security of Autonomous Systems Employing Embedded Computing and Sensors

This column presents the latest insights on the technical challenges and opportunities associated with the security of autonomous systems from an embedded computing and sensors perspective.

Potential Cyberattacks on Automated Vehicles

This paper investigates the potential cyberattacks specific to automated vehicles, with their special needs and vulnerabilities, and analyzes the threats on autonomous automated vehicles and cooperative automated vehicles.

Defending Connected Vehicles Against Malware: Challenges and a Solution Framework

This paper identifies vehicle-specific challenges, discusses existing solutions and their limitations, and presents a cloud-assisted vehicle malware defense framework that can address these challenges.

Plug-In Privacy for Smart Metering Billing

A privacy-preserving protocol that enables billing with time-of-use tariffs without disclosing the actual consumption profile to the supplier and a performance evaluation of a prototypical implementation is given.

An access control concept for novel automotive HMI systems

A formal model for defining and controlling the access to display areas is presented and proved the validity of this model, and a proof-of-concept implementation is presented to demonstrate the feasibility of the concept.

Industrial Cyberphysical Systems: A Backbone of the Fourth Industrial Revolution

Cyberphysical systems (CPSs) are perceived as the pivotal enabler for a new era of real-time Internetbased communication and collaboration among value-chain participants, e.g., devices, systems,
...