Data and Cyber Security in Autonomous Vehicle Networks

Abstract An autonomous vehicle (AV) is a vehicle that operates and performs tasks under its own power. Some features of autonomous vehicle are sensing the environment, collecting information and managing communication with other vehicles. Many autonomous vehicles in development use a combination of cameras, sensors, GPS, radar, LiDAR, and on-board computers. These technologies work together to map the vehicle’s position and its proximity to everything around it. Because of their reliance on these sorts of technologies, which are easily accessible to tampering, a autonomous vehicles are susceptible to cyber attacks if an attacker can discover a weakness in a certain type of vehicle or in a company’s electronic system. This lack of information security can lead to criminal and terrorist acts that eventually cost lives. This paper gives an overview of cyber attack scenarios relating to autonomous vehicles. The cyber security concept proposed here uses biometric data for message authentication and communication, and projects stored and new data based on iris recognition. Iris recognition system can provide other knowledge about drivers as well, such as how tired and sleepy they might be while driving, and they are designed to encrypt the vehicle-to-vehicle and vehicle-to-environment communication based on encryption security mechanisms.

[1]  Jamal Raiyn Handoff self-management based on SNR in mobile communication networks , 2013, Int. J. Wirel. Mob. Comput..

[2]  nbspRehana Parwin,et al.  Iris Recognition Using Dual tree complex transform , 2016 .

[3]  Jamal Raiyn Detection of Objects in Motion—A Survey of Video Surveillance , 2013, IOT 2013.

[4]  Todd E. Humphreys,et al.  A blueprint for civil GPS navigation message authentication , 2014, 2014 IEEE/ION Position, Location and Navigation Symposium - PLANS 2014.

[5]  P. V. V. Kishore,et al.  Survey on Iris Image Analysis , 2017 .

[6]  Abigail L. Bristow,et al.  Detecting and correcting map-matching errors in location based Intelligent Transport Systems , 2010 .

[7]  Alberto Broggi,et al.  Extensive Tests of Autonomous Driving Technologies , 2013, IEEE Transactions on Intelligent Transportation Systems.

[8]  Laxman M. Waghmare,et al.  Iris Biometric Recognition for Person Identification in Security Systems , 2011 .

[9]  Paul A. Zandbergen,et al.  Accuracy of iPhone Locations: A Comparison of Assisted GPS, WiFi and Cellular Positioning , 2009 .

[10]  G. Padmavathi,et al.  A Survey on Various Cyber Attacks and their Classification , 2013, Int. J. Netw. Secur..

[11]  Jannik Fritsch,et al.  Attention-based traffic sign recognition with an array of weak classifiers , 2010, 2010 IEEE Intelligent Vehicles Symposium.

[12]  Rafael Toledo-Moreo,et al.  Lane-Level Integrity Provision for Navigation and Map Matching With GNSS, Dead Reckoning, and Enhanced Maps , 2010, IEEE Transactions on Intelligent Transportation Systems.

[13]  Christoph Schmittner,et al.  Security Application of Failure Mode and Effect Analysis (FMEA) , 2014, SAFECOMP.

[14]  Jamal Raiyn Speed Adaptation in Urban Road Network Management , 2016 .

[15]  Jamal Raiyn Developing Vehicle Locations Strategy on Urban Road , 2017 .

[16]  Frank Kargl,et al.  Revisiting attacker model for smart vehicles , 2014, 2014 IEEE 6th International Symposium on Wireless Vehicular Communications (WiVeC 2014).

[17]  Nader Mohamed,et al.  An Overview of Inter-Vehicular Communication Systems, Protocols and Middleware , 2013, J. Networks.

[18]  Jamal Raiyn Road Traffic Congestion Management Based on a Search-Allocation Approach , 2017 .