Attacks on Self-Driving Cars and Their Countermeasures: A Survey

Intelligent Traffic Systems (ITS) are currently evolving in the form of a cooperative ITS or connected vehicles. Both forms use the data communications between Vehicle-to-Vehicle (V2V), Vehicle-to-Infrastructure (V2I/I2V) and other on-road entities, and are accelerating the adoption of self-driving cars. The development of cyber-physical systems containing advanced sensors, sub-systems, and smart driving assistance applications over the past decade is equipping unmanned aerial and road vehicles with autonomous decision-making capabilities. The level of autonomy depends upon the make-up and degree of sensor sophistication and the vehicle’s operational applications. As a result, self-driving cars are being compromised perceived as a serious threat. Therefore, analyzing the threats and attacks on self-driving cars and ITSs, and their corresponding countermeasures to reduce those threats and attacks are needed. For this reason, some survey papers compiling potential attacks on VANETs, ITSs and self-driving cars, and their detection mechanisms are available in the current literature. However, up to our knowledge, they have not covered the real attacks already happened in self-driving cars. To bridge this research gap, in this paper, we analyze the attacks that already targeted self-driving cars and extensively present potential cyber-attacks and their impacts on those cars along with their vulnerabilities. For recently reported attacks, we describe the possible mitigation strategies taken by the manufacturers and governments. This survey includes recent works on how a self-driving car can ensure resilient operation even under ongoing cyber-attack. We also provide further research directions to improve the security issues associated with self-driving cars.

[1]  Di Ma,et al.  A Functional Co-Design towards Safe and Secure Vehicle Platooning , 2017, CPSS@AsiaCCS.

[2]  Alastair R. Ruddle,et al.  Towards a systematic security evaluation of the automotive Bluetooth interface , 2017, Veh. Commun..

[3]  Stefania Santini,et al.  A Secure Adaptive Control for Cooperative Driving of Autonomous Connected Vehicles in the Presence of Heterogeneous Communication Delays and Cyberattacks , 2020, IEEE Transactions on Cybernetics.

[4]  Tomasz Kryjak,et al.  Real-time hardware–software embedded vision system for ITS smart camera implemented in Zynq SoC , 2018, Journal of Real-Time Image Processing.

[5]  T. Humphreys,et al.  Assessing the Spoofing Threat: Development of a Portable GPS Civilian Spoofer , 2008 .

[6]  Xiangjian He,et al.  A Sybil attack detection scheme for a forest wildfire monitoring application , 2018, Future Gener. Comput. Syst..

[7]  Anis Laouiti,et al.  VANet security challenges and solutions: A survey , 2017, Veh. Commun..

[8]  Jianfeng Ma,et al.  Unified Biometric Privacy Preserving Three-Factor Authentication and Key Agreement for Cloud-Assisted Autonomous Vehicles , 2020, IEEE Transactions on Vehicular Technology.

[9]  Monika Jain,et al.  VANET: Security Attacks, Solution and Simulation , 2018 .

[10]  Yilin Zhao Telematics: Safe and Fun Driving , 2002, IEEE Intell. Syst..

[11]  Netina Tan Electoral Management of Digital Campaigns and Disinformation in East and Southeast Asia , 2020, Election Law Journal: Rules, Politics, and Policy.

[12]  Christof Paar,et al.  Security Requirements Engineering in the Automotive Domain: On Specification Procedures and Implementation Aspects , 2008, Sicherheit.

[13]  Jianfeng Ma,et al.  A Privacy-Preserving Mutual Authentication Resisting DoS Attacks in VANETs , 2017, IEEE Access.

[14]  Junaid Qadir,et al.  Securing Connected & Autonomous Vehicles: Challenges Posed by Adversarial Machine Learning and the Way Forward , 2019, IEEE Communications Surveys & Tutorials.

[15]  Alexander Paz,et al.  Mapping Two Decades of Autonomous Vehicle Research: A Systematic Scientometric Analysis , 2020, Journal of Urban Technology.

[16]  Andrei Costin,et al.  Security of CCTV and Video Surveillance Systems: Threats, Vulnerabilities, Attacks, and Mitigations , 2016, TrustED@CCS.

[17]  Deptt,et al.  A Literature Survey on Security Issues of WSN and Different Types of Attacks in Network , 2017 .

[18]  Riccardo M. G. Ferrari,et al.  A Sliding Mode Observer Approach for Attack Detection and Estimation in Autonomous Vehicle Platoons using Event Triggered Communication , 2019, 2019 IEEE 58th Conference on Decision and Control (CDC).

[19]  Jian Shen,et al.  Secure intelligent traffic light control using fog computing , 2018, Future Gener. Comput. Syst..

[20]  Masud Rana,et al.  IoT-Based Electric Vehicle State Estimation and Control Algorithms Under Cyber Attacks , 2020, IEEE Internet of Things Journal.

[21]  Eric Armengaud,et al.  A Review of Threat Analysis and Risk Assessment Methods in the Automotive Context , 2016, SAFECOMP.

[22]  Matti Valovirta,et al.  Experimental Security Analysis of a Modern Automobile , 2011 .

[23]  Cristina Nita-Rotaru,et al.  Threat Detection for Collaborative Adaptive Cruise Control in Connected Cars , 2018, WISEC.

[24]  A. Boukerche,et al.  Data Communication in VANETs: A Survey, Challenges and Applications , 2014 .

[25]  Shaojing Li,et al.  Invulnerability analysis in intelligent transportation system , 2017, Int. J. High Perform. Syst. Archit..

[26]  Margarida C. Coelho,et al.  Driving Information in a Transition to a Connected and Autonomous Vehicle Environment: Impacts on Pollutants, Noise and Safety , 2020, Transportation Research Procedia.

[27]  Alon Gany,et al.  On-board hydrogen production for auxiliary power in passenger aircraft , 2017 .

[28]  Araz Taeihagh,et al.  Governing autonomous vehicles: emerging responses for safety, liability, privacy, cybersecurity, and industry risks , 2018, Transport Reviews.

[29]  András Kovács,et al.  Enhancements of V2X communication in support of cooperative autonomous driving , 2015, IEEE Communications Magazine.

[30]  Tao Zhang,et al.  Attacks and countermeasures in the internet of vehicles , 2016, Annals of Telecommunications.

[31]  Jonathan Miller,et al.  Cyber Threats Facing Autonomous and Connected Vehicles: Future Challenges , 2017, IEEE Transactions on Intelligent Transportation Systems.

[32]  Yuval Elovici,et al.  Phantom of the ADAS: Phantom Attacks on Driver-Assistance Systems , 2020, IACR Cryptol. ePrint Arch..

[33]  Yang Liu,et al.  Impact Assessment of GNSS Spoofing Attacks on INS/GNSS Integrated Navigation System , 2018, Sensors.

[34]  Feng Lyu,et al.  Vehicular Communication Networks in the Automated Driving Era , 2018, IEEE Communications Magazine.

[35]  Sherali Zeadally,et al.  Autonomous Cars: Research Results, Issues, and Future Challenges , 2019, IEEE Communications Surveys & Tutorials.

[36]  James Evans Governing Cities for Sustainability: A Research Agenda and Invitation , 2019, Front. Sustain. Cities.

[37]  James H. Lambert,et al.  Understanding and managing disaster evacuation on a transportation network. , 2013, Accident; analysis and prevention.

[38]  Antti Hakkala,et al.  Automobile Automation and Lifecycle: How Digitalisation and Security Issues Affect the Car as a Product and Service? , 2019, IntelliSys.

[39]  Flavio D. Garcia,et al.  Dismantling iClass and iClass Elite , 2012, ESORICS.

[40]  Rafi Ud Daula Refat,et al.  Improving CAN bus security by assigning dynamic arbitration IDs , 2020 .

[41]  Manimaran Govindarasu,et al.  Detection of Injection Attacks in In-Vehicle Networks , 2019 .

[42]  Elyes Ben Hamida,et al.  On the Interrelation of Security, QoS, and Safety in Cooperative ITS , 2017, IEEE Transactions on Intelligent Transportation Systems.

[43]  Yong Yin,et al.  Perceptual control architecture for cyber-physical systems in traffic incident management , 2012, J. Syst. Archit..

[44]  Chan Yeob Yeun,et al.  Autonomous Vehicle Security: Conceptual Model , 2019, 2019 IEEE Transportation Electrification Conference and Expo, Asia-Pacific (ITEC Asia-Pacific).

[45]  Homayoun Najjaran,et al.  Deep Learning Sensor Fusion for Autonomous Vehicle Perception and Localization: A Review , 2020, Sensors.

[46]  Antonio Alfredo Ferreira Loureiro,et al.  Intelligent Transport System in Smart Cities , 2018, Urban Computing.

[47]  Mayank Dave,et al.  Secure and efficient key delivery in VANET using cloud and fog computing , 2017, 2017 International Conference on Computer, Communications and Electronics (Comptelix).

[48]  Maode Ma,et al.  A cross-domain group authentication scheme for LTE-A based vehicular network , 2017, 2017 IEEE 9th International Conference on Communication Software and Networks (ICCSN).

[49]  Choong Seon Hong,et al.  Internet of things forensics: Recent advances, taxonomy, requirements, and open challenges , 2019, Future Gener. Comput. Syst..

[50]  Neeraj Kumar,et al.  Blockchain-based security attack resilience schemes for autonomous vehicles in industry 4.0: A systematic review , 2020, Comput. Electr. Eng..

[51]  Florian Sommer,et al.  Survey and Classification of Automotive Security Attacks , 2019, Inf..

[52]  David Elliott,et al.  Recent advances in connected and automated vehicles , 2019, Journal of Traffic and Transportation Engineering (English Edition).

[53]  Catherine M. Burns,et al.  Autonomous Driving in the Real World: Experiences with Tesla Autopilot and Summon , 2016, AutomotiveUI.

[54]  Joarder Kamruzzaman,et al.  Secrecy capacity against adaptive eavesdroppers in a random wireless network using friendly jammers and protected zone , 2020, J. Netw. Comput. Appl..

[55]  T. Humphreys STATEMENT ON THE VULNERABILITY OF CIVIL UNMANNED AERIAL VEHICLES AND OTHER SYSTEMS TO CIVIL GPS , 2012 .

[56]  Steven E. Shladover,et al.  Potential Cyberattacks on Automated Vehicles , 2015, IEEE Transactions on Intelligent Transportation Systems.

[57]  Joarder Kamruzzaman,et al.  Robust Malware Defense in Industrial IoT Applications Using Machine Learning With Selective Adversarial Samples , 2020, IEEE Transactions on Industry Applications.

[58]  Matthew Johnson-Roberson,et al.  Detecting Deception Attacks on Autonomous Vehicles via Linear Time-Varying Dynamic Watermarking , 2020, 2020 IEEE Conference on Control Technology and Applications (CCTA).

[59]  M. Wolf,et al.  W ANNA D RIVE ? Feasible Attack Paths and Effective Protection Against Ransomware in Modern Vehicles , 2017 .

[60]  Nadra Guizani,et al.  Autonomous Driving Cars in Smart Cities: Recent Advances, Requirements, and Challenges , 2020, IEEE Network.

[61]  Liam Paull,et al.  Autonomous Vehicle Navigation in Rural Environments Without Detailed Prior Maps , 2018, 2018 IEEE International Conference on Robotics and Automation (ICRA).

[62]  Mourad Elhadef,et al.  Sybil Attacks in Intelligent Vehicular Ad Hoc Networks: A Review , 2018, MUE/FutureTech.

[63]  A. A. Syed,et al.  Classification of Security Attacks in VANET: A Review of Requirements and Perspectives , 2018 .

[64]  Sevil Sen,et al.  A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV , 2017, Ad Hoc Networks.

[65]  Hyunbum Kim,et al.  Detecting Location Spoofing using ADAS sensors in VANETs , 2019, 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC).

[66]  Manu Bansal,et al.  A review on VANET security attacks and their countermeasure , 2017, 2017 4th International Conference on Signal Processing, Computing and Control (ISPCC).

[67]  Jonathan Petit,et al.  Remote Attacks on Automated Vehicles Sensors : Experiments on Camera and LiDAR , 2015 .

[68]  Keyvan Ansari,et al.  Cloud Computing on Cooperative Cars (C4S): An Architecture to Support Navigation-as-a-Service , 2018, 2018 IEEE 11th International Conference on Cloud Computing (CLOUD).

[69]  Aneta Poniszewska-Marańda,et al.  Security solution methods in the Vehicular Ad-Hoc Networks , 2019, MoMM.

[70]  Hovav Shacham,et al.  Comprehensive Experimental Analyses of Automotive Attack Surfaces , 2011, USENIX Security Symposium.

[71]  William B. Rouse The Systems, Man, and Cybernetics of Driverless Cars: Challenges and Opportunities for the SMCS , 2017, IEEE Systems, Man, and Cybernetics Magazine.

[72]  Mohamed Baza,et al.  Detecting Sybil Attacks Using Proofs of Work and Location in VANETs , 2019, IEEE Transactions on Dependable and Secure Computing.

[73]  Padmalaya Nayak,et al.  A review on DoS attack for WSN: Defense and detection mechanisms , 2017, 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS).

[74]  Babu Sena Paul,et al.  Performance analysis of hybrid WiMAX/DSRC scenarios for vehicular communication environment , 2017 .

[75]  Madeline Cheah,et al.  Context-aware Anomaly Detector for Monitoring Cyber Attacks on Automotive CAN Bus , 2019, CSCS.

[76]  Hafiz Malik,et al.  LiDAR Data Integrity Verification for Autonomous Vehicle , 2019, IEEE Access.

[77]  Sanjay E. Sarma,et al.  A Survey of the Connected Vehicle Landscape—Architectures, Enabling Technologies, Applications, and Development Areas , 2017, IEEE Transactions on Intelligent Transportation Systems.

[78]  Weihua Zhuang,et al.  Infotainment and road safety service support in vehicular networking: From a communication perspective , 2011 .

[79]  G. Abdella,et al.  Disaster management in industrial areas: Perspectives, challenges and future research , 2019, Journal of Industrial Engineering and Management.

[80]  Bas G.B. Stottelaar,et al.  Practical cyber-attacks on autonomous vehicles , 2015 .

[81]  Gongjun Yan,et al.  Trust On the Security of Wireless Vehicular Ad-hoc Networking , 2015, Ad Hoc Sens. Wirel. Networks.

[82]  Qiang Ni,et al.  Driving with Sharks: Rethinking Connected Vehicles with Vehicle Cybersecurity , 2017, IEEE Vehicular Technology Magazine.

[83]  Karuna Babber,et al.  Cross-Layer Designs in Wireless Sensor Networks , 2019 .

[84]  Shabbir Ahmed,et al.  Detecting Attacks Against Safety-Critical ADAS Based on In-Vehicle Network Message Patterns , 2019, 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks – Industry Track.

[85]  Kun Jiang,et al.  An Overview of Attacks and Defences on Intelligent Connected Vehicles , 2019, ArXiv.

[86]  Philipp Wintersberger,et al.  Text Comprehension: Heads-Up vs. Auditory Displays: Implications for a Productive Work Environment in SAE Level 3 Automated Vehicles , 2019, AutomotiveUI.

[87]  Yiheng Feng,et al.  Safety assessment of highly automated driving systems in test tracks: A new framework. , 2020, Accident; analysis and prevention.

[88]  Jamal Raiyn,et al.  Data and Cyber Security in Autonomous Vehicle Networks , 2018, Transport and Telecommunication Journal.

[89]  Andrei Vladyko,et al.  Forecasting Issues of Wireless Communication Networks' Cyber Resilience for An Intelligent Transportation System: An Overview of Cyber Attacks , 2019, Inf..

[90]  Maurice Schellekens Car hacking: Navigating the regulatory landscape , 2016, Comput. Law Secur. Rev..

[91]  Haowen Tan,et al.  Comments on “Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks” , 2018, IEEE Transactions on Intelligent Transportation Systems.

[92]  Abobakr Y. Shahrah,et al.  Adaptive Case Management Framework to Develop Case-based Emergency Response System , 2017 .

[93]  Xingkang He,et al.  Secure Platooning of Autonomous Vehicles Under Attacked GPS Data , 2020, ArXiv.

[94]  Priyanka Soni,et al.  Sybil Node Detection and Prevention Approach on Physical Location in VANET , 2015 .

[95]  Bharadwaj Satchidanandan,et al.  Dynamic Watermarking-based Defense of Transportation Cyber-physical Systems , 2019, ACM Trans. Cyber Phys. Syst..

[96]  Azeem Hafeez,et al.  ECU Fingerprinting through Parametric Signal Modeling and Artificial Neural Networks for In-vehicle Security against Spoofing Attacks , 2019, 2019 15th International Computer Engineering Conference (ICENCO).

[97]  Jin Cui,et al.  A review on safety failures, security attacks, and available countermeasures for autonomous vehicles , 2019, Ad Hoc Networks.

[98]  Kaiqi Xiong,et al.  A Survey on Security Attacks and Defense Techniques for Connected and Autonomous Vehicles , 2020, Comput. Secur..

[99]  Mordechai Guri,et al.  aIR-Jumper: Covert Air-Gap Exfiltration/Infiltration via Security Cameras & Infrared (IR) , 2017, Comput. Secur..

[101]  Ning Lu,et al.  Soft-defined heterogeneous vehicular network: architecture and challenges , 2015, IEEE Network.

[102]  Mashrur Chowdhury,et al.  Cybersecurity Attacks in Vehicle-to-Infrastructure Applications and Their Prevention , 2017, ArXiv.

[103]  Anuj K. Pradhan,et al.  Literature Review of Behavioral Adaptations to Advanced Driver Assistance Systems , 2016 .

[104]  Nik Thompson,et al.  Does high e-government adoption assure stronger security? Results from a cross-country analysis of Australia and Thailand , 2020, Gov. Inf. Q..

[105]  Xinyu Yang,et al.  Data Integrity Attacks Against Dynamic Route Guidance in Transportation-Based Cyber-Physical Systems: Modeling, Analysis, and Defense , 2018, IEEE Transactions on Vehicular Technology.

[106]  Roberto Cipolla,et al.  MultiNet: Real-time Joint Semantic Reasoning for Autonomous Driving , 2016, 2018 IEEE Intelligent Vehicles Symposium (IV).

[107]  Tao Zhang,et al.  Defending Connected Vehicles Against Malware: Challenges and a Solution Framework , 2014, IEEE Internet of Things Journal.

[108]  Khaled M. Elleithy,et al.  Real-Time Detection of DoS Attacks in IEEE 802.11p Using Fog Computing for a Secure Intelligent Vehicular Network , 2019 .

[109]  Ismail Ahmedy,et al.  A Multivariant Stream Analysis Approach to Detect and Mitigate DDoS Attacks in Vehicular Ad Hoc Networks , 2018, Wirel. Commun. Mob. Comput..

[110]  Hyunho Chang,et al.  System architecture of a decision support system for freeway incident management in Republic of Korea , 2008 .

[111]  Suresh Sankaranarayanan,et al.  Traffic Data Classification for Security in IoT-Based Road Signaling System , 2019 .

[112]  Syed Hassan Ahmed,et al.  Named-Data-Networking-Based ITS for Smart Cities , 2017, IEEE Communications Magazine.

[113]  Selo Sulistyo,et al.  Review of Potential Methods for Handover Decision in V2V VANET , 2019, 2019 International Conference on Computer Science, Information Technology, and Electrical Engineering (ICOMITEE).

[114]  Andrew Walenstein,et al.  A Survey of Anomaly Detection for Connected Vehicle Cybersecurity and Safety , 2018, 2018 IEEE Intelligent Vehicles Symposium (IV).

[115]  Mahamod Ismail,et al.  Vehicular communication ad hoc routing protocols: A survey , 2014, J. Netw. Comput. Appl..

[116]  Danwei Wang,et al.  Secure Pose Estimation for Autonomous Vehicles under Cyber Attacks , 2019, 2019 IEEE Intelligent Vehicles Symposium (IV).

[117]  Michael Sivak,et al.  A Survey of Public Opinion about Autonomous and Self-Driving Vehicles in the U.S., the U.K., and Australia , 2014 .

[118]  Flavio D. Garcia,et al.  Lock It and Still Lose It - on the (In)Security of Automotive Remote Keyless Entry Systems , 2016, USENIX Security Symposium.

[119]  Barbara M. Masini,et al.  On the Performance of IEEE 802.11p and LTE-V2V for the Cooperative Awareness of Connected Vehicles , 2017, IEEE Transactions on Vehicular Technology.

[120]  Al-Sakib Khan Pathan Security of Self-Organizing Networks: MANET, WSN, WMN, VANET , 2010 .

[121]  Wathiq Mansoor,et al.  A survey on context-aware vehicular network applications , 2016, Veh. Commun..

[122]  Rafia Inam,et al.  Concerns on the Differences Between AI and System Safety Mindsets Impacting Autonomous Vehicles Safety , 2018, SAFECOMP Workshops.

[123]  Mario Hirz,et al.  Sensor and object recognition technologies for self-driving cars , 2017 .

[124]  Elyes Ben Hamida,et al.  Security in Intelligent Transport Systems for Smart Cities: From Theory to Practice , 2016, Sensors.

[125]  Julio Cesar Sampaio do Prado Leite,et al.  Software Transparency as a Key Requirement for Self-Driving Cars , 2018, 2018 IEEE 26th International Requirements Engineering Conference (RE).

[126]  Keechoo Choi,et al.  A Fixed Sensor-Based Intersection Collision Warning System in Vulnerable Line-of-Sight and/or Traffic-Violation-Prone Environment , 2012, IEEE Transactions on Intelligent Transportation Systems.

[127]  H. Raghav Rao,et al.  Efficiency of critical incident management systems: Instrument development and validation , 2007, Decis. Support Syst..

[128]  Abdullahi Chowdhury Recent Cyber Security Attacks and Their Mitigation Approaches - An Overview , 2016, ATIS.

[129]  Nanhay Singh,et al.  SECURITY CHALLENGES , ISSUES AND THEIR SOLUTIONS FOR VANET , 2013 .

[130]  David G. Kidd,et al.  Rage against the machine? Google's self-driving cars versus human drivers. , 2017, Journal of safety research.

[131]  James Gross,et al.  Experimental Characterization and Modeling of RF Jamming Attacks on VANETs , 2015, IEEE Transactions on Vehicular Technology.

[132]  Xue Liu,et al.  Multi-Channel Based Sybil Attack Detection in Vehicular Ad Hoc Networks Using RSSI , 2019, IEEE Transactions on Mobile Computing.

[133]  Kevin Fu,et al.  Adversarial Sensor Attack on LiDAR-based Perception in Autonomous Driving , 2019, CCS.

[134]  Haibin Zhang,et al.  When Smart Wearables Meet Intelligent Vehicles: Challenges and Future Directions , 2017, IEEE Wireless Communications.

[135]  Woongsun Jeon,et al.  Simultaneous Cyber-Attack Detection and Radar Sensor Health Monitoring in Connected ACC Vehicles , 2021, IEEE Sensors Journal.

[136]  Erik M. Fredericks,et al.  Lightweight Detection and Isolation of Black Hole Attacks in Connected Vehicles , 2017, 2017 IEEE 37th International Conference on Distributed Computing Systems Workshops (ICDCSW).

[137]  Ajay Kaul,et al.  A survey on Intrusion Detection Systems and Honeypot based proactive security mechanisms in VANETs and VANET Cloud , 2018, Veh. Commun..

[138]  Araz Taeihagh,et al.  Autonomous Vehicles for Smart and Sustainable Cities: An In-Depth Exploration of Privacy and Cybersecurity Implications , 2018, ArXiv.

[139]  Soodeh Dadras,et al.  Cybersecurity of Autonomous Vehicle Platooning , 2017 .

[140]  Mawloud Omar,et al.  Securing Vehicular Platooning against Vehicle Platooning Disruption (VPD) Attacks , 2019, 2019 8th International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks (PEMWN).

[141]  Abdulrahman Alarifi,et al.  Increasing Traffic Flows with DSRC Technology: Field Trials and Performance Evaluation , 2018, IECON 2018 - 44th Annual Conference of the IEEE Industrial Electronics Society.

[142]  Shrikant S. Tangade,et al.  A survey on attacks, security and trust management solutions in VANETs , 2013, 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT).

[143]  Paola Salomoni,et al.  A Service-Oriented Approach to Crowdsensing for Accessible Smart Mobility Scenarios , 2016, Mob. Inf. Syst..

[144]  Walid Saad,et al.  Cyber-Physical Security and Safety of Autonomous Connected Vehicles: Optimal Control Meets Multi-Armed Bandit Learning , 2018, IEEE Transactions on Communications.

[145]  Todd E. Humphreys,et al.  Real‐Time GPS Spoofing Detection via Correlation of Encrypted Signals , 2013 .

[146]  Joarder Kamruzzaman,et al.  Detecting Intrusion in the Traffic Signals of an Intelligent Traffic System , 2018, ICICS.

[147]  Ismail Güvenç,et al.  UAV-Enabled Intelligent Transportation Systems for the Smart City: Applications and Challenges , 2017, IEEE Communications Magazine.

[148]  Bruno Sinopoli,et al.  Is your commute driving you crazy?: a study of misbehavior in vehicular platoons , 2015, WISEC.

[149]  Lei Wang,et al.  Trajectory tracking and recovery attacks in VANET systems , 2018, Int. J. Commun. Syst..

[150]  Panagiotis Papadimitratos,et al.  SEROSA: SERvice oriented security architecture for Vehicular Communications , 2013, 2013 IEEE Vehicular Networking Conference.

[151]  Yonggui Liu,et al.  Resilient Control Design of the Third-Order Discrete-Time Connected Vehicle Systems Against Cyber-Attacks , 2020, IEEE Access.

[152]  S. Rhee,et al.  Current status and perspectives on recycling of end-of-life battery of electric vehicle in Korea (Republic of). , 2020, Waste management.

[153]  Chih-Wei Pai,et al.  Human Factors in the Cybersecurity of Autonomous Vehicles: Trends in Current Research , 2019, Front. Psychol..

[154]  Jana Dittmann,et al.  Security threats to automotive CAN networks - Practical examples and selected short-term countermeasures , 2008, Reliab. Eng. Syst. Saf..

[155]  Martin Mullins,et al.  Connected and autonomous vehicles: A cyber-risk classification framework , 2019, Transportation Research Part A: Policy and Practice.

[156]  Sharanjit Singh,et al.  Overview of Various Attacks in VANET , 2015 .

[157]  Yong Tang,et al.  Vehicle detection and recognition for intelligent traffic surveillance system , 2017, Multimedia Tools and Applications.

[158]  Takafumi Asao,et al.  Safety Evaluation of Advanced Driver Assistance Systems as Human-machine Systems , 2017 .

[159]  James T. Curran,et al.  On the use of Low-Cost IMUs for GNSS Spoofing Detection in Vehicular Applications , 2017 .

[160]  Lei Guo,et al.  SDN-Enabled Social-Aware Clustering in 5G-VANET Systems , 2018, IEEE Access.

[161]  Yi-Chang Chiu,et al.  A Sequential Decomposition Framework and Method for Calibrating Dynamic Origin—Destination Demand in a Congested Network , 2017, IEEE Transactions on Intelligent Transportation Systems.

[162]  Fengjun Li,et al.  Cyber-Physical Systems Security—A Survey , 2017, IEEE Internet of Things Journal.

[163]  Zuriati Zukarnain,et al.  Malicious node identification routing and protection mechanism for vehicular ad-hoc network against various attacks , 2018, Int. J. Netw. Virtual Organisations.

[164]  A. Nikitas,et al.  Examining the myths of connected and autonomous vehicles: analysing the pathway to a driverless mobility paradigm , 2019, International Journal of Automotive Technology and Management.

[165]  Todd E. Humphreys,et al.  Evaluation of the vulnerability of phasor measurement units to GPS spoofing attacks , 2012, Int. J. Crit. Infrastructure Prot..

[166]  Andrei G. Vladyko,et al.  VANET/ITS cybersecurity threats: Analysis, categorization and forecasting , 2018, 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus).