Novel Approaches to Evaluate the Ability of Vehicles for Secured Transportation

The assurance of process safety plays an important role in the field of information technology. Securing the information has become one of the biggest challenges in the present day. Whenever we think about the protected systems the first thing that comes to our mind can be malicious interventions which are increasing immensely day by day. Nowadays we live the world of huge automotive developments with the appearance of the demand for autonomous vehicles. On the other hand, technological developments also provide a lot of advantages for the society. The benefits of autonomous cars include reduced mobility costs, increased safety, increased mobility, significant reduction of traffic collisions. However, it cannot be forgotten that the extension of cyberspace affects the transportation increasingly. Accordingly, cars are produced with high level of connectivity and automation. Therefore, the risks arriving from the cyberspace can now endanger the safe and secured transportation. These tendencies shall motivate manufacturers and developers to permanently improve the ability of vehicles to protect themselves and their passengers.

[1]  Hovav Shacham,et al.  Comprehensive Experimental Analyses of Automotive Attack Surfaces , 2011, USENIX Security Symposium.

[2]  Laszlo Kis,et al.  High precision GPS positioning with multiple receivers using carrier phase technique and sensor fusion , 2013 .

[3]  Rick Salay,et al.  An Analysis of ISO 26262: Machine Learning and Safety in Automotive Software , 2018 .

[4]  Kasthurirangan Gopalakrishnan,et al.  CRACK DAMAGE DETECTION IN UNMANNED AERIAL VEHICLE IMAGES OF CIVIL INFRASTRUCTURE USING PRE-TRAINED DEEP LEARNING MODEL , 2018 .

[5]  Lynn Batten,et al.  Cyber security attacks to modern vehicular systems , 2017, J. Inf. Secur. Appl..

[6]  Giancarmine Fasano,et al.  Multi-UAV Carrier Phase Differential GPS and Vision-based Sensing for High Accuracy Attitude Estimation , 2018, Journal of Intelligent & Robotic Systems.

[7]  Daniel Watzenig,et al.  Functional Safety of Automated Driving Systems: Does ISO 26262 Meet the Challenges? , 2017 .

[8]  Syed S. H. Rizvi,et al.  A Threat to Vehicular Cyber Security and the Urgency for Correction , 2017 .

[9]  Miklós Telek,et al.  Capacity Planning of Electric Car Charging Station Based on Discrete Time Observations and MAP(2)/G/c Queue , 2018, Period. Polytech. Electr. Eng. Comput. Sci..

[10]  Jean-Marie Flaus,et al.  A safety/security risk analysis approach of Industrial Control Systems: A cyber bowtie - combining new version of attack tree with bowtie analysis , 2018, Comput. Secur..

[11]  Jeremy Bryans,et al.  Building an automotive security assurance case using systematic security evaluations , 2018, Comput. Secur..

[12]  Lingkun Fu,et al.  DoS Attack Energy Management Against Remote State Estimation , 2018, IEEE Transactions on Control of Network Systems.

[13]  Seyed Hossein Razavi Hajiagha,et al.  Fuzzy belief structure based VIKOR method: an application for ranking delay causes of Tehran metro system by FMEA criteria , 2016 .

[14]  Máté Zöldy Legal Barriers of Utilization of Autonomous Vehicles as Part of Green Mobility , 2018, Proceedings of the 4th International Congress of Automotive and Transport Engineering (AMMA 2018).

[15]  Gang Qu,et al.  An Entropy Analysis Based Intrusion Detection System for Controller Area Network in Vehicles , 2018, 2018 31st IEEE International System-on-Chip Conference (SOCC).

[16]  István Varga,et al.  Impacts of Autonomous Cars from a Traffic Engineering Perspective , 2016 .

[17]  Maen Ghadi,et al.  Integration of Probability and Clustering Based Approaches in the Field of Black Spot Identification , 2018, Periodica Polytechnica Civil Engineering.