Cyber Threats Facing Autonomous and Connected Vehicles: Future Challenges
暂无分享,去创建一个
Jonathan Miller | Paul Ward | Kyle Wilson | Simon Parkinson | S. Parkinson | Paul Ward | Kyle M. Wilson | Jonathan Miller
[1] Alastair R. Ruddle,et al. Cyber Security Risk Analysis for Intelligent Transport Systems and In‐vehicle Networks , 2015 .
[2] Shuzhi Sam Ge,et al. Autonomous vehicle positioning with GPS in urban canyon environments , 2001, Proceedings 2001 ICRA. IEEE International Conference on Robotics and Automation (Cat. No.01CH37164).
[3] Srdjan Capkun,et al. On the requirements for successful GPS spoofing attacks , 2011, CCS '11.
[4] Ronnie D. Caytiles,et al. Security, Vulnerability and Protection of Vehicular On-board Diagnostics , 2016 .
[5] Visvanathan Ramesh,et al. A system for traffic sign detection, tracking, and recognition using color, shape, and motion information , 2005, IEEE Proceedings. Intelligent Vehicles Symposium, 2005..
[6] Hovav Shacham,et al. Comprehensive Experimental Analyses of Automotive Attack Surfaces , 2011, USENIX Security Symposium.
[7] Erland Jonsson,et al. Creating a Secure Infrastructure for Wireless Diagnostics and Software Updates in Vehicles , 2008, SAFECOMP.
[8] Paolo Grisleri,et al. The BRAiVE Autonomous Ground Vehicle Platform , 2010 .
[9] Martial Hebert,et al. Intelligent Unmanned Ground Vehicles: Autonomous Navigation Research at Carnegie Mellon , 1997 .
[10] Wenyuan Xu,et al. Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study , 2010, USENIX Security Symposium.
[11] T. Humphreys,et al. Assessing the Spoofing Threat: Development of a Portable GPS Civilian Spoofer , 2008 .
[12] Josep Domingo-Ferrer,et al. Balanced Trustworthiness, Safety, and Privacy in Vehicle-to-Vehicle Communications , 2010, IEEE Transactions on Vehicular Technology.
[13] Halabi Hasbullah,et al. Denial of Service (DOS) Attack and Its Possible Solutions in VANET , 2010 .
[14] Martin Lukasiewycz,et al. Lightweight authentication for secure automotive networks , 2015, 2015 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[15] D.K. Nilsson,et al. An approach to specification-based attack detection for in-vehicle networks , 2008, 2008 IEEE Intelligent Vehicles Symposium.
[16] Tao Zhang,et al. Defending Connected Vehicles Against Malware: Challenges and a Solution Framework , 2014, IEEE Internet of Things Journal.
[17] Chou-Lin Chen,et al. Tire Pressure Maintenance – A Statistical Investigation , 2009 .
[18] Jun Luo,et al. A Survey of Inter-Vehicle Communication , 2004 .
[19] Sherali Zeadally,et al. Security attacks and solutions for vehicular ad hoc networks , 2010, IET Commun..
[20] Syed Masud Mahmud,et al. Security Needs for the Future Intelligent Vehicles , 2006 .
[21] Alex Wright,et al. Hacking cars , 2011, Commun. ACM.
[22] Maria Kihl,et al. Inter-vehicle communication systems: a survey , 2008, IEEE Communications Surveys & Tutorials.
[23] Anurag Jain,et al. IDENTIFICATION OF MALICIOUS VEHICLE IN VANET ENVIRONMENT FROM DDOS ATTACK , 2013 .
[24] Krysta A. Boccuzzi. Investigating the Causes of and Possible Remedies for Sensor Damage in Digital Cameras Used on the OMEGA Laser Systems , 2008 .
[25] Si Chen,et al. Feasibility analysis of vehicular dynamic spectrum access via queueing theory model , 2010, 2010 IEEE Vehicular Networking Conference.
[26] Sohail A Hirani. Energy Consumption of Encryption Schemes in Wireless Devices , 2003 .
[27] Cyber-security risks in the supply chain , 2015 .
[28] Todd E. Humphreys,et al. Real‐Time GPS Spoofing Detection via Correlation of Encrypted Signals , 2013 .
[29] Xinming Huang,et al. Security of Autonomous Systems Employing Embedded Computing and Sensors , 2013, IEEE Micro.
[30] J. Minuth. FlexRay™ electrical physical layer: Theory, components and examples , 2012, 2012 14th International Conference on Transparent Optical Networks (ICTON).
[31] Sandip Mahajan,et al. OBSTACLE DETECTION USING MONO VISION CAMERA AND LASER SCANNER , 2013 .
[32] Hiro Onishi,et al. Paradigm change of vehicle cyber security , 2012, 2012 4th International Conference on Cyber Conflict (CYCON 2012).
[33] Vijay Gadepally,et al. Estimation of Driver Behavior for Autonomous Vehicle Applications , 2013 .
[34] Matti Valovirta,et al. Experimental Security Analysis of a Modern Automobile , 2011 .
[35] M. Barth,et al. Lane-level positioning for in-vehicle navigation and automated vehicle location (AVL) systems , 2004, Proceedings. The 7th International IEEE Conference on Intelligent Transportation Systems (IEEE Cat. No.04TH8749).
[36] Dennis K. Nilsson,et al. A Defense-in-Depth Approach to Securing the Wireless Vehicle Infrastructure , 2009, J. Networks.
[37] An-Lin Tao,et al. Comprehensive Comparisons of Satellite Data, Signals, and Measurements between the BeiDou Navigation Satellite System and the Global Positioning System † , 2016, Sensors.
[38] Tsung-Ming Chen,et al. The Performance Analysis of a Real-Time Integrated INS / GPS Vehicle Navigation System with Abnormal GPS Measurement Elimination , 2014 .
[39] Dorothy J. Glancy. Privacy in Autonomous Vehicles , 2012 .
[40] Erland Jonsson,et al. A First Simulation of Attacks in the Automotive Network Communications Protocol FlexRay , 2008, CISIS.
[41] Alexandre M. Bayen,et al. Enhancing Privacy and Accuracy in Probe Vehicle-Based Traffic Monitoring via Virtual Trip Lines , 2012, IEEE Transactions on Mobile Computing.
[42] Hsu-Yung Cheng,et al. Lane Detection With Moving Vehicles in the Traffic Scenes , 2006, IEEE Transactions on Intelligent Transportation Systems.
[43] M. Warren,et al. Cyber attacks against supply chain management systems: A short note , 2000 .
[44] Anurag Jain,et al. A novel defense scheme against DDOS attack in VANET , 2013, 2013 Tenth International Conference on Wireless and Optical Communications Networks (WOCN).
[45] Miad Faezipour,et al. Progress and challenges in intelligent vehicle area networks , 2012, Commun. ACM.
[46] Keijo Haataja,et al. Security Threats and Countermeasures in Bluetooth-Enabled Systems , 2009 .
[47] Ulf E. Larson,et al. Conducting forensic investigations of cyber attacks on automobile in-vehicle networks , 2008 .
[48] John M. Dolan,et al. A behavioral planning framework for autonomous driving , 2014, 2014 IEEE Intelligent Vehicles Symposium Proceedings.
[49] Sebastian Thrun,et al. Path Planning for Autonomous Vehicles in Unknown Semi-structured Environments , 2010, Int. J. Robotics Res..
[50] Thomas B. Sheridan,et al. Humans and Automation: System Design and Research Issues , 2002 .
[51] Mara Tanelli,et al. A Security Layer for Smartphone-to-Vehicle Communication Over Bluetooth , 2013, IEEE Embedded Systems Letters.
[52] Meiyuan Zhao,et al. Automotive Security Best Practices Recommendations for security and privacy in the era of the next-generation car , 2015 .
[53] Azim Eskandarian,et al. Denial of Service Attacks on Inter-Vehicle Communication Networks , 2008, 2008 11th International IEEE Conference on Intelligent Transportation Systems.
[54] Johan Lindberg. Security Analysis of Vehicle Diagnostics using DoIP , 2011 .
[55] T. Humphreys. STATEMENT ON THE VULNERABILITY OF CIVIL UNMANNED AERIAL VEHICLES AND OTHER SYSTEMS TO CIVIL GPS , 2012 .
[56] Steven E. Shladover,et al. Potential Cyberattacks on Automated Vehicles , 2015, IEEE Transactions on Intelligent Transportation Systems.
[57] E.J. Ohlmeyer,et al. Analysis of an Ultra-Tightly Coupled GPS/INS System in Jamming , 2006, 2006 IEEE/ION Position, Location, And Navigation Symposium.
[58] Berk Sunar,et al. An Emerging Threat: Eve Meets a Robot - (Work-in-Progress) , 2010, INTRUST.
[59] Flavio D. Garcia,et al. Dismantling Megamos Crypto: Wirelessly Lockpicking a Vehicle Immobilizer , 2013, USENIX Security Symposium.
[60] Bas G.B. Stottelaar,et al. Practical cyber-attacks on autonomous vehicles , 2015 .
[61] Todd E. Humphreys,et al. Evaluation of the vulnerability of phasor measurement units to GPS spoofing attacks , 2012, Int. J. Crit. Infrastructure Prot..
[62] Michael Charitos,et al. Μοντελοποίηση και ανάπτυξη ετερογενών κινητών δικτύων οχήματος-προς-όχημα (Vehicle-to-Vehicle) και οχήματος-προς-υποδομή (Vehicle-to-Infrastructure) με έμφαση σε δύσκολα περιβάλλοντα μετάδοσης , 2018 .
[63] Manuel Barbosa,et al. An overview of controller area network , 1999 .
[64] Ho Gi Jung,et al. Enhancing Light Blob Detection for Intelligent Headlight Control Using Lane Detection , 2013, IEEE Transactions on Intelligent Transportation Systems.
[65] Muhammad Sabir Idrees,et al. Secure Automotive On-Board Protocols: A Case of Over-the-Air Firmware Updates , 2011, Nets4Cars/Nets4Trains.
[66] Wang Yong-sheng,et al. Studies on Novel Anti-jamming Technique of Unmanned Aerial Vehicle Data Link , 2008 .
[67] Shuzhi Sam Ge,et al. Autonomous vehicle positioning with GPS in urban canyon environments , 2001, IEEE Trans. Robotics Autom..
[68] Philip Koopman,et al. Ride-through for Autonomous Vehicles , 2013, CARS@SAFECOMP.
[69] Nadine B. Sarter,et al. How in the World Did We Ever Get into That Mode? Mode Error and Awareness in Supervisory Control , 1995, Hum. Factors.
[70] Sebastian Thrun,et al. Towards fully autonomous driving: Systems and algorithms , 2011, 2011 IEEE Intelligent Vehicles Symposium (IV).
[71] Iftikhar Ahmad,et al. Classes of attacks in VANET , 2011, 2011 Saudi International Electronics, Communications and Photonics Conference (SIECPC).
[72] Andrea Bittau,et al. BlueSniff: Eve Meets Alice and Bluetooth , 2007, WOOT.
[73] Xuemin Shen,et al. Connected Vehicles: Solutions and Challenges , 2014, IEEE Internet of Things Journal.