Threat Intelligence Sharing Platforms for Autonomous Vehicle Security
Cover
PDF

How to Cite

[1]
Dr. Magdalena Kwiatkowska, “Threat Intelligence Sharing Platforms for Autonomous Vehicle Security”, Journal of AI in Healthcare and Medicine, vol. 1, no. 1, pp. 77–94, May 2021, Accessed: Nov. 23, 2024. [Online]. Available: https://healthsciencepub.com/index.php/jaihm/article/view/25

Abstract

As connected, autonomous vehicles advance to market, cyber-physical security assumes profound importance. A system capable of protecting vehicle sensor data from cyber-security risks and physical-layer attacks for Intelligent Transportation Systems and Smart-City applications has been developed. The system is endowed with the capacity to render deep learning sensor data, immunize it in the time domain, recover if necessary, and run safe machine learning decision-making processes using a combination of robust deep neural networks immune to cyber-physical attacks. This cyber-physical reinforcement learning framework is designed to work on multiple connected autonomous vehicles simultaneously.  Besides cybersecurity, the challenge of protecting sensor data and providing privacy through cutting-edge privacy-preserving solutions for both hardware and software are considerable factors [1, 10] of complexity in security coordination between autonomous vehicles, smart city infrastructures, IT providers, cyber-insurance companies, and central and local governance levels. These data-protection security layers include IoT data routers, permissioned blockchains, and data transformer agents [1].
PDF

References

Tatineni, Sumanth. "Exploring the Challenges and Prospects in Data Science and Information Professions." International Journal of Management (IJM) 12.2 (2021): 1009-1014.

Vemori, Vamsi. "Evolutionary Landscape of Battery Technology and its Impact on Smart Traffic Management Systems for Electric Vehicles in Urban Environments: A Critical Analysis." Advances in Deep Learning Techniques 1.1 (2021): 23-57.

C. Oham, R. Jurdak, and S. Jha, "Risk Analysis Study of Fully Autonomous Vehicle," 2019. [PDF]

D. Haileselassie Hagos and D. B. Rawat, "Recent Advances in Artificial Intelligence and Tactical Autonomy: Current Status, Challenges, and Perspectives," 2022. ncbi.nlm.nih.gov

J. R. V. Solaas, N. Tuptuk, and E. Mariconti, "Systematic Review: Anomaly Detection in Connected and Autonomous Vehicles," 2024. [PDF]

S. M Mostaq Hossain, S. Banik, T. Banik, and A. Md Shibli, "Survey on Security Attacks in Connected and Autonomous Vehicular Systems," 2023. [PDF]

V. Kumar Kukkala, S. Vignesh Thiruloga, and S. Pasricha, "Roadmap for Cybersecurity in Autonomous Vehicles," 2022. [PDF]

O. M. Crook, L. Gatto, and P. D. W. Kirk, "Fast approximate inference for variable selection in Dirichlet process mixtures, with an application to pan-cancer proteomics," 2018. [PDF]

A. Chattopadhyay and K. Y. Lam, "Autonomous Vehicle: Security by Design," 2018. [PDF]

S. Lee, Y. Cho, and B. C. Min, "Attack-Aware Multi-Sensor Integration Algorithm for Autonomous Vehicle Navigation Systems," 2017. [PDF]

P. Malhotra, Y. Singh, P. Anand, D. Kumar Bangotra et al., "Internet of Things: Evolution, Concerns and Security Challenges," 2021. ncbi.nlm.nih.gov

A. Dinesh Kumar, K. Naga Renu Chebrolu, V. R, and S. KP, "A Brief Survey on Autonomous Vehicle Possible Attacks, Exploits and Vulnerabilities," 2018. [PDF]

S. Paiva, M. Abdul Ahad, G. Tripathi, N. Feroz et al., "Enabling Technologies for Urban Smart Mobility: Recent Trends, Opportunities and Challenges," 2021. ncbi.nlm.nih.gov

S. A. Abdel Hakeem, H. H. Hussein, and H. W. Kim, "Security Requirements and Challenges of 6G Technologies and Applications," 2022. ncbi.nlm.nih.gov

M. Dibaei, X. Zheng, K. Jiang, S. Maric et al., "An Overview of Attacks and Defences on Intelligent Connected Vehicles," 2019. [PDF]

L. Liu, S. Lu, R. Zhong, B. Wu et al., "Computing Systems for Autonomous Driving: State-of-the-Art and Challenges," 2020. [PDF]

J. N. Brewer and G. Dimitoglou, "Evaluation of Attack Vectors and Risks in Automobiles and Road Infrastructure," 2020. [PDF]

H. Rivera-Rodriguez and R. Jauregui, "On the electrostatic interactions involving long-range Rydberg molecules," 2021. [PDF]

M. Bakhtina and R. Matulevičius, "Information Security Analysis in the Passenger-Autonomous Vehicle Interaction," 2021. [PDF]

Downloads

Download data is not yet available.