Dynamic Risk Assessment for Cybersecurity in Autonomous Vehicle Operations
Cover
PDF

How to Cite

[1]
Dr. Yan Zhang, “Dynamic Risk Assessment for Cybersecurity in Autonomous Vehicle Operations”, Journal of AI in Healthcare and Medicine, vol. 2, no. 2, pp. 52–70, Dec. 2022, Accessed: Nov. 13, 2024. [Online]. Available: https://healthsciencepub.com/index.php/jaihm/article/view/51

Abstract

Autonomous vehicles use various technologies to compute trajectories, detect potential threats, and avoid accidents without much driver intervention [1]. AVs use several sensors to monitor the vehicle’s environment by scanning several details like the road and driving surfaces, and to detect pedestrians, vehicles, and road obstacles using radar and camera technologies. The AVs can use sensor fusion data to predict potential collision events and help the driver avoid accidents by using potential hazards. Taking road safety from different AV levels as a practical study, this project focuses on developing a complex real-time risk assessment for intervening at level-2 AVs. Hybrid state (between human control and sensor automation) between “human-in the loop” and “automation-in-the-loop”, can recognize future or current risks. Although AVs have huge potentials of saving numerous lives and their social adoption is non-stoppable, they may be also affected by various kinds of hazards—stochastic or accidental road users and potential attacks. Breaking into AV control systems, hackers may cause synthetic accidents causing the robots to interfere with safety even if these ”black box” state transitions are not directly possible. These types of hacking engagement require applying more standard cybersecurity models to recognize potential hazards. The primary standard that many countries are trying to adhere to is ISO€211. However, security cannot be ensured by following the required rules, physically incapable of communicating with the control hardware, validation engineers, or AI designers only. An architectural module, based on the cybersecurity risk-management model used by Bosch in operation, can fill the gap by measuring how much an ISO 21,194-by-compliant system provides security in practice. This model involves all kinds of perpetrators, professional and non-professional adversaries, autonomous and supervised attacks, such as jamming, spoofing, and penetrating through the communication networks between the car and infrastructure [2].

PDF

References

[1] C. Oham, R. Jurdak, and S. Jha, "Risk Analysis Study of Fully Autonomous Vehicle," 2019. [PDF]

[2] H. Rivera-Rodriguez and R. Jauregui, "On the electrostatic interactions involving long-range Rydberg molecules," 2021. [PDF]

[3] P. Natalia Cañas, M. García, N. Aranjuelo, M. Nieto et al., "Dynamic Risk Assessment Methodology with an LDM-based System for Parking Scenarios," 2024. [PDF]

[4] V. V. Dixit, S. Chand, and D. J. Nair, "Autonomous Vehicles: Disengagements, Accidents and Reaction Times," 2016. ncbi.nlm.nih.gov

Tatineni, Sumanth. "Deep Learning for Natural Language Processing in Low-Resource Languages." International Journal of Advanced Research in Engineering and Technology (IJARET) 11.5 (2020): 1301-1311.

Vemoori, Vamsi. "Comparative Assessment of Technological Advancements in Autonomous Vehicles, Electric Vehicles, and Hybrid Vehicles vis-à-vis Manual Vehicles: A Multi-Criteria Analysis Considering Environmental Sustainability, Economic Feasibility, and Regulatory Frameworks." Journal of Artificial Intelligence Research 1.1 (2021): 66-98.

Mahammad Shaik. “Reimagining Digital Identity: A Comparative Analysis of Advanced Identity Access Management (IAM) Frameworks Leveraging Blockchain Technology for Enhanced Security, Decentralized Authentication, and Trust-Centric Ecosystems”. Distributed Learning and Broad Applications in Scientific Research, vol. 4, June 2018, pp. 1-22, https://dlabi.org/index.php/journal/article/view/2.

Tatineni, Sumanth. "Enhancing Fraud Detection in Financial Transactions using Machine Learning and Blockchain." International Journal of Information Technology and Management Information Systems (IJITMIS) 11.1 (2020): 8-15.

[9] V. Kumar Kukkala, S. Vignesh Thiruloga, and S. Pasricha, "Roadmap for Cybersecurity in Autonomous Vehicles," 2022. [PDF]

[10] Y. Mei, "First-order coherent quantum Zeno dynamics and its appearance in tight-binding chains," 2023. [PDF]

[11] A. Dinesh Kumar, K. Naga Renu Chebrolu, V. R, and S. KP, "A Brief Survey on Autonomous Vehicle Possible Attacks, Exploits and Vulnerabilities," 2018. [PDF]

[12] D. Haileselassie Hagos and D. B. Rawat, "Recent Advances in Artificial Intelligence and Tactical Autonomy: Current Status, Challenges, and Perspectives," 2022. ncbi.nlm.nih.gov

[13] M. Hamad and S. Steinhorst, "Security Challenges in Autonomous Systems Design," 2023. [PDF]

[14] D. Iberraken and L. Adouane, "Safety of autonomous vehicles: A survey on Model-based vs. AI-based approaches," 2023. [PDF]

[15] C. Hartsell, S. Ramakrishna, A. Dubey, D. Stojcsics et al., "ReSonAte: A Runtime Risk Assessment Framework for Autonomous Systems," 2021. [PDF]

[16] S. M Mostaq Hossain, S. Banik, T. Banik, and A. Md Shibli, "Survey on Security Attacks in Connected and Autonomous Vehicular Systems," 2023. [PDF]

[17] A. Jafar Md Muzahid, S. Fauzi Kamarulzaman, M. Arafatur Rahman, S. Akbar Murad et al., "Multiple vehicle cooperation and collision avoidance in automated vehicles: survey and an AI-enabled conceptual framework," 2023. ncbi.nlm.nih.gov

[18] S. Lee, Y. Cho, and B. C. Min, "Attack-Aware Multi-Sensor Integration Algorithm for Autonomous Vehicle Navigation Systems," 2017. [PDF]

[19] L. Luxmi Dhirani, N. Mukhtiar, B. Shankar Chowdhry, and T. Newe, "Ethical Dilemmas and Privacy Issues in Emerging Technologies: A Review," 2023. ncbi.nlm.nih.gov

[20] M. Hamad, A. Finkenzeller, M. Kühr, A. Roberts et al., "REACT: Autonomous Intrusion Response System for Intelligent Vehicles," 2024. [PDF]

[21] E. Ochoa, N. Gracias, K. Istenič, J. Bosch et al., "Collision Detection and Avoidance for Underwater Vehicles Using Omnidirectional Vision †," 2022. ncbi.nlm.nih.gov

[22] D. H. Lee, C. M. Kim, H. S. Song, Y. H. Lee et al., "Simulation-Based Cybersecurity Testing and Evaluation Method for Connected Car V2X Application Using Virtual Machine," 2023. ncbi.nlm.nih.gov

Downloads

Download data is not yet available.