期刊
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
卷 23, 期 7, 页码 6240-6259出版社
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TITS.2021.3085297
关键词
Connected and autonomous vehicles; cybersecurity; attacks; defense strategies; standards
资金
- National Natural Science Foundation of China [61802118]
- Science and Technology Innovation Projects of Shenzhen [JCYJ20190809152003992]
- China Postdoctoral Science Foundation [2019M653042]
- Government of Canada's National Crime Prevention Strategy
- Natural Sciences and Engineering Research Council of Canada (NSERC) Collaborative Research and Training Experience (CREATE) Program for Building Trust in Connected and Autonomous Vehicles (TrustCAV)
Connected and autonomous vehicles (CAVs) have the potential to enhance transportation safety, mobility choices, user cost reduction, and job creation, but they also face increasing cyber-security threats. This paper provides a comprehensive survey on cyber-security in the environment of CAVs, categorizing risks and vulnerabilities, proposing defense strategies, summarizing safety standards, and discussing future challenges and open problems.
As the general development trend of the automotive industry, connected and autonomous vehicles (CAVs) can be used to increase transportation safety, promote mobility choices, reduce user costs, and create new job opportunities. However, with the increasing level of connectivity and automation, malicious users are able to easily implement different kinds of attacks, which threaten the security of CAVs. Hence, this paper provides a comprehensive survey on the cyber-security in the environment of CAVs with the aim of highlighting security problems and challenges. Firstly, based on the types of communication networks and attack objects, it classifies various cyber-security risks and vulnerabilities in the environment of CAVs into in-vehicle network attacks, vehicle to every thing network attacks, and other attacks. Next, it regards cyber-risk as another type of attacks in the environment of CAVs. Then, it describes and analyzes up-to-date corresponding defense strategies for securing CAVs. In addition, it concludes several available cyber-security and safety standards of CAVs, which is helpful for the practical application of CAVs. Finally, several challenges and open problems are discussed for the future research.
作者
我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。
推荐
暂无数据