2018 IEEE Intelligent Vehicles Symposium (IV) 2018
DOI: 10.1109/ivs.2018.8500383
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of Anomaly Detection for Connected Vehicle Cybersecurity and Safety

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
3
3

Relationship

0
9

Authors

Journals

citations
Cited by 52 publications
(18 citation statements)
references
References 59 publications
0
10
0
Order By: Relevance
“…Regarding the analysis of multiple vehicles, the focus of scientific research lies in the field of misbehavior detection in VANETs based on V2V communication and less on centralized fleet monitoring. As indicated by recent surveys [82], [83], the VANET solutions, in general, are mostly designed for use in Road-Side Units or a Central Authority and not in a backend system. To give an example, Ghaleb et al [84] introduce context-awareness in their solution.…”
Section: A Fleet Securitymentioning
confidence: 99%
See 1 more Smart Citation
“…Regarding the analysis of multiple vehicles, the focus of scientific research lies in the field of misbehavior detection in VANETs based on V2V communication and less on centralized fleet monitoring. As indicated by recent surveys [82], [83], the VANET solutions, in general, are mostly designed for use in Road-Side Units or a Central Authority and not in a backend system. To give an example, Ghaleb et al [84] introduce context-awareness in their solution.…”
Section: A Fleet Securitymentioning
confidence: 99%
“…Special attention in the development of context-adaptive security measures will therefore have to be paid to the simulation of such data sets. For example, simulations are usually used to investigate security measures for VANETs [82], since almost the same problem arises here.…”
Section: G Simulation and Evaluationmentioning
confidence: 99%
“…Detection. To detect unusual values, we adopt statistically anomaly detection technique that is widely used in safety-critical systems [32]. Note that we perform value-level fault detection rather than conventional bit-level mismatch detection due to the observation that many bit-flips may eventually get masked or only result in small value deviations which won't impact final performance.…”
Section: Inference: Range-based Anomaly Detectionmentioning
confidence: 99%
“…The objective is to detect rare or corrupted data, that are different from what we consider has normal data. This research topic has multiple practical applications, such as risk management [71], safety [72] or automatic inspection and non destructive control [73]. Anomalies can also be linked to the knowledge uncertainty [66] of the DNNs.…”
Section: Introductionmentioning
confidence: 99%