2022
DOI: 10.1109/tits.2021.3085297
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Cyber-Security of Connected and Autonomous Vehicles (CAVs)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
53
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 163 publications
(73 citation statements)
references
References 120 publications
0
53
0
Order By: Relevance
“…CAN [52], [50], [51], [26] Eavesdropping, DoS attack, replay attack and unauthorized data transmission, bus fuzzing/frame falsifying/injection attack Confidentiality/authenticity/privacy of CAN messages, Intrusion Detection System (IDS) based defense techniques, securing telematics ECUs, cryptography, clock skew estimation of CAN messages, network segmentation. LiDAR [50], [53], [54] Spoofing, jamming, random modulation, signals counterfeiting Dynamic watermarking, reduction of signal-receiving angle, pulses transmission in random directions, and pulses' waveforms randomization, device fingerprinting, data authentication.…”
Section: Ec-cav Subsystemsmentioning
confidence: 99%
See 2 more Smart Citations
“…CAN [52], [50], [51], [26] Eavesdropping, DoS attack, replay attack and unauthorized data transmission, bus fuzzing/frame falsifying/injection attack Confidentiality/authenticity/privacy of CAN messages, Intrusion Detection System (IDS) based defense techniques, securing telematics ECUs, cryptography, clock skew estimation of CAN messages, network segmentation. LiDAR [50], [53], [54] Spoofing, jamming, random modulation, signals counterfeiting Dynamic watermarking, reduction of signal-receiving angle, pulses transmission in random directions, and pulses' waveforms randomization, device fingerprinting, data authentication.…”
Section: Ec-cav Subsystemsmentioning
confidence: 99%
“…Radar [50], [53] Spoofing, jamming, signals counterfeiting Signal filtering, Spatio-Temporal Challenge-Response (STCR). GPS [50], [52], [54] Location trailing, spoofing, signals counterfeiting Receiver autonomous integrity monitoring (RAIM), receiver-autonomous angle-of-arrival spoofing countermeasure, signal filtering. Image sensors [50], [53], [55], [54] Camera blinding, adversarial images injection Deploy multiple cameras (redundancy), near-infrared-cut filter, special optics.…”
Section: Ec-cav Subsystemsmentioning
confidence: 99%
See 1 more Smart Citation
“…El‐Rewini et al (2020) describe vehicular cybersecurity challenges using a hierarchical framework to isolate threats and attacks in three layers; sensing, communication, and control. Considering a broad scope of attack vectors against inter‐ and intravehicular communication, Sun et al (2021) discuss cybersecurity vulnerabilities related to autonomous cars. Similarly, in the maritime domain, Silverajan et al (2018) describe relevant attack surfaces for unmanned smart ships.…”
Section: Introductionmentioning
confidence: 99%
“…There has been an increasing interest in security vulnerabilities for connected and autonomous vehicle (CAV) coordination [8], [9], [10], [11], [12], [13]. In particular, jamming attack is one of the main forms of Denial-of-Service (DOS) attacks in DSRC.…”
Section: Introductionmentioning
confidence: 99%