2020
DOI: 10.48550/arxiv.2007.08041
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

A Survey on Security Attacks and Defense Techniques for Connected and Autonomous Vehicles

Abstract: Autonomous Vehicle has been transforming intelligent transportation systems. As telecommunication technology improves, autonomous vehicles are getting connected to each other and to infrastructures, forming Connected and Autonomous Vehicles (CAVs). CAVs will help humans achieve safe, efficient, and autonomous transportation systems. However, CAVs will face significant security challenges because many of their components are vulnerable to attacks, and a successful attack on a CAV may have significant impacts on… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 114 publications
0
1
0
Order By: Relevance
“…Attackers can perform several types of spoofing attacks like GNSS, GPS, and Lidar spoofing attacks (see [98] shown for the component ''others'' of Figure 4) on self-driving cars. Pham et al [99] designed and carried out a spoofing attack against a Lidar sensor, effectively tricking the system into perceiving an obstacle in its path that was not there. The attacker sent signals shot at the victim Lidar at the nanosecond level, and the Lidar of the vehicle believed there was an object in front of the vehicle.…”
Section: E Spoofing Attackmentioning
confidence: 99%
“…Attackers can perform several types of spoofing attacks like GNSS, GPS, and Lidar spoofing attacks (see [98] shown for the component ''others'' of Figure 4) on self-driving cars. Pham et al [99] designed and carried out a spoofing attack against a Lidar sensor, effectively tricking the system into perceiving an obstacle in its path that was not there. The attacker sent signals shot at the victim Lidar at the nanosecond level, and the Lidar of the vehicle believed there was an object in front of the vehicle.…”
Section: E Spoofing Attackmentioning
confidence: 99%