2020
DOI: 10.1109/access.2020.3037705
|View full text |Cite
|
Sign up to set email alerts
|

Attacks on Self-Driving Cars and Their Countermeasures: A Survey

Abstract: Intelligent Traffic Systems (ITS) are currently evolving in the form of a cooperative ITS or connected vehicles. Both forms use the data communications between Vehicle-to-Vehicle (V2V), Vehicleto-Infrastructure (V2I/I2V) and other on-road entities, and are accelerating the adoption of self-driving cars. The development of cyber-physical systems containing advanced sensors, sub-systems, and smart driving assistance applications over the past decade is equipping unmanned aerial and road vehicles with autonomous … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
34
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 89 publications
(42 citation statements)
references
References 152 publications
0
34
0
Order By: Relevance
“…The essence of the attack lies in the concealed perturbations in the points cloud (the input 3D data of the object) carried out by the attacker, which lead to incorrect detection and/or recognition of the objects, or even the inability to identify and/or classify them. This type of attack is also called adversarial machine learning, as it is aimed precisely at deceiving the algorithms and methods of machine learning used that are sensitive to distortions or artificial perturbations [22].…”
Section: Adversarial Attackmentioning
confidence: 99%
See 1 more Smart Citation
“…The essence of the attack lies in the concealed perturbations in the points cloud (the input 3D data of the object) carried out by the attacker, which lead to incorrect detection and/or recognition of the objects, or even the inability to identify and/or classify them. This type of attack is also called adversarial machine learning, as it is aimed precisely at deceiving the algorithms and methods of machine learning used that are sensitive to distortions or artificial perturbations [22].…”
Section: Adversarial Attackmentioning
confidence: 99%
“…Lidar's ECU malware attack. Infection of the ECU via the malware can cause both DoS of the LiDAR (or the whole AV at once) and malicious disturbances in its functioning [22]. Such an attack can be carried out if the intruder has physical access to the AV (e.g., Evil Mechanic attack [11]) or through the adversary impact on the ECU (for example, when upgrading firmware; over-the-air attack) [38].…”
mentioning
confidence: 99%
“…i.e., Period= (2 29 -1) x (2 23 -1) x (2 19 -1) 2 71 To increase the level of complexity for attackers on the key stream generator, multiple feedback polynomials have been included in the design. Thus, the period increases by 2 12 and avoids the issue of being insecure. Therefore, the period of the proposed key stream is approximately = [(2 29 -1) x (2 23 -1) x…”
Section: Period Of Key Stream Generatormentioning
confidence: 99%
“…To protect the vehicular data, encryption is a must. Abdullahi Chowdhury et al, [12] have presented a detailed survey on the security issues related to connected vehicles and autonomous vehicle technologies. In [13] Sahand Murad et al, has dealt the security of the vehicular data shared over cloud by means of fragmentation and encrypting.…”
Section: Introductionmentioning
confidence: 99%
“…In [4] is being discussed different attacks on authenticity, integrity and confidentiality. In this article the focus is more Table 1.…”
Section: Related Workmentioning
confidence: 99%