2019
DOI: 10.1016/j.tra.2018.06.033
|View full text |Cite
|
Sign up to set email alerts
|

Connected and autonomous vehicles: A cyber-risk classification framework

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
46
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3
2

Relationship

2
7

Authors

Journals

citations
Cited by 111 publications
(52 citation statements)
references
References 20 publications
0
46
0
Order By: Relevance
“…A significant cyber threat assessment methodology is CVSS (Common Vulnerability Scoring System), where a score is given to a cyber vulnerability according to its characteristics (Sheehan et al 2019). The characteristics used for calculation of the score include the impact of the attack (ibid).…”
Section: Introductionmentioning
confidence: 99%
“…A significant cyber threat assessment methodology is CVSS (Common Vulnerability Scoring System), where a score is given to a cyber vulnerability according to its characteristics (Sheehan et al 2019). The characteristics used for calculation of the score include the impact of the attack (ibid).…”
Section: Introductionmentioning
confidence: 99%
“…Reliance on cyber components makes CAVs susceptible to cyber-attacks as well as physical attacks whereby an adversary can manipulate shared data, internal sensor readings and GPS signals with the intent of committing fraud or causing harm [2], , [10]. Numerous cyber threats and exploits are reported in the literature, such as hacking ECUs (Engine Control Unit), GPS spoofing, modified traffic signs, CAN (Car Area Network) injection of fake bits and manipulation of sensor values [17] [18]. The available literature on the security attacks to CAVs is quite vast [11], [12], [13].…”
Section: Introductionmentioning
confidence: 99%
“…Some automotive manufacturers suggest the usage of Wi-Fi technology for connected cars communication, though it has been rejected by European Commission in 2019 [16]. Communication between the vehicle and infrastructure, such as road signs, offers remote attack access for a malicious actor to detect and exploit vulnerabilities in the system [17]. Unlike a typical home network, a successful breach of security on a connected vehicle's GPS signal or any of its embedded systems and sensors may not only trigger traffic disruption and waste of time but also directly endanger the safety of its human passengers and environment.…”
Section: Introductionmentioning
confidence: 99%
“…While many of the attacks against traditional vehicles could be modelled using this reference architecture, we target L3-L5 autonomous vehicles (which are described in Table 1). These are the new and emerging autonomous vehicles that are beginning to be deployed, and which will encounter new threats compared to L0-L2 vehicles [9]. These new threats may try to manipulate input sensor data [10] in order to affect how and where an autonomous vehicle drives, or may simply try to remotely take control of the vehicle's functions [11].…”
Section: Introductionmentioning
confidence: 99%