2017
DOI: 10.1109/tits.2017.2665968
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Threats Facing Autonomous and Connected Vehicles: Future Challenges

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
178
0
4

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 371 publications
(182 citation statements)
references
References 44 publications
0
178
0
4
Order By: Relevance
“…The increasing functionalities and network interoperability transition CPS from isolated control systems to more open interacting architectures, which enables various new services and applications such as remote code updates and vehicle-tovehicle communication. Meanwhile, this transition, however, introduces potential security vulnerabilities that are easily exploitable [1]- [3].…”
Section: Introductionmentioning
confidence: 99%
“…The increasing functionalities and network interoperability transition CPS from isolated control systems to more open interacting architectures, which enables various new services and applications such as remote code updates and vehicle-tovehicle communication. Meanwhile, this transition, however, introduces potential security vulnerabilities that are easily exploitable [1]- [3].…”
Section: Introductionmentioning
confidence: 99%
“…While prior research [5], [6] identifies some V2X security vulnerabilities and recommends potential mitigation techniques, there is an absence of a comprehensive summary of security challenges, standardization activities and existing solutions. In this paper we investigate V2X security challenges and summarize existing solutions in a comprehensive manner.…”
Section: Methodology and Contributionsmentioning
confidence: 99%
“…Cloud computing provides many benefits to individuals and organizations through offering highly available and efficient computing resources with an affordable price [4]. Many cloud services are available in current commercial solutions, but they are not suitable for latency, portability and location-sensitive applications, such as IoT, Wearable computing, Smart Grids, Connected Vehicles [5] and Software-Defined-Networks [6]. Latency depends on the speed of Internet connection, resource contention among guest virtual machines (VM) and has been shown to increase with distance [7].…”
Section: Introductionmentioning
confidence: 99%