2020
DOI: 10.3390/app10217833
|View full text |Cite
|
Sign up to set email alerts
|

Detection and Identification of Malicious Cyber-Attacks in Connected and Automated Vehicles’ Real-Time Sensors

Abstract: Connected and automated vehicles (CAVs) as a part of Intelligent Transportation Systems (ITS) are projected to revolutionise the transportation industry, primarily by allowing real-time and seamless information exchange of vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I). However, these connectivity and automation are expected to offer vast numbers of benefits, new challenges in terms of safety, security and privacy also emerge. CAVs continue to rely heavily on their sensor readings, the input obta… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 34 publications
0
2
0
Order By: Relevance
“…a) Quality of Things Experience QoTX Sub-Layer -Evaluating Quality of Data QoD. Erroneous data can arise from different hardware and/or software sources leading to faulty decisions, business losses and maybe life-threatening situations [14]. In the IoT environment, a sensor's outlier can be defined as" an irregularity or a divergence in sensor behaviour when compared to its previous behaviour or readings" [15].…”
Section: First Layer -Modeling and Measurement Layermentioning
confidence: 99%
“…a) Quality of Things Experience QoTX Sub-Layer -Evaluating Quality of Data QoD. Erroneous data can arise from different hardware and/or software sources leading to faulty decisions, business losses and maybe life-threatening situations [14]. In the IoT environment, a sensor's outlier can be defined as" an irregularity or a divergence in sensor behaviour when compared to its previous behaviour or readings" [15].…”
Section: First Layer -Modeling and Measurement Layermentioning
confidence: 99%
“…The author of [27] provides a preference system that provides path recommendations to the driver to understand their behavior. According to [28], the safety of roadway inspections by connected and automated vehicles (CAVs) is at risk due to their heavy reliance on sensor readings, information from other vehicles, and roadside units. To address these concerns, the authors developed an efficient approach that identifies inconsistencies in CAVs using Bayesian deep learning (BDL) with discrete wavelet transform (DWT), which enhances security and safety in CAVs.…”
Section: Literature Reviewmentioning
confidence: 99%
“…According to numerical experiments, the proposed method in [28] significantly improves the accuracy, sensitivity, precision, and F1-score evaluation metrics for detecting anomalies. On average, the proposed method in [28] demonstrates performance gains of 7.95%, 9%, 8.77%, and 7.33% compared to the convolutional neural network (CNN). The corresponding gains are 5%, 7.9%, 7.54%, and 4.1% when compared to BDL.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The authors provide a probability-based feature vector that can extract network packets from the in-vehicular system. In return, the DNN can provide a probability of each class discriminating normal and attack packets (Deng, Gao, Lu, and Gao, 2018), thus, the sensor can identify malicious attacks on the vehicle (Deng, Gao, Lu, & Gao, 2018;Eziama, Awin, Ahmed, Santos-Jaimes, Pelumi, & Corral-De-Witt, 2020). The research conducted an unsupervised pre-training method of deep belief networks (Wang, Qiao, Liu, and Shen, 2021), to include the stochastic gradient descent method (Sun, Qiao, Liao, and Li, 2020) can extract in-vehicular network packets (Wang, Qiao, Liu, and Shen, 2021;Sun, Quio, Liao, & Li, 2020).…”
Section: Safety Algorithm Contributorsmentioning
confidence: 99%