2016 22nd International Conference on Automation and Computing (ICAC) 2016
DOI: 10.1109/iconac.2016.7604962
|View full text |Cite
|
Sign up to set email alerts
|

Hybrid intrusion detection in connected self-driving vehicles

Abstract: Emerging self-driving vehicles are vulnerable to different attacks due to the principle and the type of communication systems that are used in these vehicles. These vehicles are increasingly relying on external communication via vehicular ad hoc networks (VANETs). VANETs add new threats to self-driving vehicles that contribute to substantial challenges in autonomous systems. These communication systems render selfdriving vehicles vulnerable to many types of malicious attacks, such as Sybil attacks, Denial of S… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 20 publications
(6 citation statements)
references
References 15 publications
0
6
0
Order By: Relevance
“…Denial of Service attacks is a very serious attack where the main aim is to prevent the authentic users from accessing the network and network resources [27]. The attackers transmit dummy messages into the network to overwhelm the current users, thus reducing the efficiency and performance of the network.…”
Section: Attacks Against the Communication Systemmentioning
confidence: 99%
“…Denial of Service attacks is a very serious attack where the main aim is to prevent the authentic users from accessing the network and network resources [27]. The attackers transmit dummy messages into the network to overwhelm the current users, thus reducing the efficiency and performance of the network.…”
Section: Attacks Against the Communication Systemmentioning
confidence: 99%
“…These simulation datasets are used to validate the deep learning model in terms of accuracy. Intruder detection in autonomous vehicle or Self driving vehicles [15] simulated in cutting edge tools.…”
Section: Traffic Simulator and Network Simulatormentioning
confidence: 99%
“…Disrupt communication typically by overwhelming the network with large volumes of meaningless or false data, such as fake alert messages about road accidents and congestion [30], [31], [32], [26], [33], [27], [34], [35], [36], [37] Bus-off attack Exploit the error-handling scheme of in-vehicle networks, by deceiving an uncompromised ECU into thinking it is defective, and eventually forcing itself or even the whole network to shut down [38] Message Distortion Generate distorted reliability message in a vehicular network and activate distribution of this message to a neighbouring vehicle [39] Timing attack An integrity attack that alters message timeslots [40] Replay attack A valid data transmission, such as a command or a sensor reading, is recorded and maliciously repeated at a later point.…”
Section: Attackmentioning
confidence: 99%