2018 IEEE 88th Vehicular Technology Conference (VTC-Fall) 2018
DOI: 10.1109/vtcfall.2018.8690732
|View full text |Cite
|
Sign up to set email alerts
|

Risk Assessment of Autonomous Vehicles Using Bayesian Defense Graphs

Abstract: Recent developments have made autonomous vehicles (AVs) closer to hitting our roads. However, their security is still a major concern among drivers as well as manufacturers. Although some work has been done to identify threats and possible solutions, a theoretical framework is needed to measure the security of AVs. In this paper, a simple security model based on defense graphs is proposed to quantitatively assess the likelihood of threats on components of an AV in the presence of available countermeasures. A B… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 13 publications
0
6
0
Order By: Relevance
“…Security and Communication Networks with corresponding mitigation measures, which can provide a reference for security defense design [27,28].…”
Section: Yesmentioning
confidence: 99%
See 2 more Smart Citations
“…Security and Communication Networks with corresponding mitigation measures, which can provide a reference for security defense design [27,28].…”
Section: Yesmentioning
confidence: 99%
“…Bayesian network [27,28] Bayesian network is an extension of the Bayesian method. It is one of the most effective theoretical models in the field of uncertain knowledge expression and reasoning, and it is a probabilistic graphical model.…”
Section: Nomentioning
confidence: 99%
See 1 more Smart Citation
“…On the other hand, a benign node is equipped with a monitoring system to detect abnormal or counterfeit signals. For example, an autonomous vehicle can use a set of anti-spoofing techniques to detect fake global positioning system (GPS) signals [30]. However, benign nodes do not necessarily need to monitor all of their neighbors, due to the cost of monitoring over all short-lived connections.…”
Section: Assumptions and Problem Description A Network Modelmentioning
confidence: 99%
“…On the other hand, a benign node is equipped with a monitoring system to detect abnormal or counterfeit signals. For example, an autonomous vehicle can use a set of anti-spoofing techniques to detect fake GPS signals [12]. However, benign nodes do not necessarily need to monitor all of their neighbors due to the cost of monitoring over all short-lived connections.…”
Section: A Network Modelmentioning
confidence: 99%