2020
DOI: 10.1109/jproc.2019.2948775
|View full text |Cite
|
Sign up to set email alerts
|

The Security of Autonomous Driving: Threats, Defenses, and Future Directions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
87
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 164 publications
(87 citation statements)
references
References 66 publications
0
87
0
Order By: Relevance
“…1) Sensing security: As the eye of autonomous vehicles, the security of sensors is nearly essential. Typically, jamming attacks and spoofing attacks are two primary attacks for various sensors [166], [167]. For example, the spoofing attack generates an interference signal, resulting in a fake obstacle captured by the vehicle [168].…”
Section: Security and Privacymentioning
confidence: 99%
See 2 more Smart Citations
“…1) Sensing security: As the eye of autonomous vehicles, the security of sensors is nearly essential. Typically, jamming attacks and spoofing attacks are two primary attacks for various sensors [166], [167]. For example, the spoofing attack generates an interference signal, resulting in a fake obstacle captured by the vehicle [168].…”
Section: Security and Privacymentioning
confidence: 99%
“…However, this also leads to new attack surfaces with various attack methods, such as jamming attacks, replay attacks, relay attacks, etc. [166]. For example, the attacker could capture the communication between key and door and replay it to open the door [188].…”
Section: Security and Privacymentioning
confidence: 99%
See 1 more Smart Citation
“…A malicious or compromised vehicle may transmit false data and then fool the receivers, thereby potentially causing safety hazards and severe accidents. Such attacks are common and well acknowledged in the literature [2], including in V2X networks [3]. Since the host vehicle's decision-making system may rely much on the shared data, particularly in non-lineof-sight (NLOS) areas and harsh environments, malicious vehicles must be detected and ejected from the network.…”
Section: Introductionmentioning
confidence: 99%
“…Since the host vehicle's decision-making system may rely much on the shared data, particularly in non-lineof-sight (NLOS) areas and harsh environments, malicious vehicles must be detected and ejected from the network. Also, the high-definition (HD) map building process in selfdriving vehicles often relies on the shared information [2]; thus, shielding the receivers against an unreliable data source is worthwhile.…”
Section: Introductionmentioning
confidence: 99%