Location-Based Schemes for Mitigating Cyber Threats on Connected and Automated Vehicles: A Survey and Design Framework

被引:10
|
作者
Suo, Dajiang [1 ]
Moore, John [2 ]
Boesch, Mathew [2 ]
Post, Kyle [2 ]
Sarma, Sanjay E. [1 ]
机构
[1] MIT, Dept Mech Engn, Cambridge, MA 02139 USA
[2] Ford Motor Co, Dearborn, MI 48126 USA
关键词
Connected and automated vehicles; security; safety; intelligent transportation systems; V2V; V2I; TRUST MANAGEMENT; SYBIL ATTACKS; VEHICULAR NETWORKS; SECURITY; SYSTEMS; CHALLENGES; SAFETY; INFRASTRUCTURE; AUTHENTICATION; DEPLOYMENT;
D O I
10.1109/TITS.2020.3038755
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
The increased automation and connectivity of vehicles and road infrastructure can make future transportation systems more efficient and smarter and enable new transportation business models. Connected and automated vehicles (CAVs) may form a group of autonomous fleets to transform today's shared mobility services and also play the role of mobile sensors, which share real-time traffic and road information for transportation management. However, these technological advancements also lead to new cyher and physical threats that cause safety hazards or other undesired consequences. Although there have been a large number of papers about identifying and mitigating each type of threat, the lack of design support still challenges security engineering for developing CAVs. This limits the engineering capabilities of original equipment manufacturers to prioritize among multiple system properties, including safety, security, and privacy, and dealing with ever-changing attack surfaces and the power of attackers. This paper surveys security vulnerabilities and defense mechanisms for CAVs from an engineering design perspective. We illustrate how to identify and mitigate physical threats that compromise the safety of individual vehicles and cyber threats that disrupt newly CAV-enabled transportation services in a systematic way. An integrated security engineering process and a multi-layer design framework are presented for providing traceability and guidance in threat identification and mitigation.
引用
收藏
页码:2919 / 2937
页数:19
相关论文
共 36 条