Cybersecurity for autonomous vehicles: Review of attacks and defense

K Kim, JS Kim, S Jeong, JH Park, HK Kim - Computers & security, 2021 - Elsevier
As technology has evolved, cities have become increasingly smart. Smart mobility is a
crucial element in smart cities, and autonomous vehicles are an essential part of smart …

Autonomous vehicles security: Challenges and solutions using blockchain and artificial intelligence

G Bendiab, A Hameurlaine, G Germanos… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
The arrival of autonomous vehicles (AVs) promises many great benefits, including increased
safety and reduced energy consumption, pollution, and congestion. However, these engines …

A survey on cyber-security of connected and autonomous vehicles (CAVs)

X Sun, FR Yu, P Zhang - IEEE Transactions on Intelligent …, 2021 - ieeexplore.ieee.org
As the general development trend of the automotive industry, connected and autonomous
vehicles (CAVs) can be used to increase transportation safety, promote mobility choices …

[HTML][HTML] A survey of deep learning-based intrusion detection in automotive applications

B Lampe, W Meng - Expert Systems with Applications, 2023 - Elsevier
Modern automobiles depend on internal vehicle networks (IVNs) to control systems from the
anti-lock brakes to the transmission to the locks on the doors. Many IVNs, particularly the …

Securing vehicle-to-everything (V2X) communication platforms

M Hasan, S Mohan, T Shimizu… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Modern vehicular wireless technology enables vehicles to exchange information at any time,
from any place, to any network-forms the vehicle-to-everything (V2X) communication …

Evaluation of can bus security challenges

M Bozdal, M Samie, S Aslam, I Jennions - Sensors, 2020 - mdpi.com
The automobile industry no longer relies on pure mechanical systems; instead, it benefits
from many smart features based on advanced embedded electronics. Although the rise in …

An overview of information-theoretic security and privacy: Metrics, limits and applications

M Bloch, O Günlü, A Yener, F Oggier… - IEEE Journal on …, 2021 - ieeexplore.ieee.org
This tutorial reviews fundamental contributions to information security. An integrative
viewpoint is taken that explains the security metrics, including secrecy, privacy, and others …

Viden: Attacker identification on in-vehicle networks

KT Cho, KG Shin - Proceedings of the 2017 ACM SIGSAC Conference …, 2017 - dl.acm.org
Various defense schemes---which determine the presence of an attack on the in-vehicle
network---have recently been proposed. However, they fail to identify which Electronic …

CANnolo: An anomaly detection system based on LSTM autoencoders for controller area network

S Longari, DHN Valcarcel, M Zago… - … on Network and …, 2020 - ieeexplore.ieee.org
Automotive security has gained significant traction in the last decade thanks to the
development of new connectivity features that have brought the vehicle from an isolated …

A survey on controller area network reverse engineering

A Buscemi, I Turcanu, G Castignani… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Controller Area Network (CAN) is a masterless serial bus designed and widely used for the
exchange of mission and time-critical information within commercial vehicles. In-vehicle …