Cybersecurity for autonomous vehicles: Review of attacks and defense
As technology has evolved, cities have become increasingly smart. Smart mobility is a
crucial element in smart cities, and autonomous vehicles are an essential part of smart …
crucial element in smart cities, and autonomous vehicles are an essential part of smart …
Autonomous vehicles security: Challenges and solutions using blockchain and artificial intelligence
The arrival of autonomous vehicles (AVs) promises many great benefits, including increased
safety and reduced energy consumption, pollution, and congestion. However, these engines …
safety and reduced energy consumption, pollution, and congestion. However, these engines …
A survey on cyber-security of connected and autonomous vehicles (CAVs)
As the general development trend of the automotive industry, connected and autonomous
vehicles (CAVs) can be used to increase transportation safety, promote mobility choices …
vehicles (CAVs) can be used to increase transportation safety, promote mobility choices …
[HTML][HTML] A survey of deep learning-based intrusion detection in automotive applications
Modern automobiles depend on internal vehicle networks (IVNs) to control systems from the
anti-lock brakes to the transmission to the locks on the doors. Many IVNs, particularly the …
anti-lock brakes to the transmission to the locks on the doors. Many IVNs, particularly the …
Securing vehicle-to-everything (V2X) communication platforms
Modern vehicular wireless technology enables vehicles to exchange information at any time,
from any place, to any network-forms the vehicle-to-everything (V2X) communication …
from any place, to any network-forms the vehicle-to-everything (V2X) communication …
Evaluation of can bus security challenges
The automobile industry no longer relies on pure mechanical systems; instead, it benefits
from many smart features based on advanced embedded electronics. Although the rise in …
from many smart features based on advanced embedded electronics. Although the rise in …
An overview of information-theoretic security and privacy: Metrics, limits and applications
This tutorial reviews fundamental contributions to information security. An integrative
viewpoint is taken that explains the security metrics, including secrecy, privacy, and others …
viewpoint is taken that explains the security metrics, including secrecy, privacy, and others …
Viden: Attacker identification on in-vehicle networks
Various defense schemes---which determine the presence of an attack on the in-vehicle
network---have recently been proposed. However, they fail to identify which Electronic …
network---have recently been proposed. However, they fail to identify which Electronic …
CANnolo: An anomaly detection system based on LSTM autoencoders for controller area network
Automotive security has gained significant traction in the last decade thanks to the
development of new connectivity features that have brought the vehicle from an isolated …
development of new connectivity features that have brought the vehicle from an isolated …
A survey on controller area network reverse engineering
Controller Area Network (CAN) is a masterless serial bus designed and widely used for the
exchange of mission and time-critical information within commercial vehicles. In-vehicle …
exchange of mission and time-critical information within commercial vehicles. In-vehicle …