Cyber Threat Intelligence Sharing Frameworks for Autonomous Vehicle Ecosystems

Authors

  • Dr. Yan Song Professor of Computer Science, Nanyang Technological University (NTU), Singapore Author

Keywords:

VCS, EVs

Abstract

Vehicular CPS has undergone a rapid growth and several leaps of technology including autonomous vehicles (AVs), intelligent transportation systems (ITSs), and connected vehicles [1]. This has led the transportation landscape to have a broader impact on society, playing critical roles in the economy, security and privacy. VCS focuses on EVs, as a particular category of connected vehicles, which are directly integrated into the V2X (Vehicle to Everything) communication alongside the rest of the networked sacred and end-user equipment (UE). In this direction, it is pivotal to highlight how fundamental it is to secure VCSs from their introduction phase. These threats must be timely and effectively addressed to foster adoption and diffusion of VCS; on the contrary this will not be accepted by potential consumers, which will deem such a solution an unsafe approach.

Downloads

Download data is not yet available.

References

M. Gupta, J. Benson, F. Patwa, and R. Sandhu, "Secure Cloud Assisted Smart Cars Using Dynamic Groups and Attribute Based Access Control," 2019. [PDF]

V. Kumar Kukkala, S. Vignesh Thiruloga, and S. Pasricha, "Roadmap for Cybersecurity in Autonomous Vehicles," 2022. [PDF]

F. Berman, E. Cabrera, A. Jebari, and W. Marrakchi, "The impact universe—a framework for prioritizing the public interest in the Internet of Things," 2022. ncbi.nlm.nih.gov

Tatineni, Sumanth. "Beyond Accuracy: Understanding Model Performance on SQuAD 2.0 Challenges." International Journal of Advanced Research in Engineering and Technology (IJARET) 10.1 (2019): 566-581.

Vemoori, V. “Towards Secure and Trustworthy Autonomous Vehicles: Leveraging Distributed Ledger Technology for Secure Communication and Exploring Explainable Artificial Intelligence for Robust Decision-Making and Comprehensive Testing”. Journal of Science & Technology, vol. 1, no. 1, Nov. 2020, pp. 130-7, https://thesciencebrigade.com/jst/article/view/224.

Mahammad Shaik. “Reimagining Digital Identity: A Comparative Analysis of Advanced Identity Access Management (IAM) Frameworks Leveraging Blockchain Technology for Enhanced Security, Decentralized Authentication, and Trust-Centric Ecosystems”. Distributed Learning and Broad Applications in Scientific Research, vol. 4, June 2018, pp. 1-22, https://dlabi.org/index.php/journal/article/view/2.

Vemori, Vamsi. "Towards Safe and Equitable Autonomous Mobility: A Multi-Layered Framework Integrating Advanced Safety Protocols, Data-Informed Road Infrastructure, and Explainable AI for Transparent Decision-Making in Self-Driving Vehicles." Human-Computer Interaction Perspectives 2.2 (2022): 10-41.

A. Biswas and H. C. Wang, "Autonomous Vehicles Enabled by the Integration of IoT, Edge Intelligence, 5G, and Blockchain," 2023. ncbi.nlm.nih.gov

M. Bakhtina and R. Matulevičius, "Information Security Analysis in the Passenger-Autonomous Vehicle Interaction," 2021. [PDF]

A. Dinesh Kumar, K. Naga Renu Chebrolu, V. R, and S. KP, "A Brief Survey on Autonomous Vehicle Possible Attacks, Exploits and Vulnerabilities," 2018. [PDF]

M. Scalas and G. Giacinto, "Automotive Cybersecurity: Foundations for Next-Generation Vehicles," 2019. [PDF]

S. Lee, Y. Cho, and B. C. Min, "Attack-Aware Multi-Sensor Integration Algorithm for Autonomous Vehicle Navigation Systems," 2017. [PDF]

A. Kriebitz, R. Max, and C. Lütge, "The German Act on Autonomous Driving: Why Ethics Still Matters," 2022. ncbi.nlm.nih.gov

R. Singh Rathore, C. Hewage, O. Kaiwartya, and J. Lloret, "In-Vehicle Communication Cyber Security: Challenges and Solutions," 2022. ncbi.nlm.nih.gov

A. Jafar Md Muzahid, S. Fauzi Kamarulzaman, M. Arafatur Rahman, S. Akbar Murad et al., "Multiple vehicle cooperation and collision avoidance in automated vehicles: survey and an AI-enabled conceptual framework," 2023. ncbi.nlm.nih.gov

T. Andreica, A. Musuroi, A. Anistoroaei, C. Jichici et al., "Blockchain integration for in-vehicle CAN bus intrusion detection systems with ISO/SAE 21434 compliant reporting," 2024. ncbi.nlm.nih.gov

X. Masip-Bruin, E. Marín-Tordera, J. Ruiz, A. Jukan et al., "Cybersecurity in ICT Supply Chains: Key Challenges and a Relevant Architecture," 2021. ncbi.nlm.nih.gov

I. Mavromatis, T. Spyridopoulos, P. Carnelli, W. Hau Chin et al., "Cybersecurity in Motion: A Survey of Challenges and Requirements for Future Test Facilities of CAVs," 2023. [PDF]

A. Manimuthu, V. Dharshini, I. Zografopoulos, M. K. Priyan et al., "Contactless Technologies for Smart Cities: Big Data, IoT, and Cloud Infrastructures," 2021. ncbi.nlm.nih.gov

Y. Mei, "First-order coherent quantum Zeno dynamics and its appearance in tight-binding chains," 2023. [PDF]

S. N. Saadatmand, "Finding the ground states of symmetric infinite-dimensional Hamiltonians: explicit constrained optimizations of tensor networks," 2019. [PDF]

N. Chinpattanakarn and C. Amornbunchornvej, "Framework for Variable-lag Motif Following Relation Inference In Time Series using Matrix Profile analysis," 2024. [PDF]

J. R. V. Solaas, N. Tuptuk, and E. Mariconti, "Systematic Review: Anomaly Detection in Connected and Autonomous Vehicles," 2024. [PDF]

A. Taeihagh and H. Si Min Lim, "Governing autonomous vehicles: emerging responses for safety, liability, privacy, cybersecurity, and industry risks," 2018. [PDF]

H. Rivera-Rodriguez and R. Jauregui, "On the electrostatic interactions involving long-range Rydberg molecules," 2021. [PDF]

Downloads

Published

30-06-2023

How to Cite

[1]
Dr. Yan Song, “Cyber Threat Intelligence Sharing Frameworks for Autonomous Vehicle Ecosystems”, J. of Artificial Int. Research and App., vol. 3, no. 1, pp. 1–22, Jun. 2023, Accessed: Dec. 23, 2024. [Online]. Available: https://aimlstudies.co.uk/index.php/jaira/article/view/88