Cognitive Risk Assessment Models for Cybersecurity in Autonomous Vehicle Operations

Authors

  • Dr. Siarhei Katsevich Associate Professor of Computer Science, Belarusian State University of Informatics and Radioelectronics (BSUIR), Belarus Author

Keywords:

(V-ITSs), communication networks

Abstract

Many autonomous vehicle (AV) functions have already been defined and have demonstrated a positive potential impact if properly adapted, including platooning and cooperative adaptive cruise control (CACC) techniques [1]. Functional, reactive and object-oriented (FRaOOP) requirements, like primary safety (PS) and physical safety (PhS) and cyber safety (CS), have been taken into account in the cybersecurity literature, thus far excluding the characterization of human intelligence which is a key requirement as well. The current cybersecurity validation test benches combine the Reinforcement Learning approach to simulate an adversarial strategy for their implementation and a framework with the Fault Injection approach. Also, in the Authors’ literature an automatic evaluation methodology for the test bench was investigated with the goal to assess countermeasure effectiveness. This paper enhances the research presented in the literature with a novel and innovative approach referred to as the cognitive cybersecurity framework, where the human intelligence characteristic has been introduced in the validation test bench. This approach allows the AV companies to evaluate the criticality of the residually exploitable cybersecurity weakness, thus improving the design-phase criticality mitigation and countermeasures ranking process by a V2I cognitive reticularity methodology.

Downloads

Download data is not yet available.

References

V. Kumar Kukkala, S. Vignesh Thiruloga, and S. Pasricha, "Roadmap for Cybersecurity in Autonomous Vehicles," 2022. [PDF]

A. Dinesh Kumar, K. Naga Renu Chebrolu, V. R, and S. KP, "A Brief Survey on Autonomous Vehicle Possible Attacks, Exploits and Vulnerabilities," 2018. [PDF]

C. Oham, R. Jurdak, and S. Jha, "Risk Analysis Study of Fully Autonomous Vehicle," 2019. [PDF]

H. Rivera-Rodriguez and R. Jauregui, "On the electrostatic interactions involving long-range Rydberg molecules," 2021. [PDF]

Y. Guan, H. Liao, Z. Li, G. Zhang et al., "World Models for Autonomous Driving: An Initial Survey," 2024. [PDF]

Y. Mei, "First-order coherent quantum Zeno dynamics and its appearance in tight-binding chains," 2023. [PDF]

K. Mokhtari and A. R. Wagner, "Don't Get Yourself into Trouble! Risk-aware Decision-Making for Autonomous Vehicles," 2021. [PDF]

D. Haileselassie Hagos and D. B. Rawat, "Recent Advances in Artificial Intelligence and Tactical Autonomy: Current Status, Challenges, and Perspectives," 2022. ncbi.nlm.nih.gov

S. M Mostaq Hossain, S. Banik, T. Banik, and A. Md Shibli, "Survey on Security Attacks in Connected and Autonomous Vehicular Systems," 2023. [PDF]

V. Linkov, P. Zámečník, D. Havlíčková, and C. W. Pai, "Human Factors in the Cybersecurity of Autonomous Vehicles: Trends in Current Research," 2019. ncbi.nlm.nih.gov

S. Paiva, M. Abdul Ahad, G. Tripathi, N. Feroz et al., "Enabling Technologies for Urban Smart Mobility: Recent Trends, Opportunities and Challenges," 2021. ncbi.nlm.nih.gov

T. H. H. Aldhyani and H. Alkahtani, "Attacks to Automatous Vehicles: A Deep Learning Algorithm for Cybersecurity," 2022. ncbi.nlm.nih.gov

S. Lee, Y. Cho, and B. C. Min, "Attack-Aware Multi-Sensor Integration Algorithm for Autonomous Vehicle Navigation Systems," 2017. [PDF]

Tatineni, Sumanth. "Cloud-Based Business Continuity and Disaster Recovery Strategies." International Research Journal of Modernization in Engineering, Technology, and Science5.11 (2023): 1389-1397.

Vemori, Vamsi. "From Tactile Buttons to Digital Orchestration: A Paradigm Shift in Vehicle Control with Smartphone Integration and Smart UI–Unveiling Cybersecurity Vulnerabilities and Fortifying Autonomous Vehicles with Adaptive Learning Intrusion Detection Systems." African Journal of Artificial Intelligence and Sustainable Development3.1 (2023): 54-91.

Shaik, Mahammad, Leeladhar Gudala, and Ashok Kumar Reddy Sadhu. "Leveraging Artificial Intelligence for Enhanced Identity and Access Management within Zero Trust Security Architectures: A Focus on User Behavior Analytics and Adaptive Authentication." Australian Journal of Machine Learning Research & Applications 3.2 (2023): 1-31.

Tatineni, Sumanth. "Security and Compliance in Parallel Computing Cloud Services." International Journal of Science and Research (IJSR) 12.10 (2023): 972-1977.

E. Ochoa, N. Gracias, K. Istenič, J. Bosch et al., "Collision Detection and Avoidance for Underwater Vehicles Using Omnidirectional Vision †," 2022. ncbi.nlm.nih.gov

T. Wang, M. Tu, H. Lyu, Y. Li et al., "Impact Evaluation of Cyberattacks on Connected and Automated Vehicles in Mixed Traffic Flow and Its Resilient and Robust Control Strategy," 2022. ncbi.nlm.nih.gov

M. Strickland, G. Fainekos, and H. Ben Amor, "Deep Predictive Models for Collision Risk Assessment in Autonomous Driving," 2017. [PDF]

S. A. Abdel Hakeem, H. H. Hussein, and H. W. Kim, "Security Requirements and Challenges of 6G Technologies and Applications," 2022. ncbi.nlm.nih.gov

V. D. Veksler, N. Buchler, B. E. Hoffman, D. N. Cassenti et al., "Simulations in Cyber-Security: A Review of Cognitive Modeling of Network Attackers, Defenders, and Users," 2018. ncbi.nlm.nih.gov

M. Scalas and G. Giacinto, "Automotive Cybersecurity: Foundations for Next-Generation Vehicles," 2019. [PDF]

R. Singh Rathore, C. Hewage, O. Kaiwartya, and J. Lloret, "In-Vehicle Communication Cyber Security: Challenges and Solutions," 2022. ncbi.nlm.nih.gov

Downloads

Published

2023-12-30

How to Cite

[1]
Dr. Siarhei Katsevich, “Cognitive Risk Assessment Models for Cybersecurity in Autonomous Vehicle Operations”, J. of Artificial Int. Research and App., vol. 3, no. 2, pp. 1–23, Dec. 2023, Accessed: Jul. 01, 2024. [Online]. Available: https://aimlstudies.co.uk/index.php/jaira/article/view/97

Similar Articles

1-10 of 30

You may also start an advanced similarity search for this article.