Cybersecurity Aspects and Public Perception of Autonomous Road Vehicles Part 1

doi: 10.32567/hm.2023.3.11

Abstract

With the rise of embedded technologies and wireless capabilities, today’s vehicles are no longer isolated mechanical machines. They are becoming part of an interconnected system in which vehicles are constantly communicating with their individual system components in an internal network, as well as with each other and with the traffic control centre. This set of interconnected data is called a self-driving traffic management system. This system has the potential to support the future deployment of autonomous transport and to use artificial intelligence to significantly improve the safety, efficiency and sustainability of
transport. However, the emergence of autonomous means of transport raises new security issues that make the whole system a potential target for cyber security attacks, which could endanger both transport safety and human life.

Keywords:

autonomy transport cybersecurity

How to Cite

Katona, G. (2024). Cybersecurity Aspects and Public Perception of Autonomous Road Vehicles Part 1. Military Engineer, 18(3), 161–176. https://doi.org/10.32567/hm.2023.3.11

References

Al-kahtani, Mohammed Saeed (2012): Survey on Security Attacks in Vehicu¬lar ad hoc Networks (VANETs). 2012 th International Conference on Signal Processing and Communication Systems. IEEE, 1–9. Online: https://doi.org/10.1109/ ICSPCS.2012.6507953

Azumi, Takuya – Maruyama, Yuya – Kato, Shinpei (2020): ROS-lite: ROS Framework for NoC-Based Embedded Many-Core Platform. In IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS). IEEE, 4375–4382. Online: https://doi. org/10.1109/IROS45743.2020.9340977

Bányász Péter – Tóth András – László Gábor (2022): A koronavírus oltással kapcsolatos állampolgári attitűd vizsgálata szentimentanalízis segítségével. Információs Társadalom, 22(1), 99–125. Online: https://doi.org/10.22503/inftars.XXII.2022.1.6

Bar Hillel, A. et al. (2014): Recent Progress in Road and Lane Detection: A Survey. Machine Vision and Applications, 25, 727–745. Online: https://doi.org/10.1007/ s00138-011-0404-2

Bederna, Zsolt – Szádeczky, Tamás (2021): Modelling Computer Networks for Further Security Research. Security and Defence Quarterly, 36(4), 51–66. Online: https:// doi.org/10.35467/sdq/141572

Cao, Yulong et al. (2019): Adversarial Sensor Attack on Lidar-based Perception in Autonomous Driving. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2267–2281. Online: https://doi. org/10.1145/3319535.3339815

Chen, Ping-Rong et al. (2020): DSNet: An Efficient CNN for Road Scene Segmenta¬tion. APSIPA Transactions on Signal and Information Processing, 9(1), e27. Online: https://doi.org/10.1017/ATSIP.2020.25

Deutsch Nikolett et al. (2019): A technológia szerepének stratégiai felértékelődése: Szemelvények a stratégiai technomenedzsment témaköréből.Budapest: Budapesti Corvinus Egyetem.

Deutsch Nikolett – Berényi L. (2023): A technomenedzsment funkciói. Magyar Minőség, 32(6), 10–15.

IEEE (2010): IEEE Standard for Information technology – Local and metropolitan area networks – Specific requirements – Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 6: Wireless Access in Vehicular Environments, 2010: IEEE Std 802.11p-2010 (Amendment to IEEE Std 802.11-2007 as amended by IEEE Std 802.11k-2008, IEEE Std 802.11r-2008, IEEE Std 802.11y-2008, IEEE Std 802.11n-2009, and IEEE Std 802.11w-2009), 1–51. Online: https://doi.org/10.1109/IEEESTD.2010.5514475

Jo, Kichun – Kim, Chansoo – Sunwoo, Myoungho (2018): Simultaneous Localization and Map Change Update for the High Definition Map-Based Autonomous Driving Car. Sensors, 18, 3145. Online: https://doi.org/10.3390/s18093145

Kim, Kyounggon et al. (2021): Cybersecurity for Autonomous Vehicles: Review of Attacks and Defense. Computers & Security 103, 102–150. Online: https://doi. org/10.1016/j.cose.2020.102150

Liu, Jiajia et al. (2017): In-Vehicle Network Attacks and Countermeasures: Challenges and Future Directions. IEEE Network, 31(5), 50–58. Online: https://doi.org/10.1109/ MNET.2017.1600257

Megyeri Lajos – Farkas Tibor (2017): Kockázatkezelés, tudomány vagy kuruzslás? Hadmérnök, 12(3), 198–209.

Mejri, Mohamed Nidhal – Ben-Othman, Jalel – Hamdi, Mohamed (2014): Sur¬vey on VANET Security Challenges and Possible Cryptographic Solutions. Vehicular Communications, 2(1), 53–66. Online: https://doi.org/10.1016/j.vehcom.2014.05.001

Mostafa, Ahmad et al. (2011): A V2X-based Approach for Reduction of Delay Pro¬pagation in Vehicular Ad-Hoc Networks. In 2011 1th International Conference on ITS Telecommunications, IEEE, 756–761. Online: https://doi.org/10.1109/ ITST.2011.6060155

Orbók Ákos (2015): Az autonóm közlekedési technológia kihívásai. Társadalom és Honvédelem, 19(1), 221–226. Online: http://real.mtak.hu/50243

Paráda István – Farkas Tibor (2020): Felderítés és analízis a penetrációs teszt¬ben – . Információgyűjtési technikák. Hadmérnök, 15(1), 159–182. Online: https:// doi.org/10.32567/hm.2020.1.11

SAE International (2021): J3016C: Taxonomy and Definitions for Terms Related to Driving Automation Systems for On-Road Motor Vehicles.Online: https://www.sae.org/ standards/content/j3016_202104/

Santra, Atanu et al. (2019): Augmentation of GNSS utility by IRNSS/NavIC constellation over the Indian region. Advances in Space Research, 63(9), 2995–3008. Online: https://doi.org/10.1016/j.asr.2018.04.020

Syfullah, Mohammad – Lim, Joanne Mun-Yee (2017): Data Broadcasting on Cloud- VANET for IEEE 802.11p and LTE Hybrid VANET Architectures. 2017 rd International Conference on Computational Intelligence Communication Technology (CICT), IEEE, 1–6. Online: https://doi.org/10.1109/CIACT.2017.7977321

Tóth András (2017): Information Security for Electric Cars in Accordance with Nist Critical Infrastructure Cybersecurity Framework. Hadmérnök, 12(4), 195–206.

Yan, Chen – Xu, Wenyuan – Liu, Jianhao (2016): Can You Trust Autonomous Vehicles: Contactless Attacks against Sensors of Self-driving Vehicle.Def Con.109.

Zhao, Meiyuan – Walker, Jesse – Wang, Chieh-Chih (2012): Security Challenges for the Intelligent Transportation System. In Proceedings of the First International Conference on Security of Internet of Things, ACM, 107–115. Online: https://doi. org/10.1145/2490428.2490444