SAFETYLIT WEEKLY UPDATE

We compile citations and summaries of about 400 new articles every week.
RSS Feed

HELP: Tutorials | FAQ
CONTACT US: Contact info

Search Results

Journal Article

Citation

Parkinson S, Ward P, Wilson K, Miller J. IEEE Trans. Intel. Transp. Syst. 2017; 18(11): 2898-2915.

Copyright

(Copyright © 2017, IEEE (Institute of Electrical and Electronics Engineers))

DOI

10.1109/TITS.2017.2665968

PMID

unavailable

Abstract

Vehicles are currently being developed and sold with increasing levels of connectivity and automation. As with all networked computing devices, increased connectivity often results in a heightened risk of a cyber security attack. Furthermore, increased automation exacerbates any risk by increasing the opportunities for the adversary to implement a successful attack. In this paper, a large volume of publicly accessible literature is reviewed and compartmentalized based on the vulnerabilities identified and mitigation techniques developed. This review highlighted that the majority of studies are reactive and vulnerabilities are often discovered by friendly adversaries (white-hat hackers). Many gaps in the knowledge base were identified. Priority should be given to address these knowledge gaps to minimize future cyber security risks in the connected and autonomous vehicle sector.


Language: en

Keywords

adversary; autonomous; autonomous vehicle sector; Autonomous vehicles; computer crime; Connected; connected vehicle sector; connectivity; cyber security attack; cyber security risks; cyber threats; friendly adversaries; Global Positioning System; heightened risk; Jamming; knowledge base; knowledge gaps; Laser radar; mitigation; mitigation techniques; Network security; networked computing devices; risk management; Risk management; Sensors; traffic engineering computing; transportation; vehicles; vulnerabilities; white-hat hackers

NEW SEARCH


All SafetyLit records are available for automatic download to Zotero & Mendeley
Print