My Account Log in

2 options

Artificial Intelligence-Based Cybersecurity for Connected and Automated Vehicles.

DOAB Directory of Open Access Books Available online

View online

OAPEN Available online

View online
Format:
Book
Author/Creator:
Guijarro, Jordi.
Contributor:
Mhiri, Saber.
Choi, You-Jun.
Series:
NowOpen Series
NowOpen
Language:
English
Physical Description:
1 electronic resource (158 p.)
Edition:
1st ed.
Place of Publication:
Norwell, MA : Now Publishers, 2022.
Language Note:
English
Summary:
The damaging effects of cyberattacks to an industry like the Cooperative Connected and Automated Mobility (CCAM) can be tremendous. From the least important to the worst ones, one can mention for example the damage in the reputation of vehicle manufacturers, the increased denial of customers to adopt CCAM, the loss of working hours (having direct impact on the European GDP), material damages, increased environmental pollution due e.g., to traffic jams or malicious modifications in sensors’ firmware, and ultimately, the great danger for human lives, either they are drivers, passengers or pedestrians. Connected vehicles will soon become a reality on our roads, bringing along new services and capabilities, but also technical challenges and security threats. To overcome these risks, the CARAMEL project has developed several anti-hacking solutions for the new generation of vehicles. CARAMEL (Artificial Intelligence-based Cybersecurity for Connected and Automated Vehicles), a research project co-funded by the European Union under the Horizon 2020 framework programme, is a project consortium with 15 organizations from 8 European countries together with 3 Korean partners. The project applies a proactive approach based on Artificial Intelligence and Machine Learning techniques to detect and prevent potential cybersecurity threats to autonomous and connected vehicles. This approach has been addressed based on four fundamental pillars, namely: Autonomous Mobility, Connected Mobility, Electromobility, and Remote Control Vehicle. This book presents theory and results from each of these technical directions.
Contents:
Cover
ARTIFICIALINTELLIGENCE-BASEDCYBERSECURITY FORCONNECTED ANDAUTOMATED VEHICLES
Copyright Page
Table of Contents
EC Final Review Evaluation
Overview
Acknowledgements
List of Acronyms
Introduction
Anti Hacking Device Concept/Vision
Backend Solutions
1: Autonomous Mobility
State of Art/Innovation
Threats Considered/Detected
Scenario Description
Caramel Engine Description (Solution Design)
Physical Adversarial Attacks
GPS Spoofing Cooperative
Noise Attack at the Sensor Level
Adversarial Attack at the Scene Understanding Level
PointRCNN Architecture for Point Cloud 3D Detection
Point cloud region pooling
Canonical 3D bounding box refinement
Fusion Scheme
Conclusions and Future Work
References
2: V2X Connected Mobility
Threats/Problems Considered/Detected
Solution Design: V2X Technologies and Interoperability
General Architecture
Cooperative Car: OBU and Antihacking Device
Hardware Security Module (HSM)
V2X Communication Protocol Architecture (V2X-Com)
ITS Applications
PKI Client
Tracking avoidance
Alarm notification
Radio interfaces (IEEE 802.11p and LTE-Uu)
Network capabilities: Automotive ethernet, CAN, Wifi 802.11
Hardware Secure Elements
Roadside Infrastructure
RSUs
OS
Management
Ethernet connection
Virtual bridge
IEEE 802.11p transceiver
V2X-Com is implemented in the MEC
LTE small cells
Multi-access edge computing (MEC)
vEPC
MQTT Broker
V2X Forwarding
MEC Revocation client
MEC PKI client
V2XCom: Software to implement the ETSI ITS G5 communication protocol stack
Encoder/Decoder Module
BTP-Geonet Module
Encapsulation of V2X Messages Over IP
Remote Infrastructure
Backend
PKI servers.
V2X Message Authentication and Privacy CCRL Distribution
Attacks on Authorization Tickets Tracking
Attack Mitigation with the Authorization Ticket Scheduler
AT Scheduler Modules
V2X Message Candidate Selector
V2X Message Tracking Scorer
AT Change Decision Engine
OBU Hardware Securization
Software NXP BSP
Technical Safety Specifications
STRIDE Model
Potential Threads
Countermeasures and Anti-tamper Techniques
Environmental sensors
Open box detection switch
Coating covering sensible circuits
Active wire-mesh protection
Wire-mesh GNSS protection
Mutual authentication
Data encryption
Secure boot
Trusted execution environment
Countermeasures and potential threats mitigation
Final Testbed and Demostration
Conclusion and Future Work
3: Electromobility
Anomaly Detection
Solution Design
Smart Charging Abuse
Integration and Deployment
Transactions Service
Start Transaction Event
Stop Transaction Event
MeterValue Event
Details on the Dockerization Process
Experimental Setup
Charge Stations at GFX Office Parking
Test Facility
4: Remote Control Vehicle
1. General Architecture of Remote Control Vehicle
2. RCV Functional Components
3. RCV Control Station Functional Components
4. RCV Threat Detection and Analytics Functional Architecture
5. RCV Threat Detection and Prediction Mechanisms (TS Choi)
6. RCV Threat Detection and Prediction Experiment and Verification
Conclusions
Index
Contributing Authors
About the Editors.
Notes:
Description based on publisher supplied metadata and other sources.
ISBN:
1-63828-061-4
OCLC:
1356951407

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

Find

Home Release notes

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Find catalog Using Articles+ Using your account