2 options
Artificial Intelligence-Based Cybersecurity for Connected and Automated Vehicles.
- Format:
- Book
- Author/Creator:
- Guijarro, Jordi.
- Series:
- NowOpen Series
- NowOpen
- Language:
- English
- Physical Description:
- 1 electronic resource (158 p.)
- Edition:
- 1st ed.
- Place of Publication:
- Norwell, MA : Now Publishers, 2022.
- Language Note:
- English
- Summary:
- The damaging effects of cyberattacks to an industry like the Cooperative Connected and Automated Mobility (CCAM) can be tremendous. From the least important to the worst ones, one can mention for example the damage in the reputation of vehicle manufacturers, the increased denial of customers to adopt CCAM, the loss of working hours (having direct impact on the European GDP), material damages, increased environmental pollution due e.g., to traffic jams or malicious modifications in sensors’ firmware, and ultimately, the great danger for human lives, either they are drivers, passengers or pedestrians. Connected vehicles will soon become a reality on our roads, bringing along new services and capabilities, but also technical challenges and security threats. To overcome these risks, the CARAMEL project has developed several anti-hacking solutions for the new generation of vehicles. CARAMEL (Artificial Intelligence-based Cybersecurity for Connected and Automated Vehicles), a research project co-funded by the European Union under the Horizon 2020 framework programme, is a project consortium with 15 organizations from 8 European countries together with 3 Korean partners. The project applies a proactive approach based on Artificial Intelligence and Machine Learning techniques to detect and prevent potential cybersecurity threats to autonomous and connected vehicles. This approach has been addressed based on four fundamental pillars, namely: Autonomous Mobility, Connected Mobility, Electromobility, and Remote Control Vehicle. This book presents theory and results from each of these technical directions.
- Contents:
- Cover
- ARTIFICIALINTELLIGENCE-BASEDCYBERSECURITY FORCONNECTED ANDAUTOMATED VEHICLES
- Copyright Page
- Table of Contents
- EC Final Review Evaluation
- Overview
- Acknowledgements
- List of Acronyms
- Introduction
- Anti Hacking Device Concept/Vision
- Backend Solutions
- 1: Autonomous Mobility
- State of Art/Innovation
- Threats Considered/Detected
- Scenario Description
- Caramel Engine Description (Solution Design)
- Physical Adversarial Attacks
- GPS Spoofing Cooperative
- Noise Attack at the Sensor Level
- Adversarial Attack at the Scene Understanding Level
- PointRCNN Architecture for Point Cloud 3D Detection
- Point cloud region pooling
- Canonical 3D bounding box refinement
- Fusion Scheme
- Conclusions and Future Work
- References
- 2: V2X Connected Mobility
- Threats/Problems Considered/Detected
- Solution Design: V2X Technologies and Interoperability
- General Architecture
- Cooperative Car: OBU and Antihacking Device
- Hardware Security Module (HSM)
- V2X Communication Protocol Architecture (V2X-Com)
- ITS Applications
- PKI Client
- Tracking avoidance
- Alarm notification
- Radio interfaces (IEEE 802.11p and LTE-Uu)
- Network capabilities: Automotive ethernet, CAN, Wifi 802.11
- Hardware Secure Elements
- Roadside Infrastructure
- RSUs
- OS
- Management
- Ethernet connection
- Virtual bridge
- IEEE 802.11p transceiver
- V2X-Com is implemented in the MEC
- LTE small cells
- Multi-access edge computing (MEC)
- vEPC
- MQTT Broker
- V2X Forwarding
- MEC Revocation client
- MEC PKI client
- V2XCom: Software to implement the ETSI ITS G5 communication protocol stack
- Encoder/Decoder Module
- BTP-Geonet Module
- Encapsulation of V2X Messages Over IP
- Remote Infrastructure
- Backend
- PKI servers.
- V2X Message Authentication and Privacy CCRL Distribution
- Attacks on Authorization Tickets Tracking
- Attack Mitigation with the Authorization Ticket Scheduler
- AT Scheduler Modules
- V2X Message Candidate Selector
- V2X Message Tracking Scorer
- AT Change Decision Engine
- OBU Hardware Securization
- Software NXP BSP
- Technical Safety Specifications
- STRIDE Model
- Potential Threads
- Countermeasures and Anti-tamper Techniques
- Environmental sensors
- Open box detection switch
- Coating covering sensible circuits
- Active wire-mesh protection
- Wire-mesh GNSS protection
- Mutual authentication
- Data encryption
- Secure boot
- Trusted execution environment
- Countermeasures and potential threats mitigation
- Final Testbed and Demostration
- Conclusion and Future Work
- 3: Electromobility
- Anomaly Detection
- Solution Design
- Smart Charging Abuse
- Integration and Deployment
- Transactions Service
- Start Transaction Event
- Stop Transaction Event
- MeterValue Event
- Details on the Dockerization Process
- Experimental Setup
- Charge Stations at GFX Office Parking
- Test Facility
- 4: Remote Control Vehicle
- 1. General Architecture of Remote Control Vehicle
- 2. RCV Functional Components
- 3. RCV Control Station Functional Components
- 4. RCV Threat Detection and Analytics Functional Architecture
- 5. RCV Threat Detection and Prediction Mechanisms (TS Choi)
- 6. RCV Threat Detection and Prediction Experiment and Verification
- Conclusions
- Index
- Contributing Authors
- About the Editors.
- Notes:
- Description based on publisher supplied metadata and other sources.
- ISBN:
- 1-63828-061-4
- OCLC:
- 1356951407
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.