...
首页> 外文期刊>Accident Analysis and Prevention >Cyber-attacks in the next-generation cars, mitigation techniques, anticipated readiness and future directions
【24h】

Cyber-attacks in the next-generation cars, mitigation techniques, anticipated readiness and future directions

机译:网络攻击在下一代汽车,缓解技术,预期准备和未来方向

获取原文
获取原文并翻译 | 示例
           

摘要

Modern-day Connected and Autonomous Vehicles (CAVs) with more than 100 million code lines, running up-to a hundred Electronic Control Units (ECUs) will create and exchange digital information with other vehicles and intelligent transport networks. Consequently, ubiquitous internal and external communication (controls, commands, and data) within all CAV-related nodes is inevitably the gatekeeper for the smooth operation. Therefore, it is a primary vulnerable area for cyber-attacks that entails stringent and efficient measures in the form of "cybersecurity". There is a lack of systematic and comprehensive review of the literature on cyber-attacks on the CAVs, respective mitigation strategies, anticipated readiness, and research directions for the future.This study aims to analyse, synthesise, and interpret critical areas for the roll-out and progression of CAVs in combating cyber-attacks. Specifically, we described in a structured way a holistic view of potentially critical avenues, which lies at the heart of CAV cybersecurity research. We synthesise their scope with a particular focus on ensuring effective CAVs deployment and reducing the probability of cyber-attack failures. We present the CAVs communication framework in an integrated form, i.e., from In-Vehicle (IV) communication to Vehicle-to-Vehicle (V2X) communication with a visual flowchart to provide a transparent picture of all the interfaces for potential cyber-attacks. The vulnerability of CAVs by proximity (or physical) access to cyber-attacks is outlined with future recommendations. There is a detailed description of why the orthodox cybersecurity approaches in Cyber-Physical System (CPS) are not adequate to counter cyber-attacks on the CAVs. Further, we synthesised a table with consolidated details of the cyber-attacks on the CAVs, the respective CAV communication system, its impact, and the corresponding mitigation strategies. It is believed that the literature discussed, and the findings reached in this paper are of great value to CAV researchers, technology developers, and decision-makers in shaping and developing a robust CAV-cybersecurity framework.
机译:现代连接和自动车辆(CAVE)具有超过1亿码的码线,跑到一百个电子控制单元(ECU)将创建和交换数字信息与其他车辆和智能传输网络。因此,所有CAV相关节点内的无处不在的内部和外部通信(控制,命令和数据)不可避免地是用于平滑操作的门守。因此,它是一个用于网络攻击的主要弱势区域,以“网络安全”的形式需要严格和有效的措施。对CAVE的网络攻击的文献缺乏系统和全面的审查,各自的缓解策略,预期准备和研究方向。本研究旨在分析,综合和解释卷的关键领域在打击网络攻击方面的曲域的进展。具体而言,我们以结构化方式描述了潜在的关键途径的整体视图,它位于Cav Cyber​​security Research的核心。我们用特别关注确保有效的CAVE部署并降低网络攻击失败的可能性,综合它们的范围。我们以集成的形式,即,从车载(iv)通信与车辆到车辆(V2X)通信的谱系通信框架与视觉流程图,以提供潜在网络攻击的所有接口的透明图像。通过未来的建议概述了距离近距离(或物理)访问网络攻击的漏洞。有详细描述为什么网络 - 物理系统(CPS)中的正统网络安全方法(CPS)的方法不足以对抗骑士群岛的网络攻击。此外,我们合成了一个表格,其中具有关于CAV的网络攻击细节,相应的CAV通信系统,其影响以及相应的缓解策略。据信,讨论的文献,本文达成的调查结果对于塑造和开发强大的CAV-Cyber​​security框架来说,对CAV研究人员,技术开发人员和决策者具有很大的价值。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号