Comprehensive Overview of Autonomous Vehicles and Their Security Against DDoS Attacks

Comprehensive Overview of Autonomous Vehicles and Their Security Against DDoS Attacks

Swati Jaiswal, Pallavi S. Yevale, Anuja R. Jadhav
DOI: 10.4018/978-1-7998-9430-8.ch003
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The automotive industry is developing trends in autonomous driving and connected vehicular systems. These vehicles can access and send the data, download the software updates, connect with other vehicles or other IoT devices via the internet or wireless communication. Autonomous vehicle control urges very strict requirements about the security of the communication channels used by the vehicle to exchange information and the control logic that performs complex driving tasks. So, the increased connectivity results in a heightened risk of a cyber-security attack. For maintaining the advances in safe communication, it is important to establish strong security for connected vehicular systems. For this, existing cybersecurity attacks must be considered to minimize future cybersecurity risks in the connected and autonomous vehicle systems. In this chapter, the authors will emphasize recent works on how autonomous vehicles can ensure strong operation under ongoing cyber security attacks and their possible solutions.
Chapter Preview
Top

Introduction

In recent years, traffic security has attracted extending thought among trained professionals, organizations, and government affiliations. As demonstrated by a report from the U.S. Division of Transportation, there were 36,560 people were killed due to the car crashes in the U.S. in 2018 (NCSA, 2019) and that suggests there were around 100 deaths reliably. Human mishaps are related with 94 to 96 percent of all motor vehicle crashes. Consequently, the free driving development has been attracting light of an authentic worry for the researchers for quite a while. Beginning from this prolonged stretch of time, further created driver help developments, as electronic constancy control moreover, way departure alerted, were being made to further work on the security and diminish the driver load, which as well prepare to autonomous driving headways. The Society of Automotive Engineers (SAE) has described six particular levels of driver help development types of progress.

The type of technology is explained by established criteria. The automation standard ranges between level 0 and level 5. Level 0 includes all of Porsche's vehicles through 1967 to the new car, completely managed in 2018. The Level 1 automatic control allows the vehicle to decide about how to guide or stop or speed the autonomous driving support system (ADAS) mounted in the car. The functionality of Level 2 comprises of the driving and acceleration ADAS power. The human operator should, nevertheless, remain attentive. Level 2 instances are Audi Traffic Jam Assist, Cadillac Super Cruise, Autopilot, etc. Instances include Both facets of a driving automobile are carried out by level 3 robotics, however the human operator has to assume around when ADAS requires. The human operator must also be careful. In “Audi Traffic Jam Pilot” level 3 of optimization can be obtained. The second stage of autonomy allows the vehicles to execute all the functions as well as to control the world. Although ADAS performs all the tasks during the last stage of automation, people only are the travellers. In Stage 5, the system validates the location in GPS as well as the driver drove the passenger to that same endpoint directly regardless finding the help or knowledge from the person. Automotive industries are now looking for level 3. Tesla argues we are level 3, but Tesla's feedback is automatic level 2. Figure 1. Intelligent vehicle cyber-attack gateways Shows some of the potential cyber-attack gateways mostly on driverless vehicles. The machine is far more susceptible to theft by hackers as the amount of automation rises.

Figure 1.

Smart car gateways for cyber-attacks (Mohd et al., 2018)

978-1-7998-9430-8.ch003.f01

Any network-connected system will perform denial-of-service attack (Jaiswal & Chandra, 2017). IoT that we are using in the everyday lives transmits data on the web, transmits information and is processed in live time but is susceptible to hacking. The intelligent transportation system also communicates in full detail only with networks. The cyberwarfare trend reveals that under this risk the auto sector suffers. In addition, it could influence the rail. The recently installed rail service is connecting with the networks in all the metropolises. The results will be enormously and catastrophically if a Cyber assault were initiated inside a system conducted amongst the railways in the system as well as the data exchanged is changed or postponed. The state-developed public transit system needs massive developments, and this event would not only damage infrastructure, but also damage the confidence of commuters who use it every day to drive to work or school (Desai & Jaiswal, 2021). VANETs allow consumers to improve security problems to traveling ease, to make a safer, healthier, and smarter world possible.

Key Terms in this Chapter

Linear Correlation: Correlation is said to be linear if the ratio of change is constant.

Cryptography: It provides a secure communications technique that allow only the sender and intended recipient of a message to view its contents.

DDoS Attack: A DDoS attack occurs when an intruder uses resources from multiple, remote locations to attack an organization’s online operations.

Normalization: It is a scaling technique in Machine Learning applied during data preparation to change the values of numeric columns in the dataset to use a common scale.

Precision: It is one of the important performance indicators, which indicates the quality of a positive prediction made by model.

Recall: It measures the model's ability to detect positive samples.

IDS: An Intrusion Detection System (IDS) is a network security technology originally built for detecting vulnerability exploits against a target application or computer.

Accuracy: It is the measurement used to determine which model is best at identifying relationships and patterns between variables in a dataset based on the input, or training, data.

Autonomous Vehicle: An autonomous car is a vehicle which can sense its surroundings and operate without human intervention.

Entropy: A high entropy means low information gain, and a low entropy means high information gain.

Complete Chapter List

Search this Book:
Reset