Interdisciplinary Approaches to Cybersecurity Education for Autonomous Vehicle Engineers
Cover
PDF

How to Cite

[1]
Dr. Sébastien Lachapelle, “Interdisciplinary Approaches to Cybersecurity Education for Autonomous Vehicle Engineers”, Journal of Bioinformatics and Artificial Intelligence, vol. 3, no. 1, pp. 122–138, Jun. 2024, Accessed: Jul. 04, 2024. [Online]. Available: https://biotechjournal.org/index.php/jbai/article/view/51

Abstract

With autonomous vehicles (AV), to date, no cybersecurity aerospace military education encourages, much less achieves, novice-to-advanced skills when encountering novel, imaginative, or sophisticated, multi-vector attacks that include social engineering as well as physical blending, unstoppable threats that could occur under a time-granular real-time limited latency or denial of service attack mitigations; all this, while considering safely intermingling autonomous vehicles with non-autonomous vehicles. Furthermore, there is no certification program for AV cybersecurity available today. Based on the exception-driven state, defense-in-depth, fail silent, and integrate modularity concepts, we present the development approach and results of the first cybersecurity-dedicated education and experimental testbed-hardware-software platform used by the Graduate School of Engineering and Applied Sciences, Oceana Virginia campus, U.S. Naval Postgraduate School, Department of the Navy.

PDF

References

F. Chen, K. T. Kim, S. S. Yau and D. Li, "Cybersecurity challenges and research opportunities for unmanned autonomous vehicles," 2011 IEEE International Conference on Cyber, Physical and Social Computing, Dalian, China, 2011, pp. 371-378.

Y. Liu, J. K. Liu, D. Chen, H. Su and X. Zhang, "Ensuring Security and Privacy Preservation for Vehicular Cloud Computing," in IEEE Transactions on Vehicular Technology, vol. 65, no. 7, pp. 5111-5122, July 2016.

N. Kumar, S. Sahoo, M. Conti, A. Passarella and S. Giordano, "Urban surveillance for intelligent vehicular safety systems," 2013 IEEE Global Communications Conference (GLOBECOM), Atlanta, GA, USA, 2013, pp. 3762-3767.

Tatineni, Sumanth. "Cost Optimization Strategies for Navigating the Economics of AWS Cloud Services." International Journal of Advanced Research in Engineering and Technology (IJARET) 10.6 (2019): 827-842.

Vemori, Vamsi. "Towards Safe and Equitable Autonomous Mobility: A Multi-Layered Framework Integrating Advanced Safety Protocols, Data-Informed Road Infrastructure, and Explainable AI for Transparent Decision-Making in Self-Driving Vehicles." Human-Computer Interaction Perspectives 2.2 (2022): 10-41.

Mahammad Shaik, et al. “Unveiling the Achilles’ Heel of Decentralized Identity: A Comprehensive Exploration of Scalability and Performance Bottlenecks in Blockchain-Based Identity Management Systems”. Distributed Learning and Broad Applications in Scientific Research, vol. 5, June 2019, pp. 1-22, https://dlabi.org/index.php/journal/article/view/3.

M. H. Islam, D. X. Zhou, G. Ma, S. S. Kanhere and S. Jha, "A survey of routing attacks in mobile ad hoc networks," in IEEE Communications Surveys & Tutorials, vol. 16, no. 1, pp. 30-54, First Quarter 2014.

L. Gao, S. Duan and H. Zhu, "Security in vehicular ad hoc networks," 2011 IEEE International Conference on Vehicular Electronics and Safety (ICVES), Beijing, China, 2011, pp. 258-263.

X. Hu, J. Xiong, Y. Chen and Y. Xiang, "A survey of attacks and countermeasures in cyber-physical systems," in IEEE Access, vol. 5, pp. 10559-10573, 2017.

P. Papadimitratos and L. Buttyan, "Securing vehicular communications," in IEEE Wireless Communications, vol. 13, no. 5, pp. 8-15, October 2006.

Y. Zhang, W. Liu, Z. Han and K. J. R. Liu, "Privacy-Preserving Data Aggregation in Vehicular Ad Hoc Networks: A Stackelberg Game Approach," in IEEE Transactions on Vehicular Technology, vol. 65, no. 12, pp. 9806-9817, Dec. 2016.

M. Raya and J.-P. Hubaux, "Securing vehicular ad hoc networks," in Journal of Computer Security, vol. 15, no. 1, pp. 39-68, 2007.

C. Lin, Y. Liu and G. Chen, "On the design of incentive schemes for vehicular crowdsensing," 2013 IEEE Global Communications Conference (GLOBECOM), Atlanta, GA, USA, 2013, pp. 3221-3226.

Y. He, X. Sun, B. Liang, L. Wang and S. Chen, "An Efficient Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks," in IEEE Transactions on Vehicular Technology, vol. 65, no. 7, pp. 5423-5436, July 2016.

R. R. Choudhury, A. Mathur, A. G. Ganesh and N. H. Vaidya, "Adaptive security for vehicular networks," 2010 IEEE INFOCOM, San Diego, CA, USA, 2010, pp. 1-9.

A. A. Hossain, M. A. Matin and H. M. Alam, "A secure and efficient protocol for VANET," 2014 IEEE 17th International Conference on Computational Science and Engineering, Chengdu, China, 2014, pp. 661-666.

J. Huang, H. Zhu, L. Gao, X. Li and J. Ma, "A security scheme for vehicle-to-vehicle communication," 2013 IEEE 10th Consumer Communications and Networking Conference (CCNC), Las Vegas, NV, USA, 2013, pp. 1071-1076.

J. Ben-Othman and L. M. Yung, "A survey of security attacks in vehicular ad hoc networks," in IEEE Communications Surveys & Tutorials, vol. 15, no. 2, pp. 854-871, Second Quarter 2013.

Y. Yang, R. H. Deng, J. Liang and J. W. Mark, "Toward Privacy-Preserving Data Sharing in Vehicular Ad Hoc Networks," in IEEE Transactions on Vehicular Technology, vol. 65, no. 12, pp. 9752-9766, Dec. 2016.

S. Ruj, A. Nayak, I. Stojmenovic and M. Hassan, "Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds," in IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 2, pp. 384-394, Feb. 2014.

Downloads

Download data is not yet available.