ABSTRACT
We consider the cybersecurity challenges arising from communications between autonomous vehicles and smart infrastructures. In particular, we consider coordination between vehicles and Reduced Speed Work Zones (RSWZ). Malicious or tampered communications between these entities can have catastrophic consequences. We discuss methods for the analysis of such attacks. In particular, we show how to generate configurable, effective vehicular trajectories for exploring such attacks and how to utilize such trajectories in identifying impactful attacks and evaluating defenses.
Supplemental Material
Available for Download
Supplemental material.
- Atmeh, G., and Subbarao, K. A dynamic neural network with feedback for trajectory generation. IFAC-PapersOnLine 49, 1 (2016), 367--372. 4th IFAC Conference on Advances in Control and Optimization of Dynamical Systems ACODS 2016.Google ScholarCross Ref
- Cai, P., Sun, Y., Wang, H., and Liu, M. Vtgnet: A vision-based trajectory generation network for autonomous vehicles in urban environments. IEEE Transactions on Intelligent Vehicles 6, 3 (2021), 419--429.Google ScholarCross Ref
- Dever, C., Mettler, B., Feron, E., Popovic, J., and McConley, M. Nonlinear trajectory generation for autonomous vehicles via parameterized maneuver classes. Journal Of Guidance, Control, And Dynamics 29, 2 (2006).Google Scholar
- Dosovitskiy, A., Ros, G., Codevilla, F., Lopez, A., and Koltun, V. CARLA: An open urban driving simulator. In Proceedings of the 1st Annual Conference on Robot Learning (2017), pp. 1--16.Google Scholar
- Fassbender, D., Heinrich, B. C., Luettel, T., and Wuensche, H.-J. An optimization approach to trajectory generation for autonomous vehicle following. In 2017 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS) (2017), pp. 3675--3680.Google ScholarDigital Library
- Lopez, P. A., Behrisch, M., Bieker-Walz, L., Erdmann, J., Flötteröd, Y.-P., Hilbrich, R., Lücken, L., Rummel, J., Wagner, P., and Wiessner, E. Microscopic traffic simulation using sumo. In The 21st IEEE International Conference on Intelligent Transportation Systems (2018), IEEE.Google ScholarDigital Library
- Nolte, M., Rose, M., Stolte, T., and Maurer, M. Model predictive control based trajectory generation for autonomous vehicles --- an architectural approach. In 2017 IEEE Intelligent Vehicles Symposium (IV) (2017), pp. 798--805.Google ScholarDigital Library
- Pérez, J., Godoy, J., Villagrá, J., and Onieva, E. Trajectory generator for autonomous vehicles in urban environments. In 2013 IEEE International Conference on Robotics and Automation (2013), pp. 409--414.Google ScholarCross Ref
- Vu, T. M., Moezzi, R., Cyrus, J., Hlava, J., and Petru, M. Feasible trajectories generation for autonomous driving vehicles. Applied Sciences 11, 23 (2021).Google ScholarCross Ref
- Zhang, Y., Sun, H., Zhou, J., Hu, J., and Miao, J. Optimal trajectory generation for autonomous vehicles under centripetal acceleration constraints for in-lane driving scenarios. In 2019 IEEE Intelligent Transportation Systems Conference (ITSC) (2019), pp. 3619--3626.Google ScholarDigital Library
Index Terms
- Poster: Vehicle-to-Infrastructure Security for Reduced Speed Work Zone
Recommendations
Speed Control System Analysis of Freeway Work Zone Based on ITS
ISDEA '14: Proceedings of the 2014 Fifth International Conference on Intelligent Systems Design and Engineering ApplicationsVehicle speed control is one of the main methods to ensure the safety of freeway work zone. In order to control vehicle running speed reasonably in freeway work zone, the research of adaptive speed control of freeway work zone is carried out. Based on ...
An analysis of vehicle-to-infrastructure communications for non-signalised intersection control under mixed driving behaviour
Intersection control has an important role in the management of urban traffic to ensure safety, high traffic flow and to prevent congestion. Recently, a growing body of literature has been reported on the theme of non-signalised intersection control in ...
Mapping the Security Events to the MITRE ATT &CK Attack Patterns to Forecast Attack Propagation (Extended Abstract)
Attacks and Defenses for the Internet-of-ThingsAbstractModern information systems generate a lot of events. Analysis of the events allows detecting malicious activity within the system. There are a lot of event correlation techniques intended for the detection of cyber security incidents and different ...
Comments