3,382
Views
3
CrossRef citations to date
0
Altmetric
Research Article

Impact of Factors Influencing Cyber Threats on Autonomous Vehicles

, ORCID Icon, , &

References

  • Adams, M. D., S. D. Hitefield, B. Hoy, M. C. Fowler, and T. C. Clancy. 2013. Application of cybernetics and control theory for a new paradigm in cybersecurity. arXiv Preprint arXiv 1311:0257.
  • Amoozadeh, M., A. Raghuramu, C. N. Chuah, D. Ghosal, H. M. Zhang, J. Rowe, and K. Levitt. 2015. Security vulnerabilities of connected vehicle streams and their impact on cooperative driving. IEEE Communications Magazine 53 (6):126–32. doi:10.1109/MCOM.2015.7120028.
  • Anderson, J. M., et al. 2014. Rand corp., autonomous vehicle technology: A guide for policymakers. 18–28. ; Sarwant Singh, The 10 Social and Tech Trends That Could Shape the Next Decade, FORBES (May 12, 2014, 12:54 PM), http://www.forbes.com/sites/sarwantsingh/2014/05/12/the-top-10-mega-trendsof-the-decade/. http://www.rand.org/content/dam/rand/pubs/research_reports/RR400/RR443-1/RAND_RR443-1.pdf.
  • Anderson, J. M., N. Kalra, and M. Wachs. 2009. Liability and regulation of autonomous vehicle technologies. RAND Corporation, Berkeley, CA. http://www. rand. org/pubs/external_ publications/EP20090427. html.
  • Bagloee, S. A., M. Tavana, M. Asadi, and T. Oliver. 2016. Autonomous vehicles: Challenges, opportunities, and future implications for transportation policies. Journal of Modern Transportation 24 (4):284–303. doi:10.1007/s40534-016-0117-3.
  • Bloom, C., J. Tan, J. Ramjohn, and L. Bauer. July 2017. Self-driving cars and data collection: Privacy perceptions of networked autonomous vehicles. Symposium on Usable Privacy and Security (SOUPS).
  • Bonnefon, J.-F., A. Shariff, and I. Rahwan. 2016. The social dilemma of autonomous vehicles. Science. 352 (6293):pp. 1573–1574. doi:10.1126/science.aaf2654.
  • Brodsky, J. S. 2016. Autonomous vehicle regulation: How an uncertain legal landscape may hit the brakes on self-driving cars. Berkeley Technology Law Journal 31:851.
  • Bullmore, E. T., B. Horwitz, G. D. Honey, M. J. Brammer, S. C. R. Williams, and T. Sharma. 2000. How good is good enough in path analysis of fMRI data? NeuroImage 11:289–301. doi:10.1006/nimg.2000.0544.
  • Buttigieg, R., M. Farrugia, and C. Meli. December 2017. Security issues in controller area networks in automobiles. Sciences and Techniques of Automatic Control and Computer Engineering (STA), 2017 18th International Conference, IEEE, 93–98.
  • Caltagirone, S. 2015. The cost of bad threat intelligence. viewed 6 February 2017. http://www.activeresponse.org/the-cost-of-bad-threat-intelligence/
  • Carless, S. A. 2004. Discriminant validity. In Encyclopedia of social science research methods, 273. doi:10.4135/9781412950589.
  • Carlson, K. D., and A. O. Herdman. 2012. Understanding the impact of convergent validity on research results. Organizational Research Methods 15:17–32. doi:10.1177/1094428110392383.
  • Carsten, P., T. R. Andel, M. Yampolskiy, J. T. McDonald, and S. Russ. September 2015. A system to recognize intruders in controller area network (CAN). Proceedings of the 3rd International Symposium for ICS & SCADA Cybersecurity Research. BCS Learning & Development Ltd, 111–14.
  • Carvalho, A., Y. Gao, S. Lefevre, and F. Borrelli. September 2014. Stochastic predictive control of autonomous vehicles in uncertain environments. 12th International Symposium on Advanced Vehicle Control, 712–19.
  • Cavoli, C., B. Phillips, T. Cohen, and P. Jones. 2017. Social and behavioural questions associated with automated vehicles a literature review. UCL Transport Institute January.
  • Christin, D. 2016. Privacy in mobile participatory sensing: Current trends and future challenges. Journal of Systems and Software 116:57–68. doi:10.1016/j.jss.2015.03.067.
  • Cohen, T., P. Jones, and C. Cavoli. 2017. Social and behavioural questions associated with automated vehicles. UCL Transport Institute: London, UK.
  • Crane, D. A., K. D. Logue, and B. C. Pilz. 2016. A survey of legal issues arising from the deployment of autonomous and connected vehicles. Michigan Telecommunications and Technology Law Review 23:191.
  • Cunningham, M., and M. A. Regan. October 2015. Autonomous vehicles: Human factors issues and future research. Proceedings of the 2015 Australasian Road Safety Conference.
  • Daly, I. F. D. P. F. S. J., B. Endicott-Popovsky, and J. Wendleberger. 2002. White paper #2 – Tranforming cybersecurity research: The deming analogy, draft. University of Washington, Tech. Rep..
  • Dariz, L., M. Selvatici, M. Ruggeri, G. Costantino, and F. Martinelli. June 2017. Trade-off analysis of safety and security in CAN bus communication. 5th IEEE International Conference on Models and Technologies for Intelligent Transportation Systems, MT-ITS 2017, Naples, Italy, 226–31.
  • Douma, F., and S. A. Palodichuk. 2012. Criminal liability issues created by autonomous vehicles, 52. Santa Clara Law Review 1157.
  • Efron, B. 1987. Better bootstrap confidence intervals. Journal of the American Statistical Association 82 (397):171–85. doi:10.2307/2289144.
  • Elbanhawi, M., M. Simic, and R. Jazar. 2015. In the passenger seat: Investigating ride comfort measures in autonomous cars. IEEE Intelligent Transportation Systems Magazine 7 (3):4–17. doi:10.1109/MITS.2015.2405571.
  • Eric Newcomer. November 22, 2017. Uber paid hackers to delete stolen data on 57 million people. https://www.bloomberg.com/news/articles/2017-11-21/uber-concealed-cyberattack-that-exposed-57-million-people-s-data
  • Fitch, G., D. Bowman, and R. Llaneras. 2014. Distracted driver performance to multiple alerts in a multiple-conflict scenario. Human Factors 56 (8):1497–505. doi:10.1177/0018720814531785.
  • Fraedrich, E., S. Beiker, and B. Lenz. 2015. Transition pathways to fully automated driving and its implications for the sociotechnical system of automobility. European Journal of Futures Research 3 (1):11. doi:10.1007/s40309-015-0067-8.
  • Friesen, M. R., and R. D. McLeod. 2015. Bluetooth in intelligent transportation systems: A survey. International Journal of Intelligent Transportation Systems Research 13 (3):143–53. doi:10.1007/s13177-014-0092-1.
  • Galceran, E., A. G. Cunningham, R. M. Eustice, and E. Olson. 2017. Multipolicy decision-making for autonomous driving via changepoint-based behavior prediction: Theory and experiment. Autonomous Robots 41 (6):1367–82. doi:10.1007/s10514-017-9619-z.
  • Geels, F. W. 2005 December The dynamics of transitions in socio-technical systems: A multi-level analysis of the transition pathway from horsedrawn carriages to automobiles (1860–1930). Technology Analysis & Strategic Management 17(4):445–76. doi: 10.1080/09537320500357319.
  • Geng, X., H. Liang, B. Yu, P. Zhao, L. He, and R. Huang. 2017. A scenario-adaptive driving behavior prediction approach to urban autonomous driving. Applied Sciences 7 (4):426. doi:10.3390/app7040426.
  • Glancy, D. J. 2015. Autonomous and automated and connected cars-oh my: First generation autonomous cars in the legal ecosystem. Minnesota Journal of Law, Science & Technology 16:619.
  • Gosman, C., C. Dobre, and F. Pop. May 2017. Privacy-preserving data aggregation in intelligent transportation systems. Integrated Network and Service Management (IM), 2017 IFIP/IEEE Symposium, IEEE, 1059–64.
  • Griffin, M. L. 2018. Steering (or not) through the social and legal implications of autonomous vehicles. Journal of Business, Entrepreneurship & the Law 11:81.
  • Haddrell, M. 2016. Towards an autonomous vehicle enabled society: Cyber attacks and countermeasures.
  • Hair, J. F., C. M. Ringle, and M. Sarstedt. 2011. PLS-SEM: Indeed a silver bullet. Journal of Marketing Theory and Practice 19 (2):139–52. doi:10.2753/MTP1069-6679190202.
  • Hamida, E. B., H. Noura, and W. Znaidi. 2015. Security of cooperative intelligent transport systems: Standards, threats analysis and cryptographic countermeasures. Electronics 4 (3):380–423. doi:10.3390/electronics4030380.
  • Hancock, P. A., D. R. Billings, K. E. Oleson, J. Y. Chen, E. De Visser, and R. Parasuraman. 2011. A meta-analysis of factors influencing the development of human-robot trust (No. ARL-TR-5857). Army research lab aberdeen proving ground md human research and engineering directorate.
  • Hansman, S., and R. Hunt. 2005. A taxonomy of network and computer attacks. Computers & Security 24 (1):31–43. doi:10.1016/j.cose.2004.06.011.
  • He, Q., X. Meng, and R. Qu. May 2017. Survey on cybersecurity of CAV. Cooperative Positioning and Service (CPGP), 2017 Forum. IEEE, 351–54.
  • Henseler, J., and T. K. Dijkstra. 2015. ADANCO 2.0. Kleve, Germany: Composite Modeling.
  • Kamhoua, C., A. Martin, D. K. Tosh, K. A. Kwiat, C. Heitzenrater, and S. Sengupta. November 2015. Cyber-threats information sharing in cloud computing: A game theoretic approach. Cybersecurity and Cloud Computing (CSCloud), 2015 IEEE 2nd International Conference, IEEE, 382–89.
  • Keith Naughton Humans Are Slamming into Driverless Cars and Exposing a Key Flaw. December 2015 https://www.bloomberg.com/news/articles/2015-12-18/humans-are-slamming-into-driverless-cars-and-exposing-a-key-flaw
  • Kennedy, C. 2016. New threats to vehicle safety: How cybersecurity policy will shape the future of autonomous vehicles. Michigan Telecommunications and Technology Law Review 23:343.
  • Koscher, K., A. Czeskis, F. Roesner, S. Patel, T. Kohno, S. Checkoway, … S. Savage. May 2010. Experimental security analysis of a modern automobile. Security and Privacy (SP), 2010 IEEE Symposium. IEEE, 447–62.
  • Lederman, J., B. D. Taylor, and M. Garrett. 2016. A private matter: The implications of privacy regulations for intelligent transportation systems. Transportation Planning and Technology 39 (2):115–35. doi:10.1080/03081060.2015.1127537.
  • Lee, R. M. 2015a. Active cyber defense cycle. viewed 6 February 2017, http://www.irongeek.com/i.php?page=videos/bsideshuntsville2015/active-cyber-defense-cyclerobert-m-lee
  • Mandt, E. J. 2017. Integrating cyber-intelligence analysis and active cyber-defence operations. Journal of Information Warfare 16 (1):31–48.
  • McChristian, L., and R. Corbett. 2016. Regulatory issues related to autonomous vehicles. Journal of Insurance Regulation 35 (7).
  • McMorrow, D. November 2010. Science of cybersecurity. Jason, MITRE Corporation, McLean, VA, Tech. Rep..
  • Pallant., J. 2007. SPSS Survival Manual. 3rd ed. Crows West, New South Wales.
  • Parkinson, S., P. Ward, K. Wilson, and J. Miller. 2017. Cyber threats facing autonomous and connected vehicles: Future challenges. IEEE Transactions on Intelligent Transportation Systems 18 (11):2898–915. doi:10.1109/TITS.2017.2665968.
  • Petersen, L., D. Tilbury, X. J. Yang, and L. Robert. 2017. Effects of augmented situational awareness on driver trust in semi-autonomous vehicle operation.
  • Petit, J., and S. E. Shladover. 2015. Potential cyberattacks on automated vehicles. IEEE Transactions on Intelligent Transportation Systems 16 (2):546–56.
  • Sakiz, F., and S. Sen. 2017. A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV. Ad Hoc Networks 61:33–50. doi:10.1016/j.adhoc.2017.03.006.
  • Shariff, A., J. F. Bonnefon, and I. Rahwan. 2017. Psychological roadblocks to the adoption of self-driving vehicles. Nature Human Behaviour 1 (10):694. doi:10.1038/s41562-017-0202-6.
  • Simic, M. N. October 2013. Vehicular ad hoc networks. Telecommunication in Modern Satellite, Cable and Broadcasting Services (TELSIKS), 2013 11th International Conference (Vol. 2, pp. 613–18). IEEE.
  • Surden, H., and M. A. Williams. 2016. Technological opacity, predictability, and self-driving cars. Cardozo Law Review 38:121.
  • Taeihagh, A., and H. S. M. Lim. 2018. Governing autonomous vehicles: Emerging responses for safety, liability, privacy, cybersecurity, and industry risks. Transport Reviews 1–26.
  • Toews, R. August. 25, 2016. The biggest threat facing connected autonomous vehicles is cybersecurity. Techcrunch. https://techcrunch.com/2016/08/25/the-biggest-threatfacing-connected-autonomous-vehicles-is-cybersecurity/.
  • Turner, S. W., and S. Uludag April, 2016. Intelligent transportation as the key enabler of smart cities. Network Operations and Management Symposium (NOMS), 2016 IEEE/IFIP (pp. 1261–64). IEEE.
  • Villasenor, J. April 2014. Products liability and driverless cars: issues and guiding principles for legislation. Brookings. https://www.brookings.edu/research/products-liability-and-driverless-cars-issues-and-guiding-principles-for-legislation/
  • Volkswagen, Intel, and Mobileye will launch a self-driving taxi service in Israel. 2019. https://www.theverge.com/2018/10/29/18039216/volkswagen-intel-mobileye-self-driving-ride-hailing-israel–2019
  • Wang, Q., Z. Lu, and G. Qu. 2018. An entropy analysis based intrusion detection system for controller area network in vehicles. arXiv Preprint arXiv 1808:04046.
  • Werts, C. E., D. R. Rock, R. L. Linn, and K. G. Joreskog. 1978. A general method of estimating the reliability of a composite. Educational and Psychological Measurement 38 (4):933–38. doi:10.1177/001316447803800412.
  • Wortham, R. H., and A. Theodorou. 2017. Robot transparency, trust and utility. Connection Science 29 (3):242–48. doi:10.1080/09540091.2017.1313816.
  • Wu, C., and Y. Liu. 2007. Queuing network modeling of driver workload and performance. IEEE Transactions on Intelligent Transportation Systems 8 (3):528–37. doi:10.1109/TITS.2007.903443.
  • Yan, C., W. Xu, and J. Liu. 2016. Can you trust autonomous vehicles: Contactless attacks against sensors of self-driving vehicle. DEF CON. 24.
  • Yuan, Y., and F. Y. Wang. November 2016. Towards blockchain-based intelligent transportation systems. Intelligent Transportation Systems (ITSC), 2016 IEEE 19th International Conference (pp. 2663–68). IEEE.
  • Zeeb, K., A. Buchner, and M. Schrauf. 2015. What determines the take-over time? An integrated model approach of driver take-over after automated driving. Accident Analysis & Prevention 78:212–21. doi:10.1016/j.aap.2015.02.023.
  • Zhang, T., H. Antunes, and S. Aggarwal. 2014. Defending connected vehicles against malware: Challenges and a solution framework. IEEE Internet of Things Journal 1 (1):10–21. doi:10.1109/JIOT.2014.2302386.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.