Autonomous vehicle: Security by design

A Chattopadhyay, KY Lam… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Security of (semi)-autonomous vehicles is a growing concern, first, due to the increased
exposure of the functionality to potential attackers; second, due to the reliance of …

[HTML][HTML] Security in intelligent transport systems for smart cities: From theory to practice

MA Javed, E Ben Hamida, W Znaidi - Sensors, 2016 - mdpi.com
Connecting vehicles securely and reliably is pivotal to the implementation of next generation
ITS applications of smart cities. With continuously growing security threats, vehicles could be …

On the interrelation of security, QoS, and safety in cooperative ITS

MA Javed, EB Hamida - IEEE Transactions on Intelligent …, 2016 - ieeexplore.ieee.org
Cooperative intelligent transport system (C-ITS) is an emerging technology that enables
secure and safe road travel using wireless communications. Vehicles regularly share their …

Channel-aware ECDSA signature verification of basic safety messages with k-means clustering in VANETs

EB Hamida, MA Javed - 2016 IEEE 30th International …, 2016 - ieeexplore.ieee.org
Vehicular ad hoc network facilitates cooperative awareness applications by periodically
sharing basic safety messages (BSMs) with the neighborhood vehicles. As these …

Safety & security in the context of autonomous driving

M Koschuch, W Sebron, Z Szalay… - … Vehicles and Expo …, 2019 - ieeexplore.ieee.org
With the advent of cypher-physical (systems of) systems, new challenges for safety and
security arise. Especially in the context of autonomous driving we are currently facing a …

Goal-oriented co-engineering of security and safety requirements in cyber-physical systems

C Ponsard, G Dallons, P Massonet - International Conference on …, 2016 - Springer
Many safety critical systems are integrating more and more software based systems and are
becoming increasingly connected. Such Cyber-Physical Systems require high assurance …

Incorporating attacker capabilities in risk estimation and mitigation

L ben Othmane, R Ranchal, R Fernando… - Computers & …, 2015 - Elsevier
The risk exposure of a given threat to an information system is a function of the likelihood of
the threat and the severity of its impacts. Existing methods for estimating threat likelihood …

Towards a security architecture for protecting connected vehicles from malware

S Iqbal, A Haque, M Zulkernine - 2019 IEEE 89th Vehicular …, 2019 - ieeexplore.ieee.org
Vehicles are becoming increasingly connected to the outside world. We can connect our
devices to the vehicle's infotainment system and internet is being added as a functionality …

New aspects of integrity levels in automotive industry-cybersecurity of automated vehicles

Á Török, Z Szalay, B Sághi - IEEE transactions on intelligent …, 2020 - ieeexplore.ieee.org
The spread of connected vehicles is expected to multiply the effects of the growing
penetration of cyberspace in our life, and with this it remarkably influences the vulnerability …

Systems and methods for detecting anomalies that are potentially indicative of malicious attacks

W Bogorad - US Patent 10,104,100, 2018 - Google Patents
A computer-implemented method for detecting anomalies that are potentially indicative of
malicious attacks may include (1) identifying a sequence of activities performed on a …