Athanasios Sersemis, Alexandros Papadopoulos, Georgios Spanos, Antonios Lalas, K. Votis, D. Tzovaras
{"title":"面向网络安全的自动驾驶汽车通信保障体系结构","authors":"Athanasios Sersemis, Alexandros Papadopoulos, Georgios Spanos, Antonios Lalas, K. Votis, D. Tzovaras","doi":"10.1109/MED59994.2023.10185802","DOIUrl":null,"url":null,"abstract":"The topic of in-vehicle and V2X communication in autonomous vehicles consists of a variety of different communication protocols, mechanisms, and devices. The implementation and cooperation between these entities and protocols in such a complex system is a rigorous and complicated process that should not only be efficient, robust, flexible, and scalable, but also secure. The security of critical systems such as autonomous vehicles requires a deep understanding of all the individual and distinct components that compose the system. This paper presents a cybersecurity architecture having as purpose to shield the communication security in the autonomous vehicles. For this reason, several well-established cybersecurity tools (e.g. Keycloak, Cloudflare) and communication mechanisms (e.g. MQTT, Kafka) have been combined in this architecture along with a novel statistical-based Intrusion Detection System. All the aforementioned cybersecurity defense mechanisms were selected to protect the entire system pipeline and meet the requirements for Confidentiality, Integrity, and Availability regarding vehicle communication. To test the performance of the proposed architecture abnormal data have been injected to the system and the results from the experiments conducted highlighted that the proposed solution can achieve its purpose of increased cybersecurity.","PeriodicalId":270226,"journal":{"name":"2023 31st Mediterranean Conference on Control and Automation (MED)","volume":"12 2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Cybersecurity Oriented Architecture to Ensure the Autonomous Vehicles Communication\",\"authors\":\"Athanasios Sersemis, Alexandros Papadopoulos, Georgios Spanos, Antonios Lalas, K. Votis, D. Tzovaras\",\"doi\":\"10.1109/MED59994.2023.10185802\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The topic of in-vehicle and V2X communication in autonomous vehicles consists of a variety of different communication protocols, mechanisms, and devices. The implementation and cooperation between these entities and protocols in such a complex system is a rigorous and complicated process that should not only be efficient, robust, flexible, and scalable, but also secure. The security of critical systems such as autonomous vehicles requires a deep understanding of all the individual and distinct components that compose the system. This paper presents a cybersecurity architecture having as purpose to shield the communication security in the autonomous vehicles. For this reason, several well-established cybersecurity tools (e.g. Keycloak, Cloudflare) and communication mechanisms (e.g. MQTT, Kafka) have been combined in this architecture along with a novel statistical-based Intrusion Detection System. All the aforementioned cybersecurity defense mechanisms were selected to protect the entire system pipeline and meet the requirements for Confidentiality, Integrity, and Availability regarding vehicle communication. To test the performance of the proposed architecture abnormal data have been injected to the system and the results from the experiments conducted highlighted that the proposed solution can achieve its purpose of increased cybersecurity.\",\"PeriodicalId\":270226,\"journal\":{\"name\":\"2023 31st Mediterranean Conference on Control and Automation (MED)\",\"volume\":\"12 2 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-06-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 31st Mediterranean Conference on Control and Automation (MED)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/MED59994.2023.10185802\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 31st Mediterranean Conference on Control and Automation (MED)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MED59994.2023.10185802","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Cybersecurity Oriented Architecture to Ensure the Autonomous Vehicles Communication
The topic of in-vehicle and V2X communication in autonomous vehicles consists of a variety of different communication protocols, mechanisms, and devices. The implementation and cooperation between these entities and protocols in such a complex system is a rigorous and complicated process that should not only be efficient, robust, flexible, and scalable, but also secure. The security of critical systems such as autonomous vehicles requires a deep understanding of all the individual and distinct components that compose the system. This paper presents a cybersecurity architecture having as purpose to shield the communication security in the autonomous vehicles. For this reason, several well-established cybersecurity tools (e.g. Keycloak, Cloudflare) and communication mechanisms (e.g. MQTT, Kafka) have been combined in this architecture along with a novel statistical-based Intrusion Detection System. All the aforementioned cybersecurity defense mechanisms were selected to protect the entire system pipeline and meet the requirements for Confidentiality, Integrity, and Availability regarding vehicle communication. To test the performance of the proposed architecture abnormal data have been injected to the system and the results from the experiments conducted highlighted that the proposed solution can achieve its purpose of increased cybersecurity.