Fatema Rashed Almehrezi, C. Yeun, Paul Yoo, E. Damiani, Y. A. Hammadi, H. Yeun
{"title":"联网自动驾驶汽车的新兴安全框架","authors":"Fatema Rashed Almehrezi, C. Yeun, Paul Yoo, E. Damiani, Y. A. Hammadi, H. Yeun","doi":"10.1109/BESC51023.2020.9348317","DOIUrl":null,"url":null,"abstract":"Connected Autonomous Vehicles (CAVs) are drive-less vehicles that equipped with sophisticated technologies that provide safe and efficient transportation for the users. The automated and connected nature of a CA V make them vulnerable to cyber attack. There have been various solutions proposed recently for establishing security in the communication. Majority focuses on security services such as confidentiality, integrity, availability and authentication. This paper analyzes the most recent concepts that have been discussed in the literature to protect the CA V s from the attackers as well as introduce our new security framework that can address the gaps in the current security knowledge by extending our previous ideas and solutions.","PeriodicalId":224502,"journal":{"name":"2020 7th International Conference on Behavioural and Social Computing (BESC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"An Emerging Security Framework for Connected Autonomous Vehicles\",\"authors\":\"Fatema Rashed Almehrezi, C. Yeun, Paul Yoo, E. Damiani, Y. A. Hammadi, H. Yeun\",\"doi\":\"10.1109/BESC51023.2020.9348317\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Connected Autonomous Vehicles (CAVs) are drive-less vehicles that equipped with sophisticated technologies that provide safe and efficient transportation for the users. The automated and connected nature of a CA V make them vulnerable to cyber attack. There have been various solutions proposed recently for establishing security in the communication. Majority focuses on security services such as confidentiality, integrity, availability and authentication. This paper analyzes the most recent concepts that have been discussed in the literature to protect the CA V s from the attackers as well as introduce our new security framework that can address the gaps in the current security knowledge by extending our previous ideas and solutions.\",\"PeriodicalId\":224502,\"journal\":{\"name\":\"2020 7th International Conference on Behavioural and Social Computing (BESC)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-11-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 7th International Conference on Behavioural and Social Computing (BESC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/BESC51023.2020.9348317\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 7th International Conference on Behavioural and Social Computing (BESC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/BESC51023.2020.9348317","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An Emerging Security Framework for Connected Autonomous Vehicles
Connected Autonomous Vehicles (CAVs) are drive-less vehicles that equipped with sophisticated technologies that provide safe and efficient transportation for the users. The automated and connected nature of a CA V make them vulnerable to cyber attack. There have been various solutions proposed recently for establishing security in the communication. Majority focuses on security services such as confidentiality, integrity, availability and authentication. This paper analyzes the most recent concepts that have been discussed in the literature to protect the CA V s from the attackers as well as introduce our new security framework that can address the gaps in the current security knowledge by extending our previous ideas and solutions.