自动驾驶汽车、智能交通控制和无处不在的交通网络时代的网络安全

C. Axelrod
{"title":"自动驾驶汽车、智能交通控制和无处不在的交通网络时代的网络安全","authors":"C. Axelrod","doi":"10.1109/LISAT.2017.8001966","DOIUrl":null,"url":null,"abstract":"Technologies for autonomous vehicles, “smart” roadways and ride-hailing services are advancing at a dizzying pace. They are also beginning to interconnect and interoperate to form complex systems-of-systems. The cyberattack surfaces of these systems-of-systems are expanding exponentially. Currently, many related systems are standalone, but when they are integrated, vulnerabilities of, and threats to, the resulting systems-of-systems could grow so much that they might well detract from the potential of these systems to improve safety and gain fuel use due to reduced travel times. Despite warnings, few are focusing on improving cybersecurity of the entire system-of-systems as the self-driving, ground-vehicle juggernaut ploughs ahead. Far too little attention is being paid to vulnerabilities throughout the systems-of-systems that will undoubtedly arise when the myriad of systems is interconnected and interoperate. In this paper, we discuss the cybersecurity consequences of the current uncoordinated evolution of these systems-of-systems and describe how such risks might be mitigated by, among other approaches, proactively introducing cybersecurity requirements early in the design, development and deployment process.","PeriodicalId":370931,"journal":{"name":"2017 IEEE Long Island Systems, Applications and Technology Conference (LISAT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":"{\"title\":\"Cybersecurity in the age of autonomous vehicles, intelligent traffic controls and pervasive transportation networks\",\"authors\":\"C. Axelrod\",\"doi\":\"10.1109/LISAT.2017.8001966\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Technologies for autonomous vehicles, “smart” roadways and ride-hailing services are advancing at a dizzying pace. They are also beginning to interconnect and interoperate to form complex systems-of-systems. The cyberattack surfaces of these systems-of-systems are expanding exponentially. Currently, many related systems are standalone, but when they are integrated, vulnerabilities of, and threats to, the resulting systems-of-systems could grow so much that they might well detract from the potential of these systems to improve safety and gain fuel use due to reduced travel times. Despite warnings, few are focusing on improving cybersecurity of the entire system-of-systems as the self-driving, ground-vehicle juggernaut ploughs ahead. Far too little attention is being paid to vulnerabilities throughout the systems-of-systems that will undoubtedly arise when the myriad of systems is interconnected and interoperate. In this paper, we discuss the cybersecurity consequences of the current uncoordinated evolution of these systems-of-systems and describe how such risks might be mitigated by, among other approaches, proactively introducing cybersecurity requirements early in the design, development and deployment process.\",\"PeriodicalId\":370931,\"journal\":{\"name\":\"2017 IEEE Long Island Systems, Applications and Technology Conference (LISAT)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-05-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"13\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 IEEE Long Island Systems, Applications and Technology Conference (LISAT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/LISAT.2017.8001966\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 IEEE Long Island Systems, Applications and Technology Conference (LISAT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/LISAT.2017.8001966","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 13

摘要

自动驾驶汽车、“智能”道路和叫车服务的技术正在以令人眼花缭乱的速度发展。它们也开始相互连接和互操作,形成复杂的系统的系统。这些“系统的系统”的网络攻击面正呈指数级增长。目前,许多相关系统都是独立的,但是当它们集成在一起时,系统的脆弱性和威胁可能会增加很多,从而可能会降低这些系统提高安全性和减少行驶时间而获得燃料使用的潜力。尽管有警告,但随着自动驾驶、地面车辆的迅猛发展,很少有人关注提高整个系统的网络安全。当无数的系统相互连接和互操作时,对整个系统的系统中的漏洞的关注太少了,这些漏洞无疑会出现。在本文中,我们讨论了当前这些系统的系统不协调演变的网络安全后果,并描述了如何通过在设计、开发和部署过程的早期主动引入网络安全需求等方法来减轻此类风险。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Cybersecurity in the age of autonomous vehicles, intelligent traffic controls and pervasive transportation networks
Technologies for autonomous vehicles, “smart” roadways and ride-hailing services are advancing at a dizzying pace. They are also beginning to interconnect and interoperate to form complex systems-of-systems. The cyberattack surfaces of these systems-of-systems are expanding exponentially. Currently, many related systems are standalone, but when they are integrated, vulnerabilities of, and threats to, the resulting systems-of-systems could grow so much that they might well detract from the potential of these systems to improve safety and gain fuel use due to reduced travel times. Despite warnings, few are focusing on improving cybersecurity of the entire system-of-systems as the self-driving, ground-vehicle juggernaut ploughs ahead. Far too little attention is being paid to vulnerabilities throughout the systems-of-systems that will undoubtedly arise when the myriad of systems is interconnected and interoperate. In this paper, we discuss the cybersecurity consequences of the current uncoordinated evolution of these systems-of-systems and describe how such risks might be mitigated by, among other approaches, proactively introducing cybersecurity requirements early in the design, development and deployment process.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信