{"title":"自动驾驶汽车面临的网络安全挑战","authors":"A. Mahlous","doi":"10.12968/s1361-3723(22)70580-5","DOIUrl":null,"url":null,"abstract":"Self-driving cars, which guide themselves and perform operations by sensing their environment without human intervention, rely on sensors, actuators, complex algorithms, machine-learning systems and powerful processors to execute software. Their benefits include reducing accidents – including those caused by human errors such as drink-driving or using mobile phones, both of which are major causes of road carnage. A major drawback is that these vehicles are vulnerable to hacking because they are connected to the Internet. Manufacturers have developed an array of security mechanisms to shield these automobiles from unauthorised access, yet hackers continue to develop methods of bypassing their security layers.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"25 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Cyber security challenges in self-driving cars\",\"authors\":\"A. Mahlous\",\"doi\":\"10.12968/s1361-3723(22)70580-5\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Self-driving cars, which guide themselves and perform operations by sensing their environment without human intervention, rely on sensors, actuators, complex algorithms, machine-learning systems and powerful processors to execute software. Their benefits include reducing accidents – including those caused by human errors such as drink-driving or using mobile phones, both of which are major causes of road carnage. A major drawback is that these vehicles are vulnerable to hacking because they are connected to the Internet. Manufacturers have developed an array of security mechanisms to shield these automobiles from unauthorised access, yet hackers continue to develop methods of bypassing their security layers.\",\"PeriodicalId\":35636,\"journal\":{\"name\":\"Computer Fraud and Security\",\"volume\":\"25 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computer Fraud and Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.12968/s1361-3723(22)70580-5\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"Social Sciences\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Fraud and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.12968/s1361-3723(22)70580-5","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"Social Sciences","Score":null,"Total":0}
Self-driving cars, which guide themselves and perform operations by sensing their environment without human intervention, rely on sensors, actuators, complex algorithms, machine-learning systems and powerful processors to execute software. Their benefits include reducing accidents – including those caused by human errors such as drink-driving or using mobile phones, both of which are major causes of road carnage. A major drawback is that these vehicles are vulnerable to hacking because they are connected to the Internet. Manufacturers have developed an array of security mechanisms to shield these automobiles from unauthorised access, yet hackers continue to develop methods of bypassing their security layers.
期刊介绍:
Computer Fraud & Security has grown with the fast-moving information technology industry and has earned a reputation for editorial excellence with IT security practitioners around the world. Every month Computer Fraud & Security enables you to see the threats to your IT systems before they become a problem. It focuses on providing practical, usable information to effectively manage and control computer and information security within commercial organizations.