Smart and Secure CAV Networks Empowered by AI-Enabled Blockchain: Next
Frontier for Intelligent Safe-Driving Assessment
- URL: http://arxiv.org/abs/2104.04572v1
- Date: Fri, 9 Apr 2021 19:08:34 GMT
- Title: Smart and Secure CAV Networks Empowered by AI-Enabled Blockchain: Next
Frontier for Intelligent Safe-Driving Assessment
- Authors: Le Xia, Yao Sun, Rafiq Swash, Lina Mohjazi, Lei Zhang, and Muhammad
Ali Imran
- Abstract summary: Securing a safe-driving circumstance for connected and autonomous vehicles (CAVs) continues to be a widespread concern.
We propose a novel framework of algorithm-enabled intElligent Safe-driving assessmenT (BEST) to offer a smart and reliable approach.
- Score: 17.926728975133113
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Securing a safe-driving circumstance for connected and autonomous vehicles
(CAVs) continues to be a widespread concern despite various sophisticated
functions delivered by artificial intelligence for in-vehicle devices. Besides,
diverse malicious network attacks become ubiquitous along with the worldwide
implementation of the Internet of Vehicles, which exposes a range of
reliability and privacy threats for managing data in CAV networks. Combined
with another fact that CAVs are now limited in handling intensive computation
tasks, it thus renders a pressing demand of designing an efficient assessment
system to guarantee autonomous driving safety without compromising data
security. To this end, we propose in this article a novel framework of
Blockchain-enabled intElligent Safe-driving assessmenT (BEST) to offer a smart
and reliable approach for conducting safe driving supervision while protecting
vehicular information. Specifically, a promising solution of exploiting a long
short-term memory algorithm is first introduced in detail for an intElligent
Safe-driving assessmenT (EST) scheme. To further facilitate the EST, we
demonstrate how a distributed blockchain obtains adequate efficiency,
trustworthiness and resilience with an adopted byzantine fault tolerance-based
delegated proof-of-stake consensus mechanism. Moreover, several challenges and
discussions regarding the future research of this BEST architecture are
presented.
Related papers
- Securing Legacy Communication Networks via Authenticated Cyclic Redundancy Integrity Check [98.34702864029796]
We propose Authenticated Cyclic Redundancy Integrity Check (ACRIC)
ACRIC preserves backward compatibility without requiring additional hardware and is protocol agnostic.
We show that ACRIC offers robust security with minimal transmission overhead ( 1 ms)
arXiv Detail & Related papers (2024-11-21T18:26:05Z) - Navigating Connected Car Cybersecurity: Location Anomaly Detection with RAN Data [2.147995542780459]
Cyber-attacks, including hijacking and spoofing, pose significant threats to connected cars.
This paper presents a novel approach for identifying potential attacks through Radio Access Network (RAN) event monitoring.
The major contribution of this paper is a location anomaly detection module that identifies devices that appear in multiple locations simultaneously.
arXiv Detail & Related papers (2024-07-02T22:42:45Z) - Work-in-Progress: Crash Course: Can (Under Attack) Autonomous Driving Beat Human Drivers? [60.51287814584477]
This paper evaluates the inherent risks in autonomous driving by examining the current landscape of AVs.
We develop specific claims highlighting the delicate balance between the advantages of AVs and potential security challenges in real-world scenarios.
arXiv Detail & Related papers (2024-05-14T09:42:21Z) - Towards Guaranteed Safe AI: A Framework for Ensuring Robust and Reliable AI Systems [88.80306881112313]
We will introduce and define a family of approaches to AI safety, which we will refer to as guaranteed safe (GS) AI.
The core feature of these approaches is that they aim to produce AI systems which are equipped with high-assurance quantitative safety guarantees.
We outline a number of approaches for creating each of these three core components, describe the main technical challenges, and suggest a number of potential solutions to them.
arXiv Detail & Related papers (2024-05-10T17:38:32Z) - A Survey and Comparative Analysis of Security Properties of CAN Authentication Protocols [92.81385447582882]
The Controller Area Network (CAN) bus leaves in-vehicle communications inherently non-secure.
This paper reviews and compares the 15 most prominent authentication protocols for the CAN bus.
We evaluate protocols based on essential operational criteria that contribute to ease of implementation.
arXiv Detail & Related papers (2024-01-19T14:52:04Z) - Survey on Security Attacks in Connected and Autonomous Vehicular Systems [0.0]
This study provides a brief review of the state of cyber security in the CAVs environment.
It categorizes the multiple cybersecurity threats and weaknesses in the context of CAVs into three groups: attacks on the vehicles network, attacks on the Internet at large, and other attacks.
It details the most uptodate defense tactics for securing CAVs and analyzes how effective they are.
arXiv Detail & Related papers (2023-10-14T06:37:05Z) - When Authentication Is Not Enough: On the Security of Behavioral-Based Driver Authentication Systems [53.2306792009435]
We develop two lightweight driver authentication systems based on Random Forest and Recurrent Neural Network architectures.
We are the first to propose attacks against these systems by developing two novel evasion attacks, SMARTCAN and GANCAN.
Through our contributions, we aid practitioners in safely adopting these systems, help reduce car thefts, and enhance driver security.
arXiv Detail & Related papers (2023-06-09T14:33:26Z) - Spatial-Temporal-Aware Safe Multi-Agent Reinforcement Learning of
Connected Autonomous Vehicles in Challenging Scenarios [10.37986799561165]
Communication technologies enable coordination among connected and autonomous vehicles (CAVs)
We propose a framework of constrained multi-agent reinforcement learning (MARL) with a parallel safety shield for CAVs.
Results show that our proposed methodology significantly increases system safety and efficiency in challenging scenarios.
arXiv Detail & Related papers (2022-10-05T14:39:07Z) - Anomaly Detection in Intra-Vehicle Networks [0.0]
Modern vehicles are connected to a range of networks, including intra-vehicle networks and external networks.
With the loopholes in the existing traditional protocols, cyber-attacks on the vehicle network are rising drastically.
This paper discusses the security issues of the CAN bus protocol and proposes an Intrusion Detection System (IDS) that detects known attacks.
arXiv Detail & Related papers (2022-05-07T03:38:26Z) - Differentiable Control Barrier Functions for Vision-based End-to-End
Autonomous Driving [100.57791628642624]
We introduce a safety guaranteed learning framework for vision-based end-to-end autonomous driving.
We design a learning system equipped with differentiable control barrier functions (dCBFs) that is trained end-to-end by gradient descent.
arXiv Detail & Related papers (2022-03-04T16:14:33Z) - A Multi-Agent Reinforcement Learning Approach For Safe and Efficient
Behavior Planning Of Connected Autonomous Vehicles [21.132777568170702]
We design an information-sharing-based reinforcement learning framework for connected autonomous vehicles.
We show that our approach can improve the CAV system's efficiency in terms of average velocity and comfort.
We construct an obstacle-at-corner scenario to show that the shared vision can help CAVs to observe obstacles earlier and take action to avoid traffic jams.
arXiv Detail & Related papers (2020-03-09T19:15:30Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.