Key Security Challenges for Cloud-assisted Connected and Autonomous Vehicles
Key Security Challenges for Cloud-assisted Connected and Autonomous Vehicles
- Author(s): A.T. Sheik and C. Maple
- DOI: 10.1049/cp.2019.0142
For access to this article, please select a purchase option:
Buy conference paper PDF
Buy Knowledge Pack
IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.
Living in the Internet of Things (IoT 2019) — Recommend this title to your library
Thank you
Your recommendation has been sent to your librarian.
- Author(s): A.T. Sheik and C. Maple Source: Living in the Internet of Things (IoT 2019), 2019 page (9 pp.)
- Conference: Living in the Internet of Things (IoT 2019)
- DOI: 10.1049/cp.2019.0142
- ISBN: 978-1-83953-089-0
- Location: London, UK
- Conference date: 1-2 May 2019
- Format: PDF
Connected and Autonomous Vehicles (CAVs) bring situational awareness to vehicles promising a safer transportation system. To support collaborative awareness, cloud-assisted CAV are being developed besides Vehicle-to-Vehicle (V2V) and Vehicleto-Infrastructure (V2I) communications. CAVs require efficient and accurate information from numerous sources, internal and external to the vehicle, for time-critical safety applications. As such, cloud-assisted CAVs would be exposed to a large amount of dynamic information (such as speed, location, vehicle ID, travel routes, passengers' personal information, bank details and so on). Moreover, CAVs have a reasonably long lifetime due to which the associated vehicular technologies in CAVs age and it is possible that vulnerabilities can be exploited to inflict harm. As a result, when technologies change, the security requirements evolve. This research aims to discuss significant research challenges, classify emerging threats, attacks and countermeasures and identify immediate research directions to protect the evolving cloud-assisted CAVs with security mechanisms to adapt to complex and dynamic environments.
Inspec keywords: mobile computing; vehicles; computer network security; groupware; traffic engineering computing; cloud computing; vehicular ad hoc networks; road safety
Subjects: Groupware; Mobile radio systems; Data security; Computer communications; Mobile, ubiquitous and pervasive computing; Internet software; Traffic engineering computing
Related content
content/conferences/10.1049/cp.2019.0142
pub_keyword,iet_inspecKeyword,pub_concept
6
6