Anomaly Detection from Cyber Threats via Infrastructure to Automated Vehicle

04/23/2021
by   Chris van der Ploeg, et al.
0

Using Infrastructure-to-Vehicle (I2V) information can be of great benefit when driving autonomously in high-density traffic situations with limited visibility, since the sensing capabilities of the vehicle are enhanced by external sensors. In this research, a method is introduced to increase the vehicle's self-awareness in intersections for one of the largest foreseen challenges when using I2V communication: cyber security. The introduced anomaly detection algorithm, running on the automated vehicle, assesses the health of the I2V communication against multiple cyber security attacks. The analysis is done in a simulation environment, using cyber-attack scenarios from the Secredas Project (Cyber Security for Cross Domain Reliable Dependable Automated Systems) and provides insights into the limitations the vehicle has when facing I2V cyber attacks of different types and amplitudes and when sensor redundancy is lost. The results demonstrate that anomalies injected can be robustly detected and mitigated by the autonomous vehicle, allowing it to react more safely and comfortably and maintaining correct object tracking in intersections.

READ FULL TEXT
research
11/30/2018

Change Point Models for Real-time V2I Cyber Attack Detection in a Connected Vehicle Environment

Connected vehicle (CV) systems are cognizant of potential cyber attacks ...
research
03/05/2020

Change Point Models for Real-time Cyber Attack Detection in Connected Vehicle Environment

Connected vehicle (CV) systems are cognizant of potential cyber attacks ...
research
03/23/2020

Bayesian Models Applied to Cyber Security Anomaly Detection Problems

Nowadays cyber security is an important concern for all individuals, org...
research
11/04/2019

Real-Time Sensor Anomaly Detection and Recovery in Connected Automated Vehicle Sensors

In this paper we propose a novel observer-based method to improve the sa...
research
04/29/2023

POET: A Self-learning Framework for PROFINET Industrial Operations Behaviour

Since 2010, multiple cyber incidents on industrial infrastructure, such ...
research
12/18/2021

An Autonomous Self-Incremental Learning Approach for Detection of Cyber Attacks on Unmanned Aerial Vehicles (UAVs)

As the technological advancement and capabilities of automated systems h...
research
09/24/2020

Pandora: A Cyber Range Environment for the Safe Testing and Deployment of Autonomous Cyber Attack Tools

Cybersecurity tools are increasingly automated with artificial intellige...

Please sign up or login with your details

Forgot password? Click here to reset