Fig 2 - uploaded by Simon Parkinson
Content may be subject to copyright.
A solution-based thematic map for the deceitful CAV. The eight example attack types on the five different dimensions, in addition to demonstrating their relationship with different mitigation strategies that are either of a techno-centric or human factor nature.

A solution-based thematic map for the deceitful CAV. The eight example attack types on the five different dimensions, in addition to demonstrating their relationship with different mitigation strategies that are either of a techno-centric or human factor nature.

Context in source publication

Context 1
... one hand effective human-vehicle collaboration, as noted in Xing et al. (2021), is vital for the success of this technology and on the other hand, CAV eco-systems should be ultimately prioritising humans over vehicles ( Nikitas et al., 2021a;Thomopoulos and Nikitas, 2019) meaning that the human factor should be explored and managed adequately. Fig. 2 provides an illustration of the mitigation measures and their relationship to the five dimensions and example attacks provided in Fig. ...

Similar publications

Preprint
Full-text available
Autonomous vehicle technology, employing image sensors for road marking recognition, is largely dependent on the Lane Departure Warning System (LDWS) to prevent vehicular deviations from driving lanes. The effectiveness of image-based lane recognition, however, is susceptible to environmental influences like weather conditions and the surrounding r...
Article
Full-text available
At present, a few scholars studied influencing factors, rules and mechanisms of decision-making in ethical dilemmas. Many factors have been identified, and a few rules and mechanisms have been proposed. However, due to the inability to evaluate the weight and role of each factor in decision-making, it is difficult to establish a computational decis...
Preprint
Full-text available
Accurate trajectory prediction is crucial for the safe and efficient operation of autonomous vehicles. The growing popularity of deep learning has led to the development of numerous methods for trajectory prediction. While deterministic deep learning models have been widely used, deep generative models have gained popularity as they learn data dist...

Citations

... In VSNs, this can lead to misleading decisions based on false traffic or safety information. For instance, an attacker might simulate a traffic jam to redirect vehicles to alternate routes, creating real congestion or enabling other malicious activities [69], [70]. Sybil attacks are particularly dangerous in VSNs because they undermine trust in the network and can cause widespread disruption [71]. ...
Article
Vehicular Sensor Networks (VSNs) have emerged as a cornerstone in advancing intelligent transportation systems, enabling seamless communication between vehicles and infrastructure to enhance road safety, traffic management, and driving efficiency. However, the dynamic topology, high mobility, and stringent latency requirements of VSNs introduce unique challenges in ensuring robust security and optimal performance. This review paper provides a comprehensive analysis of recent advancements in security mechanisms and performance optimization techniques tailored for VSNs. It examines threats such as unauthorized access, data tampering, denial-of-service attacks, and privacy breaches while discussing state-of-the-art cryptographic methods, authentication protocols, and intrusion detection systems to mitigate these risks. Additionally, the paper explores performance-enhancing strategies, including efficient routing protocols, congestion control algorithms, and resource management frameworks. A critical evaluation of trade-offs between security and performance is also presented, highlighting the need for integrated solutions that balance these aspects in resource-constrained VSN environments. By synthesizing recent research findings and identifying current limitations, this review aims to guide future research toward developing resilient, efficient, and scalable vehicular sensor networks.
... Through bringing detailed analysis and proper policy strategies at the forefront [22]. Otherwise, urban road infrastructure related to CAVs will follow other pathways, (probably) uncontrolled and dysfunctional that might be disastrous for social coherence and environmental protection [51]. Hence, organized actions and plans shall prevail [51]. ...
... Otherwise, urban road infrastructure related to CAVs will follow other pathways, (probably) uncontrolled and dysfunctional that might be disastrous for social coherence and environmental protection [51]. Hence, organized actions and plans shall prevail [51]. These plans will include proper measures tailored made for the scope of building cities with CAVs and not CAV cities. ...
... However, some choices extend beyond the mere mechanical application of traffic laws and consider determining the safest path (Lin, [35]). A prime example of that is how to address the emergences of deceitful CAVs, i.e., vehicles that operate in a deceitful manner toward routing and control functionality for "selfish" or malicious purposes to get advantage over other users or create traffic disruption [51]. 5. Ethical considerations remain unresolved. ...
Chapter
Connected and autonomous vehicles. (CAVs) are a paradigm-changing transport technology that has the potential to revolutionize road ecosystems, build environments and cities as a whole, by reshaping their very form. This is a transformation with critical space and culture dimensions that may be complicated and could be responsible for a plethora of unprecedented opportunities and challenges. Physical and digital infrastructure enhancement packages and reclassification of road networks will be necessary and should be proactively identified, designed, regulated, and delivered for CAVs to be effectively utilized going forward. Risks from handling mixed traffic situations to technology shortcomings and from lack of legislative frameworks and CAV-specific education to combating CAV deception are all points of reference for this chapter. Through a narrative literature review study, we offer suggestions for a new road classification framework that welcomes CAVs and then policy recommendations for improving CAV pro-people character.
... CAVs are emerging transportation technology that will revolutionize the future of transport services, policy, and planning. 5 In this paper, we consider three main components of CAVs, that is, autonomous vehicles (AVs), communication infrastructure, and road infrastructure. We also would like to mention that the connectivity ecosystem of CAVs certainly has many other components, yet these three major components will play the dominant role in facilitating the deployment of CAVs. ...
Article
Full-text available
Connected autonomous vehicles (CAVs) have the potential to deal with the steady increase in road traffic while solving transportation related issues such as traffic congestion, pollution, and road safety. Therefore, CAVs are becoming increasingly popular and viewed as the next generation transportation solution. Although modular advancements have been achieved in the development of CAVs, these efforts are not fully integrated to operationalize CAVs in realistic driving scenarios. This paper surveys a wide range of efforts reported in the literature about the CAV developments, summarizes the CAV impacts from a statistical perspective, explores current state of practice in the field of CAVs in terms of autonomy technologies, communication backbone, and computation needs. Furthermore, this paper provides general guidance on how transportation infrastructures need to be prepared in order to effectively operationalize CAVs. The paper also identifies challenges that need to be addressed in near future for effective and reliable adoption of CAVs.