Figure - uploaded by Simon Parkinson
Content may be subject to copyright.
Contexts in source publication
Context 1
... is lacking from the literature is an evidence-based taxonomy recognising the dimensions and expressions of deceitful behaviour characteristics and their potential severity to a transport system. Table 1 presents eight deceitful behaviours that could exist. These types are inspired by the study and classification of deceitful behaviours in military operations and provides a useful framework to classify deceitful behaviours (US Army, 2019); this is ultimately a technological Spoofing (Sanders and Wang, 2020) forecasting exercise using knowledge transfer from a more mature industry. ...Context 2
... classification is useful in the context of CAVs as it helps to understand the different deceitful behaviours and how the technology could be manipulated to have the desired impact. Table 1 provides an example of a specific security attack that could take place to achieve each type of deceitful behaviour. An example of suppression behaviour could be a starvation attack, whereby the aim is to prevent legitimate communication from being processed. ...Context 3
... evident, based on the examples provided in Table 1 and discussed above, there is great diversity in the different deceitful behaviours and types of cyber-attacks. This results in difficulty when considering the severity and impact of each for prioritisation and comparison purposes. ...Context 4
... proposed dimensions can provide a suitable ground to categorise and analyse deceptive behaviour, and they can also be considered to analyse different aspects of the high-level behaviours presented in Table 1. Fig. 1 presents the relationship between the example security attacks provided in Table 1 and the five dimensions. ...Context 5
... proposed dimensions can provide a suitable ground to categorise and analyse deceptive behaviour, and they can also be considered to analyse different aspects of the high-level behaviours presented in Table 1. Fig. 1 presents the relationship between the example security attacks provided in Table 1 and the five dimensions. The classification has been performed by the authors based on examples identified in literature. ...Similar publications
Autonomous vehicle technology, employing image sensors for road marking recognition, is largely dependent on the Lane Departure Warning System (LDWS) to prevent vehicular deviations from driving lanes. The effectiveness of image-based lane recognition, however, is susceptible to environmental influences like weather conditions and the surrounding r...
At present, a few scholars studied influencing factors, rules and mechanisms of decision-making in ethical dilemmas. Many factors have been identified, and a few rules and mechanisms have been proposed. However, due to the inability to evaluate the weight and role of each factor in decision-making, it is difficult to establish a computational decis...
Accurate trajectory prediction is crucial for the safe and efficient operation of autonomous vehicles. The growing popularity of deep learning has led to the development of numerous methods for trajectory prediction. While deterministic deep learning models have been widely used, deep generative models have gained popularity as they learn data dist...
Citations
... In VSNs, this can lead to misleading decisions based on false traffic or safety information. For instance, an attacker might simulate a traffic jam to redirect vehicles to alternate routes, creating real congestion or enabling other malicious activities [69], [70]. Sybil attacks are particularly dangerous in VSNs because they undermine trust in the network and can cause widespread disruption [71]. ...
Vehicular Sensor Networks (VSNs) have emerged as a cornerstone in advancing intelligent transportation systems, enabling seamless communication between vehicles and infrastructure to enhance road safety, traffic management, and driving efficiency. However, the dynamic topology, high mobility, and stringent latency requirements of VSNs introduce unique challenges in ensuring robust security and optimal performance. This review paper provides a comprehensive analysis of recent advancements in security mechanisms and performance optimization techniques tailored for VSNs. It examines threats such as unauthorized access, data tampering, denial-of-service attacks, and privacy breaches while discussing state-of-the-art cryptographic methods, authentication protocols, and intrusion detection systems to mitigate these risks. Additionally, the paper explores performance-enhancing strategies, including efficient routing protocols, congestion control algorithms, and resource management frameworks. A critical evaluation of trade-offs between security and performance is also presented, highlighting the need for integrated solutions that balance these aspects in resource-constrained VSN environments. By synthesizing recent research findings and identifying current limitations, this review aims to guide future research toward developing resilient, efficient, and scalable vehicular sensor networks.
... Through bringing detailed analysis and proper policy strategies at the forefront [22]. Otherwise, urban road infrastructure related to CAVs will follow other pathways, (probably) uncontrolled and dysfunctional that might be disastrous for social coherence and environmental protection [51]. Hence, organized actions and plans shall prevail [51]. ...
... Otherwise, urban road infrastructure related to CAVs will follow other pathways, (probably) uncontrolled and dysfunctional that might be disastrous for social coherence and environmental protection [51]. Hence, organized actions and plans shall prevail [51]. These plans will include proper measures tailored made for the scope of building cities with CAVs and not CAV cities. ...
... However, some choices extend beyond the mere mechanical application of traffic laws and consider determining the safest path (Lin, [35]). A prime example of that is how to address the emergences of deceitful CAVs, i.e., vehicles that operate in a deceitful manner toward routing and control functionality for "selfish" or malicious purposes to get advantage over other users or create traffic disruption [51]. 5. Ethical considerations remain unresolved. ...
Connected and autonomous vehicles. (CAVs) are a paradigm-changing transport technology that has the potential to revolutionize road ecosystems, build environments and cities as a whole, by reshaping their very form. This is a transformation with critical space and culture dimensions that may be complicated and could be responsible for a plethora of unprecedented opportunities and challenges. Physical and digital infrastructure enhancement packages and reclassification of road networks will be necessary and should be proactively identified, designed, regulated, and delivered for CAVs to be effectively utilized going forward. Risks from handling mixed traffic situations to technology shortcomings and from lack of legislative frameworks and CAV-specific education to combating CAV deception are all points of reference for this chapter. Through a narrative literature review study, we offer suggestions for a new road classification framework that welcomes CAVs and then policy recommendations for improving CAV pro-people character.
... CAVs are emerging transportation technology that will revolutionize the future of transport services, policy, and planning. 5 In this paper, we consider three main components of CAVs, that is, autonomous vehicles (AVs), communication infrastructure, and road infrastructure. We also would like to mention that the connectivity ecosystem of CAVs certainly has many other components, yet these three major components will play the dominant role in facilitating the deployment of CAVs. ...
Connected autonomous vehicles (CAVs) have the potential to deal with the steady increase in road traffic while solving transportation related issues such as traffic congestion, pollution, and road safety. Therefore, CAVs are becoming increasingly popular and viewed as the next generation transportation solution. Although modular advancements have been achieved in the development of CAVs, these efforts are not fully integrated to operationalize CAVs in realistic driving scenarios. This paper surveys a wide range of efforts reported in the literature about the CAV developments, summarizes the CAV impacts from a statistical perspective, explores current state of practice in the field of CAVs in terms of autonomy technologies, communication backbone, and computation needs. Furthermore, this paper provides general guidance on how transportation infrastructures need to be prepared in order to effectively operationalize CAVs. The paper also identifies challenges that need to be addressed in near future for effective and reliable adoption of CAVs.