Paul Darby's research while affiliated with University of Louisiana at Lafayette and other places

Publications (3)

Article
Full-text available
The lack of security in today’s in-vehicle network make connected vehicles vulnerable to many types of cyber-attacks. Replay-based injection attacks are one of the easiest type of denial-of-service attacks where the attacker floods the in-vehicle network with malicious traffic with intent to alter the vehicle’s normal behavior. The attacker may exp...

Citations

... These security concerns are explored and listed based on the different cyber-attacks that target the vehicular systems, networks, and environment. We studied the existing vulnerabilities and attacks from different research papers, including [29][30][31][32][33][70][71][72][73]. We focus on the papers that discuss and analyze vehicular issues to work on solving them using AI techniques, among others. ...
... However, following commercial availability, several problems hindered the competition of EV with Conventional Vehicles (ICEV) such as infrastructure availability for large scale charging stations, more recharging time and sophisticated energy resources for recharging [28][29][30]. Moreover, charging management, uncoordinated and insecure interaction between EV and CS and load balancing on CS and some others [31][32][33]. Research on EVs is surveyed to find optimal smart charging management techniques for electric vehicle recharging and with control of EV charging distributed energy resources. ...
... Furthermore, the power supply must be regulated by dedicated hardware, not classical vehicles. Researchers discussed how the EV charging infrastructure could be exploited by attackers [9], however, neglecting the in-vehicle threats. Contribution. ...