Browse > Article
http://dx.doi.org/10.5392/JKCA.2020.20.06.090

A Study on The Dangers and Their Countermeasures of Autonomous Vehicle  

Jung, Im Y. (경북대학교 전자공학부)
Publication Information
Abstract
Modern vehicles are evolving from manual to automatic driving. As the ratio of electrical equipment and software increases inside the vehicle, vehicles that support autonomous driving are becoming another open computer system that can communicate with the outside. The safety of the vehicle means the safety of both the passenger and the non-passenger. It is not clear whether the safety problem of ultimate autonomous vehicles can be solved by the current solution of computer systems related to fault tolerance and security. Autonomous vehicles should not be dangerous to people after they are released to the market, so it is necessary to proactively diagnose all the risks that can be predicted with current technology. This paper examines the current developments of autonomous vehicles and analyzes their dangers that threaten driving safety, as well as their countermeasures.
Keywords
Autonomous Vehicle; Danger Model; Open System; Vehicle Security; Vehicle Safety; Security Threats;
Citations & Related Records
연도 인용수 순위
  • Reference
1 e-나라지표, 지표조회상세, http://www.index.go.kr/potal/main/EachDtlPageDetail.do?idx_cd=1257
2 교통사고분석시스템, 2018년 교통사고정보 교통사고 추세, http://taas.koroad.or.kr/sta/acs/gus/selectStaInfoGraph.do?menuId=WEB_KMP_IDA_TAI
3 한국도로교통공단, 공단보도자료 "급속한 고령사회의 먹구름이 도로 위를 덮치고 있다!," 2018.10.2., http://www.koroad.or.kr/kp_web/krPrView.do?board_code=GABBS_050&board_num=134227&file_num
4 Car Magazine, https://www.carmagazine.co.uk/car-news/tech/volvo-xc90-uber-driverless-car/
5 SAE J3016 Levels of Driving Automation, https://www.sae.org/news/2019/01/sae-updates-j3016-automated-driving-graphic
6 2019 AVT ACES Award Winner: Autonomy, https://www.autonomousvehicletech.com/articles/1311-audis-new-a8-reaches-conditional-level-3
7 H. Lengyel and Z. Szalay, "The Significance and Effect of the Traffic System Signaling to the Environment, Present and Future Traffic," International Congress of Automotive and Transport Engineering (AMMA 2018)
8 Waldemar Nawrocki, "Measurement systems and sensors," 2nd ed, Artech House, pp.377-409, 2016.
9 ETRI Webzine, "거스를 수 없는 대세, 자율주행자동차의 도래와 안전성," 2018(11).
10 J. Brunet and L. Rizzatti, "System-of-systems validation for automotive design," Tech Design Forum, 12/17/2019.
11 S. Ahmed, "ICT Integration for Electric Vehicles as Data Collector and Distributor of Data Services," International Journal on Recent and Innovation Trends in Computing and Communication, Vol.4, Issue 3, 2017.
12 Regulus, "Tesla model 3 spoofed off the highway-regulus navigation system hack causes car to turn on its own," https://www.regulus.com/blog/tesla-model-3-spoofed-off-the-highway-regulus-researcheshacknavigation-system-causing-car-to-steer-off-road/
13 S. Chen, C. Cornelius, J. Martin, and D. H. P. Chau, "Shapeshifter: Robust physical adversarial attack on faster r-cnn object detector," Joint European Conference on Machine Learning and Knowledge Discovery in Databases, pp.52-68, 2018.
14 Y. Zhao, H. Zhu, R. Liang, Q. Shen, S. Zhang, and K. Chen, "Seeing isn't believing: Towards more robust adversarial attack against real world object detectors," ACM SIGSAC Conference on Computer and communications Security, pp.1989-2004, 2019.
15 N. Morgulis, A. Kreines, S. Mendelowitz, and Y. Weisglass, "Fooling a real car with adversarial traffic signs," arXiv:1907.00374, 2019.
16 J. Petit, B. Stottelaar, M. Feiri, and F. Kargl, "Remote attacks on automated vehicles sensors: Experiments on camera and lidar," Black Hat Europe, Vol.11, 2015.
17 keen labs, "Tencent keen security lab: Experimental security research of tesla autopilot," https://keenlab:tencent:com/en/2019/03/29/T encent-Keen-Security-Lab-Experimental-Secu rity-Research-of-Tesla-Autopilot/, 2019.
18 B. Nassi, D. Nassi, R. Ben-Netanel, Y. Mirsky, O. Drokin, and Y. Elovici, "Phantom of the ADAS: Phantom Attacks on Driver-Assistance Systems," https://eprint.iacr.org/2020/085.pdf, 2020.
19 S. Jeong and J. Lee, "Synthesis Algorithm for Effective Detection of GNSS Spoofing Attacks," International Journal of Aeronautical and Space Sciences, Vol.21, pp.251-264, 2020.   DOI
20 Netherlands Aerospace Centre, "GNSS Spoofing," NLR-CR-2019-001-PT-1-RecEd-1, Jun. 2019.
21 CAMP VSC3, https://www.campllc.org/vehicle-safety-communications-3-vsc3-consortium/
22 Z. Lu, G. Qu, and Z. Liu, "A Survey on Recent Advances in Vehicular Network Security, Trust, and Privacy," IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, Vol.20, No.2, pp.760-776, 2019.   DOI
23 J. Petit, F. Schaub, M. Feiri, and F. Kargl, "Pseudonym schemes in vehicular networks: A survey," IEEE Communications Surveys & Tutorials, Vol.17, No.1, pp.228-255, 2015.   DOI
24 IEEE 1609.2, https://standards.ieee.org/standard/1609_2-2016.html
25 자율주행산업발전 협의회, "V2X 보안인증체계 실증 사업을 위한 기술 규격," https://www.c-its.kr/board/getBoardDetail.do?seq=887
26 ITU 보안 국제표준 권고안, "V2X 통신 환경 보안 가이드라인(X.1372)," SG17 국제회의 선채택, Aug. 2019.
27 L. Yu, D. Zhang, X. Chen, and A. Hauptmann, "Traffic Danger Recognition With Surveillance Cameras Without Training Data," arXiv:1811.11969v1 [cs.CV] 29 Nov. 2018.
28 S. Grigorescu, B. Trasnea, T. Cocias, and G. Macesanu, "A Survey of Deep Learning Techniques for Autonomous Driving," arXiv:1910.07738v2 [cs.LG] 24 Mar. 2020
29 K. Eykholt, I. Evtimov, E. Fernandes, B. Li, A. Rahmati, C. Xiao, A. Prakash, T. Kohno, and D. Song, "Robust physical-world attacks on deep learning models," arXiv:1707.08945, 2017.
30 C. Sitawarin, A. N. Bhagoji, A. Mosenia, M. Chiang, and P. Mittal, "Darts: Deceiving autonomous cars with toxic signs," arXiv:1802.06430, 2018.
31 D. Song, K. Eykholt, I. Evtimov, E. Fernandes, B. Li, A. Rahmati, F. Tramer, A. Prakash, and T. Kohno, "Physical adversarial examples for object detectors," USENIX Workshop on Offensive Technologies (WOOT 18), 2018.
32 C. Yan, W. Xu, and J. Liu, "Can you trust autonomous vehicles: Contactless attacks against sensors of self driving vehicle," DEF CON, Vol.24, 2016.
33 M. S. Sheikh and J. Liang, "A Comprehensive Survey on VANET Security Services in Traffic Management System," Wireless Communications and Mobile Computing, Vol.2019, Article ID 2423915, 2019.
34 R. Kaur and P. Singh, "Review of Black Hole and Grey Hole Attack," International Journal of Multimedia & Its Applications (IJMA), Vol.6, No.6, pp.35-45, 2014.   DOI
35 C. A. KERRACHE, C. T. CALAFATE, J. CANO, N. LAGRAA, and P. MANZONI, "Trust Management for Vehicular Networks: An Adversary-Oriented Overview," IEEE Access, Vol.4, pp.9293-9307, 2016.   DOI
36 N. Haddadou, A. Rachedi, and Y. Ghamri-Doudane, "Trust and exclusion in vehicular ad hoc networks: An economic incentive model based approach," Computing, Communications and IT Applications Conference (ComComAp), 2013.
37 J. Zhang, C. Chen, and R. Cohen, "Trust modeling for message relay control and local action decision making in VANETs," Security and Communication Networks, Vol.6, No.1, pp.1-14, 2013.   DOI
38 N. Yang, "A similarity based trust and reputation management framework for VANETs," International Journal of Future Generation Communication and Networking, Vol.6, No.2, pp.25-34, 2013.   DOI
39 S. A. Soleymani, A. H. Abdullah, W. Haslina, M. H. Anisi, S. Goudarzi, M. A. R. Baee1, and S. Mandala, "Trust management in vehicular ad hoc network: A systematic review," EURASIP Journal on Wireless Communications and Networking, Vol.2015, No.1, p.146, 2015.   DOI
40 S. Gurung, D. Lin, A. C. Squicciarini, and E. Bertino, "Information oriented trustworthiness evaluation in vehicular ad-hoc networks," International Conference on Network and System Security, pp.94-108, 2013.