CARAMEL: results on a secure architecture for connected and autonomous vehicles detecting GPS spoofing attacks

نویسندگان

چکیده

Abstract The main goal of the H2020-CARAMEL project is to address cybersecurity gaps introduced by new technological domains adopted modern vehicles applying, among others, advanced Artificial Intelligence and Machine Learning techniques. As a result, CARAMEL enhances protection against threats related automated driving, smart charging Electric Vehicles, communication or between roadside infrastructure. This work focuses on latter presents architecture aiming at assessing integrity information transmitted vehicles, as well improving security privacy for connected autonomous driving. proposed includes: (1) multi-radio access technology capabilities, with simultaneous 802.11p LTE-Uu support, enabled connectivity infrastructure; (2) MEC platform, where, algorithms detecting attacks are implemented; (3) an intelligent On-Board Unit anti-hacking features inside vehicle; (4) Public Key Infrastructure that validates in real-time vehicle’s data transmissions. indicative application, interaction entities showcased case GPS spoofing attack scenario. Adopted detection techniques exploit robust in-vehicle cooperative approaches do not rely encrypted signals, but only measurements available architecture.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Using Deep Learning for Detecting Spoofing Attacks on Speech Signals

It is well known that speaker verification systems are subject to spoofing attacks. The Automatic Speaker Verification Spoofing and Countermeasures Challenge – ASVSpoof2015 – provides a standard spoofing database, containing attacks based on synthetic speech, along with a protocol for experiments. This paper describes CPqD’s systems submitted to the ASVSpoof2015 Challenge, based on deep neural ...

متن کامل

Software Architecture for Autonomous Vehicles

This work details a complete software architecture for autonomous vehicles, from the development of a high-level multiple-vehicle graphical console, the implementation of the vehicles’ low-level critical software, the integration of the necessary software to create the vehicles’ operating system, the configuration and building of the vehicles’ operating system kernel, to the implementation of d...

متن کامل

Secure verification technique for defending IP spoofing attacks

The Internet Protocol (IP) is the source of Internet transmission but an inadequate authentication technique paves a way for IP spoofing. Since, IP spoofing initiates more attacks in the network, a secure authentication technique is required to defend against spoofing attacks. In order to achieve this, in this paper, we p ropose a (SVT) for defending IP spoofing attacks. Our technique authentic...

متن کامل

A Generic Architecture for Autonomous Uninhabited Vehicles

Research on autonomy is performed for various types of uninhabited vehicles: ground, aerial, surface, underwater and space vehicles. A quick state-of-the-art highlights that industry and research develop their own architectures and that no standard is emerging; few solutions propose architecture adaptive to several types of platform. Autonomous vehicles that move in partially known and dynamic ...

متن کامل

Multi-Radio 5G Architecture for Connected and Autonomous Vehicles: Application and Design Insights

Connected and Autonomous Vehicles (CAVs) will play a crucial role in next-generation Cooperative Intelligent Transportation Systems (C-ITSs). Not only is the information exchange fundamental to improve road safety and efficiency, but it also paves the way to a wide spectrum of advanced ITS applications enhancing efficiency, mobility and accessibility. Highly dynamic network topologies and unpre...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Eurasip Journal on Wireless Communications and Networking

سال: 2021

ISSN: ['1687-1499', '1687-1472']

DOI: https://doi.org/10.1186/s13638-021-01971-x