CARAMEL: results on a secure architecture for connected and autonomous vehicles detecting GPS spoofing attacks
نویسندگان
چکیده
Abstract The main goal of the H2020-CARAMEL project is to address cybersecurity gaps introduced by new technological domains adopted modern vehicles applying, among others, advanced Artificial Intelligence and Machine Learning techniques. As a result, CARAMEL enhances protection against threats related automated driving, smart charging Electric Vehicles, communication or between roadside infrastructure. This work focuses on latter presents architecture aiming at assessing integrity information transmitted vehicles, as well improving security privacy for connected autonomous driving. proposed includes: (1) multi-radio access technology capabilities, with simultaneous 802.11p LTE-Uu support, enabled connectivity infrastructure; (2) MEC platform, where, algorithms detecting attacks are implemented; (3) an intelligent On-Board Unit anti-hacking features inside vehicle; (4) Public Key Infrastructure that validates in real-time vehicle’s data transmissions. indicative application, interaction entities showcased case GPS spoofing attack scenario. Adopted detection techniques exploit robust in-vehicle cooperative approaches do not rely encrypted signals, but only measurements available architecture.
منابع مشابه
Using Deep Learning for Detecting Spoofing Attacks on Speech Signals
It is well known that speaker verification systems are subject to spoofing attacks. The Automatic Speaker Verification Spoofing and Countermeasures Challenge – ASVSpoof2015 – provides a standard spoofing database, containing attacks based on synthetic speech, along with a protocol for experiments. This paper describes CPqD’s systems submitted to the ASVSpoof2015 Challenge, based on deep neural ...
متن کاملSoftware Architecture for Autonomous Vehicles
This work details a complete software architecture for autonomous vehicles, from the development of a high-level multiple-vehicle graphical console, the implementation of the vehicles’ low-level critical software, the integration of the necessary software to create the vehicles’ operating system, the configuration and building of the vehicles’ operating system kernel, to the implementation of d...
متن کاملSecure verification technique for defending IP spoofing attacks
The Internet Protocol (IP) is the source of Internet transmission but an inadequate authentication technique paves a way for IP spoofing. Since, IP spoofing initiates more attacks in the network, a secure authentication technique is required to defend against spoofing attacks. In order to achieve this, in this paper, we p ropose a (SVT) for defending IP spoofing attacks. Our technique authentic...
متن کاملA Generic Architecture for Autonomous Uninhabited Vehicles
Research on autonomy is performed for various types of uninhabited vehicles: ground, aerial, surface, underwater and space vehicles. A quick state-of-the-art highlights that industry and research develop their own architectures and that no standard is emerging; few solutions propose architecture adaptive to several types of platform. Autonomous vehicles that move in partially known and dynamic ...
متن کاملMulti-Radio 5G Architecture for Connected and Autonomous Vehicles: Application and Design Insights
Connected and Autonomous Vehicles (CAVs) will play a crucial role in next-generation Cooperative Intelligent Transportation Systems (C-ITSs). Not only is the information exchange fundamental to improve road safety and efficiency, but it also paves the way to a wide spectrum of advanced ITS applications enhancing efficiency, mobility and accessibility. Highly dynamic network topologies and unpre...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Eurasip Journal on Wireless Communications and Networking
سال: 2021
ISSN: ['1687-1499', '1687-1472']
DOI: https://doi.org/10.1186/s13638-021-01971-x