2022
DOI: 10.1016/j.aap.2021.106515
|View full text |Cite
|
Sign up to set email alerts
|

A conceptual system dynamics model for cybersecurity assessment of connected and autonomous vehicles

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
18
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 42 publications
(18 citation statements)
references
References 76 publications
0
18
0
Order By: Relevance
“…Data sets, mathematical forms, and distinctive calculations are examples of exceptional elements that must be included in the development of privacy-preserving techniques. 94 These additions improve the technique's effectiveness and add another level of protection. Moreover, privacy-preserving techniques should be enthusiastic to achieve meaningful and successful outcomes.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Data sets, mathematical forms, and distinctive calculations are examples of exceptional elements that must be included in the development of privacy-preserving techniques. 94 These additions improve the technique's effectiveness and add another level of protection. Moreover, privacy-preserving techniques should be enthusiastic to achieve meaningful and successful outcomes.…”
Section: Discussionmentioning
confidence: 99%
“…Similarly, assessment tests to determine the number of alternatives that the technique can supply should be conducted. Data sets, mathematical forms, and distinctive calculations are examples of exceptional elements that must be included in the development of privacy‐preserving techniques 94 . These additions improve the technique's effectiveness and add another level of protection.…”
Section: Discussionmentioning
confidence: 99%
“…Although the acceleration and deceleration profiles in the Gipps model are unrealistic, the model is widely used to simulate car-following behaviour due to its simplex nature. As shown in Equation (10), in Gipps model, a vehicle needs to maintain a 'safe speed' to ensure that the gap is not smaller than the minimum gap even if its leader comes to a sudden stop. The updated speed at time t + 𝜏 will take the smallest of the 'safe speed', a desired speed, and the speed assumes that the vehicle accelerates with a constant acceleration a, which takes the form of Equation (11).…”
Section: Gipps Modelmentioning
confidence: 99%
“…In recent years, researchers have demonstrated that CAVs are prone to cyberattacks in real world [7][8][9]. Therefore, it has become an imperative task to understand the cyberattacks that can be made to CAVs and VANETs and the impacts of such attacks [10].…”
Section: Introductionmentioning
confidence: 99%
“…Ge et al [ 7 ] proposed an algorithm to address the problem of resilient and safe platooning control of CAVs that are under denial-of-service attacks disrupting the V2V communication. Khan et al [ 8 ] developed a conceptual system dynamics model to analyze the cybersecurity of CAVs. The model integrates six critical areas and their corresponding parameters that either enable or mitigate attacks on CAVs operation.…”
Section: Introductionmentioning
confidence: 99%