2023
DOI: 10.1109/access.2023.3243906
|View full text |Cite
|
Sign up to set email alerts
|

An Integrated Approach of Threat Analysis for Autonomous Vehicles Perception System

Abstract: Automated vehicles are a revolutionary step in mobility, providing a safe and convenient riding experience while keeping the human-driving task minimal to none. Therefore, these intelligent vehicles are equipped with sophisticated perception sensors (e.g., cameras and radars), high-performance computers, artificial intelligence (AI)-driven algorithms, and connectivity with other internet-of-things (IoT) devices. This makes autonomous vehicles (AVs) a special kind of cyber-physical system (CPS) that is moving a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0
1

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 25 publications
(7 citation statements)
references
References 61 publications
0
6
0
1
Order By: Relevance
“…With the advancement of ML, in addition to safety, security and privacy have emerged as the two attributes of growing interest, which encompass guarding against external system breaches and noticing the privacy implications of system usage. This is exemplified by the development of STPA-sec [44], [31], [50], [54], [26] and STPA-priv [39], [53], indicating the flexibility of STPA in terms of accommodating attributes beyond safety. STPA-sec focuses on analysing the vulnerability of the system to external attacks, while STPA-priv highlights the data privacy issues in the system.…”
Section: B Survey Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…With the advancement of ML, in addition to safety, security and privacy have emerged as the two attributes of growing interest, which encompass guarding against external system breaches and noticing the privacy implications of system usage. This is exemplified by the development of STPA-sec [44], [31], [50], [54], [26] and STPA-priv [39], [53], indicating the flexibility of STPA in terms of accommodating attributes beyond safety. STPA-sec focuses on analysing the vulnerability of the system to external attacks, while STPA-priv highlights the data privacy issues in the system.…”
Section: B Survey Resultsmentioning
confidence: 99%
“…b) Object Under Study: Autonomous (ground) vehicles are the most commonly studied object by STPA due to their popularity, complexity and pressing need for safety [31], [59], [1], [54], [50], [38], [32], [4], [56], [19], [25], [26], [46]. Autonomous ships and drones are also studied in [58], [49], [27], [61], [5] and [16], respectively.…”
Section: B Survey Resultsmentioning
confidence: 99%
“…This framework excels in identifying risks such as cyberattacks against AI algorithms, unauthorized access to vehicle control commands and its sensors. STPA-Sec provides a comprehensive hazard assessment, addressing concerns related to incorrect decisions, system failures and malicious interventions [139]. Additionally, their focus on developing and implementing security controls ensures a strong defense against identified risks.…”
Section: ) Threat Analysis and Risk Assessment Models Integrationmentioning
confidence: 99%
“…It is an extension of STPA, customized to include security analysis. STPA-Sec maintains the same four basic steps as STPA, but essentially introduces threat/vulnerability identification in the last step [ 44 ]. Sahay et al [ 45 ] evaluated and compared the application of STPA-Sec, STRIDE, and CORAS in identifying threats and vulnerabilities to the cybership system.…”
Section: Related Workmentioning
confidence: 99%