2022
DOI: 10.3390/s22010360
|View full text |Cite
|
Sign up to set email alerts
|

Attacks to Automatous Vehicles: A Deep Learning Algorithm for Cybersecurity

Abstract: Rapid technological development has changed drastically the automotive industry. Network communication has improved, helping the vehicles transition from completely machine- to software-controlled technologies. The autonomous vehicle network is controlled by the controller area network (CAN) bus protocol. Nevertheless, the autonomous vehicle network still has issues and weaknesses concerning cybersecurity due to the complexity of data and traffic behaviors that benefit the unauthorized intrusion to a CAN bus a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
40
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 72 publications
(40 citation statements)
references
References 53 publications
0
40
0
Order By: Relevance
“…The input gate revives the memory cells in the LSTM structure, and the hidden state is always controlled by the output gate. Furthermore, LSTM uses an embedded memory block and gate mechanism that enables it to address complications related to the disappearing gradient and the explosion gradient present in the RNN learning [ 66 ]. The structure of the LSTM model is presented in Figure 7 .…”
Section: Methodsmentioning
confidence: 99%
“…The input gate revives the memory cells in the LSTM structure, and the hidden state is always controlled by the output gate. Furthermore, LSTM uses an embedded memory block and gate mechanism that enables it to address complications related to the disappearing gradient and the explosion gradient present in the RNN learning [ 66 ]. The structure of the LSTM model is presented in Figure 7 .…”
Section: Methodsmentioning
confidence: 99%
“…Many additional studies of Cabassi at al. [ 7 ], Aldhyani et al [ 3 ], and Tuli et al [ 16 ], have looked at the security dangers and issues that drones pose. Khan et al [ 17 ] presented an effective and intelligent edge-assisted IDT authentication scheme that secured the NoD.…”
Section: Literature Reviewmentioning
confidence: 99%
“…It provides enhanced capabilities by object configuration in the smart city [ 2 ]. Drone technology has recently led to the development of miniature drones such as quadcopters and micro drones [ 3 ]. These small drones have the advantage of being able to easily enter any infrastructure for tracking numerous domains including industrial surveillance and disaster response, search and rescue, military usage, accurate agriculture, shipping, and delivery.…”
Section: Introductionmentioning
confidence: 99%
“…• Fuzzy Attack: The technique of introducing random data into software and evaluating the results to uncover possibly exploitable vulnerabilities is what a fuzzy attack is [23]. • Spoofing Attack: Spoofing is the act of changing the appearance of a message or identification so that it pretends to come from a reliable, authentic source [10]. Spoofing attacks are further categorized into revolution per minute (RPM) and gear spoofing attack [24].…”
Section: B Can Attack Typesmentioning
confidence: 99%
“…The best part is that they let drivers access their phone calls, emails, and voicemails without having to take their hands off the wheel [14]. An IVN is formed by all of the communications that take place between these sections [10] [11].…”
Section: Introductionmentioning
confidence: 99%