2023
DOI: 10.1080/23335777.2023.2214584
|View full text |Cite
|
Sign up to set email alerts
|

Cooperative vehicular platooning: a multi-dimensional survey towards enhanced safety, security and validation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
8
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(8 citation statements)
references
References 138 publications
0
8
0
Order By: Relevance
“…This concept involves autonomous vehicles working together in flexible platoons to enhance driving efficiency and safety. Recent research, as described in [ 84 ], has delved into advancements in Co-VP and focused on controlling strategies for vehicles, infrastructure communication, and cybersecurity. In [ 85 ], the study focused on investigating platoon cooperation in a multilane platoon scenario within a C-V2X network.…”
Section: Applicationsmentioning
confidence: 99%
“…This concept involves autonomous vehicles working together in flexible platoons to enhance driving efficiency and safety. Recent research, as described in [ 84 ], has delved into advancements in Co-VP and focused on controlling strategies for vehicles, infrastructure communication, and cybersecurity. In [ 85 ], the study focused on investigating platoon cooperation in a multilane platoon scenario within a C-V2X network.…”
Section: Applicationsmentioning
confidence: 99%
“…Once the key fob reacts, the vehicle doors and even the engine can be unlocked. Remote access Practical attack Scalability is high Passive keyless entry systems compromised Vehicle unlocking Ignition system Immediate countermeasures: shielding the key, removing the battery from the key Midterm countermeasures: software-only modification, access control restriction, and hardware modification 5 3 3 4 5 4 V-TD10 : Data Analysis R, I Nonrepudiation, Confidentiality, and Privacy Cooperative Awareness Message (CAM) [ 37 ] Malicious advertisers(V2V/V2I) generate congestion response messages based on the content of the congestion requests [ 54 , 60 , 75 , 76 ] Proximity—remote access [ 37 ] Simulated attack [ 37 ] Scalability is high [ 37 ] The overall speed of CAVs could be affected. Increase in traffic in the targeted or neighboring roads.…”
Section: Table A1mentioning
confidence: 99%
“…Parked bots or compromised vehicles could be infected Correlation of messages from neighboring vehicles and cross-verification 5 4 4 5 3 4.2 T, R, I, E Integrity, Nonrepudiation, Confidentiality, Privacy, and Authorization Cooperative cruise control module Localization Vehicle control warning, e.g., lane departure warning Vehicle intersection warning Object identification Vehicle control automation Sensor fusion Fake env. conditions for camera lens [ 94 ] Inject fabricated frames directly into the camera processing and memory Infect camera firmware in order to generate fabricated frames indicating unintentional activities such as lane departure Frames are modified with property changes such as blurry images to confuse modeling software Insert fabricated frameworks and graphic models to indicate warnings Remove frames that indicate normal or abnormal conditions Deter/rush/delay delivery of speed, steering wheel info., status Inject code that processes frames and generates models or alters internal memory with fabricated frames [ 54 , 60 , 75 , 76 ] Inject code to fuse sensed data to indicate warnings and malicious outputs [ 71 , 94 , 105 , 131 ] Compromised cooperative cruise control functionalities leading to the following: An accident; The inability to activate functions; Driving into traffic; Discomfort. The following are the subimpacts: Sensor information altered; Sensor preprocessor manipulated; Main processor manipulated; Audio system exposed;...…”
Section: Table A1mentioning
confidence: 99%
See 2 more Smart Citations