An Emerging Security Framework for Connected Autonomous Vehicles

Fatema Rashed Almehrezi, Chan Yeob Yeun, Paul D. Yoo, Ernesto Damiani, Yousof Al Hammadi, Hyun Ku Yeun

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

Connected Autonomous Vehicles (CAVs) are drive-less vehicles that equipped with sophisticated technologies that provide safe and efficient transportation for the users. The automated and connected nature of a CA V make them vulnerable to cyber attack. There have been various solutions proposed recently for establishing security in the communication. Majority focuses on security services such as confidentiality, integrity, availability and authentication. This paper analyzes the most recent concepts that have been discussed in the literature to protect the CA V s from the attackers as well as introduce our new security framework that can address the gaps in the current security knowledge by extending our previous ideas and solutions.

Original languageBritish English
Title of host publicationProceedings of 2020 7th IEEE International Conference on Behavioural and Social Computing, BESC 2020
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781728186054
DOIs
StatePublished - 5 Nov 2020
Event7th IEEE International Conference on Behavioural and Social Computing, BESC 2020 - Bournemouth, United Kingdom
Duration: 5 Nov 20207 Nov 2020

Publication series

NameProceedings of 2020 7th IEEE International Conference on Behavioural and Social Computing, BESC 2020

Conference

Conference7th IEEE International Conference on Behavioural and Social Computing, BESC 2020
Country/TerritoryUnited Kingdom
CityBournemouth
Period5/11/207/11/20

Keywords

  • Authentication
  • Availability
  • Confidentiality
  • Connected and Autonomous Vehicles
  • eSIM
  • Integrity
  • Security Framework

Fingerprint

Dive into the research topics of 'An Emerging Security Framework for Connected Autonomous Vehicles'. Together they form a unique fingerprint.

Cite this