Identyfikatory
Warianty tytułu
Cyberbezpieczeństwo pojazdów autonomicznych – zagrożenia i przeciwdziałanie im
Języki publikacji
Abstrakty
The aim of this article is to draw attention to the growing problem of cybersecurity in the field of autonomous vehicles. A notable aspect is the use of autonomous vehicles to enhance the quality of decision-making processes as well as flexibility and efficiency. The implementation of new solutions will lead to improvements not just in transportation and delivery, but also in warehouse management. The growing demand for autonomous solutions, both in the industry and in the daily life of an average consumer, necessitates efforts to ensure their safe operation and use. The present literature review synthetically describes the history of the development of autonomous vehicles and machines. The standards and norms that should be met by products allowed for use as well as threats to cybersecurity, along with examples, are presented herein. The analysis of the collected materials leads to the conclusion that with the development of new technologies and the growth in the importance of autonomous solutions, the number of threats and the importance of systems securing the functioning of devices in cyberspace are increasing. Research on the problem also leads to the conclusion that legal systems do not fully keep up with technological developments, resulting in a lack of normative acts regulating this matter.
Celem artykułu jest zwrócenie uwagi na rosnący problem cyberbezpieczeństwa w dziedzinie pojazdów autonomicznych. Istotnym aspektem jest wykorzystanie pojazdów autonomicznych do poprawy jakości procesów decyzyjnych oraz zwiększenia ich elastyczności i efektywności. Wdrożenie nowych technologii poprawi nie tylko procesy transportowe i dostawy, ale także zarządzanie magazynami. Rosnące zapotrzebowanie na rozwiązania autonomiczne, zarówno w przemyśle, jak i w codziennym życiu przeciętnego konsumenta, prowadzi do konieczności zwiększenia wysiłków na rzecz zapewnienia ich bezpiecznej pracy i użytkowania. W przeglądzie literatury przedstawiono syntetycznie historię rozwoju pojazdów i maszyn autonomicznych, a także normy i standardy, jakie powinny spełniać produkty dopuszczone do użytku, a ponadto zagrożenia dla cyberbezpieczeństwa wraz z przykładami. Analiza zebranego materiału prowadzi do wniosku, że wraz z rozwojem nowych technologii i wzrostem znaczenia rozwiązań autonomicznych liczba zagrożeń oraz znaczenie systemów zabezpieczających funkcjonowanie urządzeń w cyberprzestrzeni wzrasta. Badania nad problemem prowadzą również do konkluzji, że systemy prawne nie nadążają za postępem technologicznym, co skutkuje brakiem aktów normatywnych regulujących przedmiotową kwestię.
Rocznik
Strony
77--96
Opis fizyczny
Bibliogr. 27 poz., rys.
Twórcy
autor
- General Tadeusz Kościuszko Military University of Land Forces, Wrocław, Poland
Bibliografia
- 1. Autonomous Vehicle Trends 2023 and Milestones From 2022. (2022). https://www.geospatialworld.net/prime/autonomous-vehicle-trends-2023-milestones-2022/
- 2. AV Development Continues, Level 5 Autonomy Coming Soon to Consumer Cars. (2021). https://www.arrow.com/en/research-and-events/articles/av-development-continues-level-5-autonomy-coming-soon-to-consumer-cars
- 3. Chen, S., Kahla, M., Jia, R., Qi, G.J. (October 10-17, 2021). Knowledge-Enriched distributional model inversion attacks [article]. 2021 IEEE/CVF International Conference on Computer Vision (ICCV). Montreal, Canada.
- 4. European Commission. (n.d.). Internal Market, Industry, Entrepreneurship and SMEs. Retrieved October 10, 2023 from: https://single-market-economy.ec.europa.eu/sectors/automotive-industry/vehicle-safety-and-automatedconnected-vehicles_en
- 5. European Commission. (2022). New rules to improve road safety and enable fully driverless vehicles in the EU. https://ec.europa.eu/commission/presscorner/detail/en/ip_22_4312
- 6. Eykholt, K., Evtimov, I., Fernandes, E., Li, B., Rahmati, A., Xiao, C., Prakash, A., Kohno, T., Song, D. (June 18-23, 2018). Robust physical-world attacks on deep learning visual classification [article]. IEEE/CVF Conference on Computer Vision and Pattern Recognition. Salt Lake City, USA.
- 7. Gupta, R., Tanwar, S., Kumar, N., Tyagi, S. (2020). Blockchain-based security attack resilience schemes for autonomous vehicles in industry 4.0: A systematic review. Computers & Electrical Engineering, 86. https://doi.org/10.1016/j.compeleceng.2020.106717
- 8. Harris, J.R. (2022). Can Driverless Vehicles Be Hacked?. https://www.hlmlawfirm.com/blog/can-driverless-vehicles-be-hacked/
- 9. International Organization for Standardization. (2018). Road vehicles – Functional safety – Part 1: Vocabulary. (ISO Standard No. 26262-1:2018) https://www.iso.org/obp/ui/en/#iso:std:68383:en
- 10. International Organization for Standardization. (2021). Road vehicles – Cybersecurity engineering. (ISO/SAE 21434:2021) https://www.iso.org/obp/ui/en/#iso:std: 70918:en
- 11. Kukkala, V.K., Thiruloga, S.V., Pasricha, S. (2022). Roadmap for Cybersecurity in Autonomous Vehicles. https://www.researchgate.net/publication/358143292_Roadmap_for_Cybersecurity_in_Autonomous_Vehicles
- 12. Leminen, S., Rajahonka, M., Wendelin, R., Westerlund, M., Nyström, A. (2022). Autonomous vehicle solutions and their digital servitization business models. Technological Forecasting and Social Change, 185. https://doi.org/10.1016/j.techfore.2022.122070
- 13. Muhammad, G., Alhussein, M. (2022). Security, Trust, and Privacy for the Internet of Vehicles: A Deep Learning Approach. IEEE Consumer Electronics Magazine, 11(6), 49-55. https://doi.org/10.1109/mce.2021.3089880
- 14. Muhammad, M., Safdar, G.A. (2018). Survey on existing authentication issues for cellular-assisted V2X communication. Vehicular Communications, 12, 50-65. https://doi.org/10.1016/j.vehcom.2018.01.008
- 15. Nino, R., Nishio, T., Murase, T. (October 28-31, 2020). IEEE 802.11ad Communication Quality Measurement in In-vehicle Wireless Communication with Real Machines [article]. 2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON). New York, USA.
- 16. Perussi, J.B., Gressler, F., Seleme, R. (2019). Supply Chain 4.0: Autonomous Vehicles and Equipment to Meet Demand. International Journal of Supply Chain Management, 8(4). https://ojs.excelingtech.co.uk/index.php/IJSCM/article/view/2275
- 17. Poulsen, K. (2010). Hacker Disables More Than 100 Cars Remotely. https://www.wired.com/2010/03/hacker-bricks-cars/
- 18. Qayyum, A., Usama, M., Qadir, J., Al-Fuqaha, A. (2020). Securing Connected & Autonomous Vehicles: Challenges Posed by Adversarial Machine Learning and the Way Forward. IEEE Communications Surveys & Tutorials, 22(2), 998-1026. https://doi.org/10.1109/comst.2020.2975048
- 19. Rangappla, V. (2023). Harmonizing ISO 26262 and Cybersecurity: Driving Safety & Security in Automotive Systems. https://www.linkedin.com/pulse/harmonizing-iso-26262-cybersecurity-driving-safety-vikram-rangappla/
- 20. Rauniyar, A., Hagos, D.H., Shrestha, M. (2018). A Crowd-Based Intelligence Approach for Measurable Security, Privacy, and Dependability in Internet of Automated Vehicles with Vehicular Fog. Mobile Information Systems, 2018. https://doi.org/10.1155/2018/7905960
- 21. SAE Levels of Driving Automation™ Refined for Clarity and International Audience. (2021). https://www.sae.org/blog/sae-j3016-update
- 22. Shamsi, K., Li, M., Plaks, K., Fazzari, S., Pan, D.Z., Jin, Y. (2019). IP protection and supply chain security through logic obfuscation: A systematic overview. ACM Transactions on Design Automation of Electronic Systems, 24(6), 1-36. https://doi.org/10.1145/3342099
- 23. Upstream Security. (n.d.). Upstream Security’s 2021 Global Automotive Cybersecurity Report. Retrieved October 10, 2023 from: https://upstream.auto/2021report
- 24. Veoneer partners with Arbe to Expand the Boundaries of High-Performance Perception-Level Automotive Radars. (2022). https://www.prnewswire.com/news-releases/veoneer-partners-with-arbe-to-expand-the-boundaries-of-high-performance-perception-level-automotive-radars-301643475.html
- 25. Walz, E. (2023). California approves Mercedes-Benz Level 3 autonomous driving system for public roads. https://www.automotivedive.com/news/mercedes-benz-level-3-autonomous-driving-in-california/652727/
- 26. WIRED. (2015, July 21). Hackers remotely kill a jeep on a highway [video]. YouTube. https://www.youtube.com/watch?v=MK0SrxBC1xs
- 27. Zetter, K. (2015). Researchers Hacked a Model S but Tesla’s Already Released a Patch. https://www.wired.com/2015/08/researchers-hacked-model-s-teslas-already/
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-98cb2b91-915b-4f2b-9752-7ad9744a11ae