Vicky's PageVicky's Page
Vivian
Recipe
Tools
English
Semester 3
Vivian
Recipe
Tools
English
Semester 3
  • Main Pages

    • Basic
    • General
    • Block Chain
  • CyberDefense Pro - 1.0 Introduction

    • 1.1 Introduction to TestOut CyberDefense Pro
  • CyberDefense Pro - 2.0 Vulnerability Response, Handling, and Management

    • 2.1 Regulations and Standards
    • 2.2 Risk Management
    • 2.3 Security Controls
    • 2.4 Attack Surfaces
    • 2.5 Patch Management
    • 2.6 Security Testing
  • CyberDefense Pro - 3.0 Threat Intelligence and Threat Hunting

    • 3.1 Threat Actors
    • 3.2 Threat Intelligence
    • 3.3 Threat Hunting
    • 3.4 Honeypots
  • CyberDefense Pro - 4.0 System and Network Architecture

    • 2.1 Regulations and Standards
    • 4.2 Network Architecture
    • Section 4.3 Identity and Access Management (IAM)
    • 4.4 Data Protection
    • 4.5 Logging
  • CyberDefense Pro - 5.0 Vulnerability Assessments

    • 5.1 Reconnaissance
    • 2.1 Regulations and Standards
    • 5.3 Enumeration
    • 5.4 Vulnerability Assessments
    • 5.5 Vulnerability Scoring Systems
    • 5.6 Classifying Vulnerability Information
  • CyberDefense Pro - 6.0 Network Security

    • 2.1 Regulations and Standards
    • 6.2 Wireless Security
    • 6.3 Web Server Security
    • 2.1 Regulations and Standards
    • 6.5 Sniffing
    • 6.6 Authentication Attacks
    • 6.7 Cloud Security
    • 6.8 Email Security
    • 2.1 Regulations and Standards
    • 6.10 Industrial Computer Systems
  • CyberDefense Pro - 7.0 Host-Based Attacks

    • 7.1 Device Security
    • 7.2 Unauthorized Changes
    • 27.3 Malware
    • 7.4 Command and Control
    • 2.1 Regulations and Standards
    • 7.6 Scripting and Programming
    • 2.1 Regulations and Standards
  • CyberDefense Pro - 8.0 Security Management

    • 8.1 Security Information and Event Management (SIEM)
    • 8.2 Security Orchestration, Automation, and Response (SOAR)
    • 8.3 Exploring Abnormal Activity
  • CyberDefense Pro - 9.0 Post-Attack

    • 9.1 Containment
    • 2.1 Regulations and Standards
    • 9.3 Post-Incident Activities
  • A.0 CompTIA CySA+ CS0-003 - Practice Exams

    • A.1 Prepare for CompTIA CySA+ Certification
    • A.2 CompTIA CySA+ CS0-003 Domain Review (20 Questions)
    • A.3 CompTIA CySA+ CS0-003 Practice Exams (All Questions)
  • B.0 TestOut CyberDefense Pro - Practice Exams

    • Section B.1 Prepare for TestOut CyberDefense Pro Certification
    • B.2 TestOut CyberDefense Pro Exam Domain Review
  • Glossary

    • Glossary
  • CYB400

    • Chapter 01
    • Chapter 02
    • Chapter 03
    • Chapter 04
    • Project 01
  • CYB402

    • lab
    • essay
  • CYB406

    • lab 01
    • lab 02
    • lab 03
    • lab 04
    • lab 05
    • lab 06
  • CYB300 Automobility Cybersecurity Engineering Standards

    • Schedule
    • Tara PPT
    • MidTerm Notes
    • Questions
  • ISO 21434

    • Introduction
    • Forward
    • Introduction
    • Content
  • CYB302 Automobility Cybersecurity

    • Week 01
    • Week 02
    • Week 03
    • Week 04
    • Chapter 5 - AUTOSAR Embedded Security in Vehicles
    • Chapter 6
    • Chapter 7
    • Chapter 8
    • How to Write
    • Review 5
  • CYB304 Project Management For Cybersecurity In Automobility

    • Unit 1 Introduction
    • Unit 1 Frameworks
    • Unit 1 Methodologies
    • Unit 1 Standards
    • Unit 1 Reqirements
    • Unit 2 Scheduling
    • Unit 2 Scheduling 2
    • Unit 2 Trends
    • Unit 2 Risk
    • Unit 2 Project Monitoring & Controlling
    • Unit 2 Budgeting
    • Unit 2 Closure
  • Project Manager

    • Resource
    • Gantt Charts
    • Intrduction
    • First Things
    • Project Plan
    • Project Schedule
    • Agile
    • Resource
  • CYB306 Cyber-Physical Vehicle System Security

    • Chapter 1
    • Chapter 2
    • Chapter 3
    • Chapter 4
    • Chapter 5
    • Chapter 6 - Infrastructure for Transportation Cyber-Physical Systems
    • Chapter 7
    • Chapter 8
    • Chapter 9
    • Chapter 10
    • Chapter 11
    • Case 3
    • Case 4
    • Discussion 4
    • Discussion 5
  • CYB308 Cybersecurity System Audits

    • Week 01
    • Week 02
    • Week 03
    • Week 04
    • Week 05
    • C 4
    • C 5
    • C 5 Business Resilience
    • C 6
    • C 6-2
    • Review
    • Questions
  • CYB308 TextBook

    • CHAPTER 1 Becoming a CISA
    • CHAPTER 2 IT Governance and Management
    • CHAPTER 3 The Audit Process
    • CHAPTER 4 IT Life Cycle Management
    • Input Controls
    • CHAPTER 5 IT Service Management and Continuity
    • Business Resilience
    • CHAPTER 6 Information Asset Protection
    • Encryption
    • Appendix A
    • Appendix B
    • Appendix C

Chapter 2: Intelligent Autonomous Vehicle

OBJECTIVES

  • Overview
  • History of Intelligent and Autonomous Vehicle
  • Classification of Autonomous Vehicle Based on Driving Levels
  • State of the Art of Intelligent and Autonomous Vehicle Technologies + Battle for Adoption
  • Market Demand of Automotive Cyber Security

OVERVIEW

  • This chapter provides an overview of the developments in intelligent and autonomous vehicle (IAV) that accompany in-vehicle and inter-vehicle connectivity.
  • This chapter gives detailed information regarding the evolution of intelligent and autonomous vehicles, its classification based on vehicle driving levels, associations between connectivity and autonomy for vehicle performance and the state-of-the-art applications.
  • The intelligent and autonomous vehicle technologies can be categorized into autonomous vehicles also known as self-driving vehicles and Cooperative Intelligent Transport Systems (C- ITS), which is also known as connected vehicle.
  • The connected vehicle technologies are based on vehicular ad hoc networks also known as VANETs for transmitting beacon messages, basic safety messages, and infotainment messages. Hence, IAV is the next-generation self-driving vehicle equipped with different types of advanced sensors, actuators, controllers incorporated with intelligence and cooperative driving capability to guarantee autonomy, safety, protection, ease, and energy-efficient.

HISTORY OF INTELLIGENT AND AUTONOMOUS VEHICLE

History of Autonomous Vehicles

Source: https://techinspection.net/development-history-and-future-of-self-driving-autonomous-cars/#google_vignette

image-20241013183925688

CLASSIFICATION OF AUTONOMOUS VEHICLE BASED ON DRIVING LEVELS

img

Source: https://www.ptolemus.com/wp-content/uploads/The-6-Levels-of-Autonomous-Vehicles_PTOLEMUS.001.jpeg

STATE OF THE ART OF INTELLIGENT AND AUTONOMOUS VEHICLE TECHNOLOGIES: IN-VEHICLE COMMUNICATION

image-20241013184301702

Fig. 2.3 Autonomous vehicle functional components with sensor fusion

STATE OF THE ART OF INTELLIGENT AND AUTONOMOUS VEHICLE TECHNOLOGIES: IN-VEHICLE NETWORKING TYPES

image-20241013200646261

Fig. 2.4 In-vehicle networking system

In-Vehicle Networking Types

  • FlexRay
  • Controller Area Network (CAN)
  • Local Interconnect Network (LIN)
  • Automotive Ethernet (AE)
  • Media Oriented Serial Transport (MOST)

CONNECTED VEHICLE TECHNOLOGY

  • In Cooperative Intelligent Transportation System (C-ITS), also known as connected vehicle technology largely, depends on VANET for transmitting basic safety message, non-safety messages like multimedia messages along with infotainment messages.
  • Recently, connected vehicles have gained a lot of attention from industry and academia that could potentially help the safe driving, and traffic situation such as congestion, accident, and road construction.
  • The advancement of connectivity in vehicles includes different types of communication technologies for autonomous vehicles.
  • The communication between the vehicles and its surroundings such as neighbor vehicles, pedestrian, RSU is based on inter-vehicle communication.

INTER-VEHICLE COMMUNICATION

  • In inter-vehicle communication, the vehicle can communicate with other vehicles as well as with infrastructure and the cloud using wireless communication.
  • The inter-vehicle communication depends on VANET technology.
  • VANET uses diverse kinds of communication protocols based on the type of communication and type of infrastructure.
  • In VANET, the Wireless Access in Vehicular Environments (WAVE) protocol provides the basic radio standard for dedicated short-range communication (DSRC) operating in the 5.9 GHz frequency band, which is based on the IEEE 802.11p standard.
  • In addition to this, emerging cellular technologies such as LTE and 5G technology can be used for V2X communication in VANET.
  • Vehicular communications can be achieved in the infrastructure domain for vehicle-to- infrastructure (V2I) communications to connect to roadside units (RSUs) or in the ad hoc domain for vehicle-to-vehicle (V2V) communications or vehicle-to everything (V2X) communications.

BATTLE FOR ADOPTION

  • The FCC has introduced the DSRC standard more than two decades in the field of intelligent transportation service to provide safety and efficacy of the vehicles on the road.
  • In the USA, the federal government proposed a mandate to implement V2V in new vehicles based on DSRC.
  • Two groups of global automakers and research institutes work toward using wireless communication in autonomous vehicles.
  • One group is attracted toward using DSRC technology in autonomous vehicles while the other groups support the use of C-V2X technology due to its potential and evolution toward 5G.
  • They switched their focus to C-V2X platform and involved in chip making, testing, and demonstration.
  • Since cellular technology is not mature in vehicular communication field compared to DSRC, it might take some time to be widely deployed, as it has not been extensively tested.
  • It is operated in licensed band without dedicated and specific MHz band.
  • The 5GAA and other research institutes like Qualcomm and Huawei back up this technology and advocate for C-V2X adoption because of its advantages in vehicular communication.

MARKET DEMAND OF AUTOMOTIVE CYBER SECURITY

image-20241013201034445

Fig. 2.10 Prospective mobility solution for performing specific purposes

  • Traditionally, the automotive industry has been conservative in adopting features offered by consumer electronics. However, the connected vehicle is finally becoming a reality, and it will likely redefine the entire automotive industry.
  • Vehicle manufacturers must find ways to deliver the advanced features their customers demand, into their “smartphones- on-wheels.”
  • They will also need to embrace security solutions that are widely used in smartphones and IT infrastructures, but that are relatively new to the automotive world.
  • Examples of such technologies are firewalls, intrusion detection and prevention systems, virtualization technologies, and secure firmware updates.
Last Updated:
Prev
Week 01
Next
Week 03