Deception in Autonomous Transport Systems [electronic resource] : Threats, Impacts and Mitigation Policies / edited by Simon Parkinson, Alexandros Nikitas, Mauro Vallati.
Contributor(s): Parkinson, Simon [editor.] | Nikitas, Alexandros [editor.] | Vallati, Mauro [editor.] | SpringerLink (Online service).
Material type: BookSeries: Wireless Networks: Publisher: Cham : Springer International Publishing : Imprint: Springer, 2024Edition: 1st ed. 2024.Description: VIII, 196 p. 20 illus., 12 illus. in color. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783031550447.Subject(s): Artificial intelligence | Transportation engineering | Traffic engineering | Computer networks -- Security measures | Wireless communication systems | Mobile communication systems | Artificial Intelligence | Transportation Technology and Traffic Engineering | Mobile and Network Security | Wireless and Mobile CommunicationAdditional physical formats: Printed edition:: No title; Printed edition:: No title; Printed edition:: No titleDDC classification: 006.3 Online resources: Click here to access onlineIntroduction -- Ethical dilemmas in autonomous driving: philosophical, social and public policy implications -- Smart Cities: Concept, Pillars, and Challenges -- The Connected and Autonomous Vehicle Trade-off: Functional Benefits versus Security Risks -- Connected and Autonomous Vehicles and Infrastructure Needs Exploring Road Network Changes and Policy Interventions -- Centralised Intelligent Traffic Routing in the Light of Disobedience of Drivers -- Detecting Abnormal Vehicle Behaviour: A Clustering-Based Approach -- AI Approaches on Urban Public Transport Routing -- Cyber Threat Intelligence Analysis for Situational Understanding in Autonomous Transport Systems -- Interaction Attacks as Deceitful Connected and Automated Vehicle Behaviour -- Securing Vehicle-to-Drone (V2D) Communications: Challenges and Solutions -- The Use of GPS Spoofing Attacks in Location Deception.
This book provides a comprehensive overview of deception in autonomous transport systems. This involves investigating the threats facing autonomous transport systems and how they can contribute towards a deceptive attack, followed by their potential impact if successful, and finally, how they can be mitigated. The work in this book is grouped into three parts. This first part focuses on the area of smart cities, policies, and ethics. This includes critically appraising the trade-off between functionality and security with connected and autonomous vehicles. The second discusses a range of AI applications in the wider field of smart transport and mobility, such as detecting anomalies in vehicle behaviour to investigating detecting disobedient vehicles. Finally, the third part presents and discusses cybersecurity-related aspects to consider when dealing with Connected and Autonomous Vehicles (CAVs) and smart urban infrastructure. This includes analysing different attacks to investigating secure communication technologies. CAVs are a game-changing technology with the potential to transform the way transport is perceived, mobility is serviced, travel ecosystems 'behave', and cities and societies as a whole function. There are many foreseen safety, accessibility and sustainability benefits resulting from the adoption of CAVs because of their ability, in theory, to operate error-free and collaboratively, ranging from accident prevention, congestion reduction and decreased carbon emissions to time savings, increased social inclusion, optimised routing, and better traffic control. However, no matter what the expected benefits are, CAVs are at the same time susceptible to an unprecedented number of new digital and physical threats. The severity of these threats has resulted in an increased effort to deepen our understanding of CAVs when it comes to their safety and resilience. In this complex and multi-faceted scenario, this book aims to provide an extensive overview of the risks related to the malicious exploitation of CAVs and beyond, the potential ways in which vulnerabilities can be exploited, prevention and mitigation policies and techniques, and the impact that the non-acceptance of Connected and Autonomous Mobility can have on the Smart City agenda. This book targets researchers, practitioners, and advanced-level students in computer science and transport engineering.
There are no comments for this item.