A Study on Cyber-Security Oo Autonomous and Unmanned Vehicles

dc.contributor.authorYagdereli, Eray
dc.contributor.authorGemci, Cemal
dc.contributor.authorAktas, A. Ziya
dc.contributor.orcID0000-0002-1829-7821en_US
dc.contributor.researcherIDHGD-9745-2022en_US
dc.date.accessioned2023-11-30T08:39:48Z
dc.date.available2023-11-30T08:39:48Z
dc.date.issued2015
dc.description.abstractTechnological developments towards vehicle automation have been taking place for years. Satellite navigation, cruise control and anti-lock braking systems (ABS) are well-known examples of automation technology used in everyday cars. The trend of automation technology being used in vehicles is expected to move closer to full autonomy through technological advancements in robotics and artificial intelligence. As a result, our daily lives will become more and more dependent on digitally-controlled devices and vehicle systems (partially or highly automated). On the other hand, computing and digital systems also have a tendency to become more fragile and susceptible to faults and failures because of cyber-attacks and software and hardware defects, as well as accidental defects introduced by developers. Therefore, autonomous vehicle systems must be developed to bear such dangers in mind and must be equipped with defensive capabilities and measures such that they can be able to respond automatically and dynamically to both accidental and deliberate defects and attacks. In this study, autonomous and unmanned vehicle systems are examined for their cyber-security vulnerabilities. Threats and attacks exploiting these vulnerabilities are identified and classified. Development guidelines and a mitigation strategy to be used in the development of autonomous and unmanned vehicle systems are proposed and discussed in the final section.en_US
dc.identifier.eissn1557-380Xen_US
dc.identifier.endpage381en_US
dc.identifier.issn1548-5129en_US
dc.identifier.issue4en_US
dc.identifier.scopus2-s2.0-84954558936en_US
dc.identifier.startpage369en_US
dc.identifier.urihttp://hdl.handle.net/11727/10960
dc.identifier.volume12en_US
dc.identifier.wos000367551100003en_US
dc.language.isoengen_US
dc.relation.isversionof10.1177/1548512915575803en_US
dc.relation.journalJOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMSen_US
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergien_US
dc.rightsinfo:eu-repo/semantics/closedAccessen_US
dc.subjectAutonomyen_US
dc.subjectautonomous vehiclesen_US
dc.subjectcommunication securityen_US
dc.subjectcyber-security metricsen_US
dc.subjectinfrastructure vulnerabilityen_US
dc.subjectinstrument landing systemen_US
dc.subjectintelligent transportation systemsen_US
dc.subjectunmanned aerial vehicle (UAV)en_US
dc.subjectunmanned sea/surface vehicle (USV)en_US
dc.titleA Study on Cyber-Security Oo Autonomous and Unmanned Vehiclesen_US
dc.typearticleen_US

Files

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: