Anomaly Detection from Cyber Threats via Infrastructure to Automated Vehicle

AI-generated keywords: Anomaly Detection

AI-generated Key Points

The license of the paper does not allow us to build upon its content and the key points are generated using the paper metadata rather than the full article.

  • The research paper explores the use of Infrastructure-to-Vehicle (I2V) information in autonomous driving scenarios with limited visibility and high-density traffic.
  • External sensors are highlighted as beneficial for enhancing the vehicle's sensing capabilities.
  • Cyber security is a major challenge associated with I2V communication.
  • The researchers propose an anomaly detection algorithm to increase the vehicle's self-awareness in intersections.
  • The algorithm assesses the health of I2V communication against various cyber security attacks.
  • The analysis is conducted in a simulation environment using cyber-attack scenarios from the Secredas Project.
  • The study demonstrates that anomalies injected during these attacks can be robustly detected and mitigated by the autonomous vehicle.
  • The paper has been accepted and submitted for presentation at IEEE European Control Conference 2021.
Also access our AI generated: Comprehensive summary, Lay summary, Blog-like article; or ask questions about this paper to our AI assistant.

Authors: Chris van der Ploeg, Robin Smit, Alexis Siagkris-Lekkos, Frank Benders, Emilia Silvas

7 pages, 8 figures, accepted and submitted for IEEE European Control Conference 2021

Abstract: Using Infrastructure-to-Vehicle (I2V) information can be of great benefit when driving autonomously in high-density traffic situations with limited visibility, since the sensing capabilities of the vehicle are enhanced by external sensors. In this research, a method is introduced to increase the vehicle's self-awareness in intersections for one of the largest foreseen challenges when using I2V communication: cyber security. The introduced anomaly detection algorithm, running on the automated vehicle, assesses the health of the I2V communication against multiple cyber security attacks. The analysis is done in a simulation environment, using cyber-attack scenarios from the Secredas Project (Cyber Security for Cross Domain Reliable Dependable Automated Systems) and provides insights into the limitations the vehicle has when facing I2V cyber attacks of different types and amplitudes and when sensor redundancy is lost. The results demonstrate that anomalies injected can be robustly detected and mitigated by the autonomous vehicle, allowing it to react more safely and comfortably and maintaining correct object tracking in intersections.

Submitted to arXiv on 23 Apr. 2021

Ask questions about this paper to our AI assistant

You can also chat with multiple papers at once here.

The license of the paper does not allow us to build upon its content and the AI assistant only knows about the paper metadata rather than the full article.

AI assistant instructions?

Results of the summarizing process for the arXiv paper: 2104.11790v1

This paper's license doesn't allow us to build upon its content and the summarizing process is here made with the paper's metadata rather than the article.

The research paper titled "Anomaly Detection from Cyber Threats via Infrastructure to Automated Vehicle" explores the use of Infrastructure-to-Vehicle (I2V) information in autonomous driving scenarios with limited visibility and high-density traffic. The authors highlight the benefits of utilizing external sensors to enhance the vehicle's sensing capabilities. However, one of the major challenges associated with I2V communication is cyber security. To address this challenge, the researchers propose a method to increase the vehicle's self-awareness in intersections by introducing an anomaly detection algorithm. This algorithm, implemented on the automated vehicle, assesses the health of I2V communication against various cyber security attacks. The analysis is conducted in a simulation environment using cyber-attack scenarios from the Secredas Project, which focuses on Cyber Security for Cross Domain Reliable Dependable Automated Systems. The study provides valuable insights into the limitations faced by autonomous vehicles when encountering different types and amplitudes of I2V cyber attacks, particularly when sensor redundancy is lost. The results demonstrate that anomalies injected during these attacks can be robustly detected and mitigated by the autonomous vehicle. This capability allows for safer and more comfortable driving experiences while maintaining accurate object tracking in intersections. The paper is authored by Chris van der Ploeg, Robin Smit, Alexis Siagkris-Lekkos, Frank Benders, and Emilia Silvas and has been accepted and submitted for presentation at IEEE European Control Conference 2021. It consists of 7 pages and includes 8 figures illustrating key concepts.
Created on 18 Aug. 2023

Assess the quality of the AI-generated content by voting

Score: 0

Why do we need votes?

Votes are used to determine whether we need to re-run our summarizing tools. If the count reaches -10, our tools can be restarted.

The previous summary was created more than a year ago and can be re-run (if necessary) by clicking on the Run button below.

The license of this specific paper does not allow us to build upon its content and the summarizing tools will be run using the paper metadata rather than the full article. However, it still does a good job, and you can also try our tools on papers with more open licenses.

Similar papers summarized with our AI tools

Navigate through even more similar papers through a

tree representation

Look for similar papers (in beta version)

By clicking on the button above, our algorithm will scan all papers in our database to find the closest based on the contents of the full papers and not just on metadata. Please note that it only works for papers that we have generated summaries for and you can rerun it from time to time to get a more accurate result while our database grows.

Disclaimer: The AI-based summarization tool and virtual assistant provided on this website may not always provide accurate and complete summaries or responses. We encourage you to carefully review and evaluate the generated content to ensure its quality and relevance to your needs.