16A Technique for Monitoring Cyber-Attacks on Self-Driving Automobiles-Based VANET

Vinod Mahor1*, Sadhna Bijrothiya2, Rina Mishra3 and Romil Rawat3

1Department of Computer Science & Engineering, IES College of Technology Bhopal, M.P., India

2Department of Computer Science & Engineering, Maulana Azad National Institute of Technology, Bhopal, MP, India

3Department of Computer Science & Engineering, Shri Vaishnav Vidyapeeth Vishwavidyalaya, Indore, India

Abstract

In the last few years, “vehicular-ad-hoc-networks” (VANETs) have become a popular study topic. VANETs are attracting attention from academia and business people both because of their unique properties, including dynamic frequency topology and predictable mobility. A one-of-a-kind design for a benchmarking framework system for self-driving automobiles vehicles, with an emphasis on its stability or protection, is suggested in this chapter. It is “computer vision” and “networking technology” to make linked autonomous cars more automated. These systems employ sensors to offer data and assessments about their environment. Other major points covered in this chapter are about reducing autonomous vulnerability attacks. This might potentially drive a variety of cyber risks and attacks, including traffic sign spoofing, GPS spoofing, and distributed denial of service assaults on Vehicular Ad-hoc networks. This chapter examines a variety of security issues, vulnerabilities, exploitation techniques, and their negative impact on connected ...

Get Autonomous Vehicles, Volume 2 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.