Back to Search
Start Over
Securing the Future: A Comprehensive Review of Security Challenges and Solutions in Advanced Driver Assistance Systems
- Source :
- IEEE Access, Vol 12, Pp 643-678 (2024)
- Publication Year :
- 2024
- Publisher :
- IEEE, 2024.
-
Abstract
- Advanced Driver Assistance Systems (ADAS) are advanced technologies that assist drivers with vehicle operation and navigation. Recent improvements and brisk expansion in the ADAS market, as well as an increase in the frequency of incidents such as sensor spoofing, communication interruption etc., in autonomous vehicles (AVs), have raised the need to research ADAS security technology. The security issues raised by incorporating these technologies into automobiles must be addressed to protect the privacy and safety of passengers and other road users. As a result, the purpose of this research is to investigate the security issues that arise from the integration of ADAS technologies. Addressing these challenges holds the potential to establish a foundation for enhanced safety and dependability within transportation networks amidst the ongoing advancements in vehicle technology. This paper starts by describing the vulnerabilities, threats, assaults, and defense mechanisms of the ADAS. It then delves into the attacks and countermeasures in three categories, namely VANET, Hardware, and Adversarial attacks. VANET attacks encompass threats targeting Vehicular Ad Hoc Networks, aiming to disrupt communication among vehicles or between vehicles and infrastructure. Hardware attacks focus on vulnerabilities within the physical components of ADAS, including sensors, processors, or communication modules. Adversarial attacks involve deliberate manipulations or perturbations introduced into machine learning models or algorithms utilized within ADAS. These attacks aim to deceive or undermine the functionality of AI-based systems, causing misclassification, compromising system integrity, and posing risks to user safety by exploiting vulnerabilities in the AI decision-making process. Finally, this study highlights potential areas for future research, such as the utilization of artificial intelligence (AI), the necessity of industry-wide standardization, and recommends specific future work tailored to each attack described in the corresponding sections.
Details
- Language :
- English
- ISSN :
- 21693536
- Volume :
- 12
- Database :
- Directory of Open Access Journals
- Journal :
- IEEE Access
- Publication Type :
- Academic Journal
- Accession number :
- edsdoj.3b12c5e046644e16b410d7dae79e4dac
- Document Type :
- article
- Full Text :
- https://doi.org/10.1109/ACCESS.2023.3347200