Modelling cybersecurity regulations for automated vehicles

被引:13
|
作者
Khan, Shah Khalid [1 ]
Shiwakoti, Nirajan [1 ]
Stasinopoulos, Peter [1 ]
Warren, Matthew [2 ,3 ]
机构
[1] RMIT Univ Melbourne, Sch Engn, Melbourne, Australia
[2] RMIT Univ Australia, Melbourne, South Africa
[3] Univ Johannesburg, Johannesburg, South Africa
来源
ACCIDENT ANALYSIS AND PREVENTION | 2023年 / 186卷
关键词
Driverless cars; Cyber-attacks; Laws; Governance; Cyber-physical system; AUTONOMOUS VEHICLES; OPPORTUNITIES; BARRIERS; SECURITY;
D O I
10.1016/j.aap.2023.107054
中图分类号
TB18 [人体工程学];
学科分类号
1201 ;
摘要
Technological advancements in Connected and Automated Vehicles (CAVs), particularly the integration of diverse stakeholder groups (communication service providers, road operators, automakers, repairers, CAV consumers, and the general public) and the pursuit of new economic opportunities, have resulted in the emer-gence of new technical, legal, and social challenges. The most pressing challenge is deterring criminal behaviour in both the physical and cyber realms through the adoption of CAV cybersecurity protocols and regulations. However, the literature lacks a systematic decision tool to analyze the impact of the potential cybersecurity regulations for dynamically interacting stakeholders, and to identify the leverage points to minimise the cyber-risks. To address this knowledge gap, this study uses systems theory to develop a dynamic modelling tool to analyze the indirect consequences of potential CAVs cybersecurity regulations in the medium to long term. It is hypothesized that CAVs Cybersecurity Regulatory Framework (CRF) is the property of the entire ITS stakeholders. The CRF is modelled using the System Dynamic based Stock-and-Flow-Model (SFM) technique. The SFM is founded on five critical pillars: the Cybersecurity Policy Stack, the Hacker's Capability, Logfiles, CAV Adopters, and intelligence-assisted traffic police. It is found that decision-makers should focus on three major leverage points: establishing a CRF grounded on automakers' innovation; sharing risks in eliminating negative externalities associated with underinvestment and knowledge asymmetries in cybersecurity; and capitalising on massive CAV-generated data in CAV operations. The formal integration of intelligence analysts and computer crime investigators to strengthen traffic police capabilities is pivotal. Recommendations for automakers include data-profiteering in CAV design, production, sales, marketing, safety enhancements and enabling consumer data transparency. Furthermore, CAVs-CRF necessitate a balanced approach to the trade-off between: i) data acces-sibility constraints on CAV automakers and ITS service providers; ii) regulator command and control thresholds; iii) automakers' business investment protection; and iv) consumers' data privacy guard.
引用
收藏
页数:15
相关论文
共 50 条
  • [21] Cybersecurity in Unmanned Aerial Vehicles: a Review
    Shafik, Wasswa
    Matinkhah, S. Mojtaba
    Shokoor, Fawad
    INTERNATIONAL JOURNAL ON SMART SENSING AND INTELLIGENT SYSTEMS, 2023, 16 (01):
  • [22] Cybersecurity of Unmanned Aerial Vehicles: A Survey
    Guo, Renshuai
    Huang, Minhuan
    Li, Jin
    Wang, Jingjing
    2021 14TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER THEORY AND ENGINEERING (ICACTE 2021), 2021, : 57 - 64
  • [23] Cybersecurity in unmanned aerial vehicles (UAVs)
    Ly, Bora
    Ly, Romny
    Journal of Cyber Security Technology, 2021, 5 (02) : 120 - 137
  • [24] Regulations for the inspection of trade vehicles (weight vehicles)
    不详
    ZEITSCHRIFT DES VEREINES DEUTSCHER INGENIEURE, 1927, 71 : 267 - 267
  • [25] Cybersecurity of Unmanned Aerial Vehicles: A Survey
    Yu, Zhenhua
    Wang, Zhuolin
    Yu, Jiahao
    Liu, Dahai
    Song, Houbing Herbert
    Li, Zhiwu
    IEEE AEROSPACE AND ELECTRONIC SYSTEMS MAGAZINE, 2024, 39 (09) : 182 - 215
  • [26] Dynamic Watermarking for Cybersecurity of Autonomous Vehicles
    Shangguan, Lantian
    Chour, Kenny
    Ko, Woo Hyun
    Kim, Jaewon
    Kamath, Gopal Krishna
    Satchidanandan, Bharadwaj
    Gopalswamy, Swaminathan
    Kumar, P. R.
    IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2023, 70 (11) : 11735 - 11743
  • [27] Cybersecurity Simulator for Connected and Autonomous Vehicles
    Folan, Sean
    Wang, Yunsheng
    PROCEEDINGS OF THE 2023 INTERNATIONAL SYMPOSIUM ON THEORY, ALGORITHMIC FOUNDATIONS, AND PROTOCOL DESIGN FOR MOBILE NETWORKS AND MOBILE COMPUTING, MOBIHOC 2023, 2023, : 430 - 435
  • [28] A Microsimulation-Based Modelling Approach for Connected and Automated Vehicles on Roundabouts
    Tumminello, Maria Luisa
    Macioszek, Elzbieta
    Grana, Anna
    Giuffre, Tullio
    ADVANCED SOLUTIONS AND PRACTICAL APPLICATIONS IN ROAD TRAFFIC ENGINEERING, 2023, 604 : 49 - 68
  • [29] Human Factors in Modelling Mixed Traffic of Traditional, Connected, and Automated Vehicles
    Sharma, Anshuman
    Ali, Yasir
    Saifuzzaman, Mohammad
    Zheng, Zuduo
    Haque, Md. Mazharul
    ADVANCES IN HUMAN FACTORS IN SIMULATION AND MODELING (AHFE 2017), 2018, 591 : 262 - 273
  • [30] Object oriented modelling and development of a dispatching algorithm for automated guided vehicles
    S. P. Singh
    M. K. Tiwari
    The International Journal of Advanced Manufacturing Technology, 2004, 23 : 682 - 695