Security Modeling of Autonomous Systems: A Survey

被引:31
|
作者
Jahan, Farha [1 ]
Sun, Weiqing [1 ]
Niyaz, Quamar [2 ]
Alam, Mansoor [1 ]
机构
[1] Univ Toledo, Toledo, OH 43606 USA
[2] Purdue Univ Northwest, Hammond, IN 46323 USA
关键词
Cybersecurity; modeling; autonomous system (AS); Unmanned Aerial Vehicles (UAVs); driverless car; robots; CYBER-PHYSICAL SYSTEMS; GOAL-DRIVEN AUTONOMY; SITUATION AWARENESS; UNMANNED SYSTEMS; AUTOMATION; FRAMEWORK; PERFORMANCE; CHALLENGES; WORKLOAD; ATTACKS;
D O I
10.1145/3337791
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Autonomous systems will soon be integrating into our lives as home assistants, delivery drones, and driverless cars. The implementation of the level of automation in these systems from being manually controlled to fully autonomous would depend upon the autonomy approach chosen to design these systems. This article reviews the historical evolution of autonomy, its approaches, and the current trends in related fields to build robust autonomous systems. Toward such a goal and with the increased number of cyberattacks, the security of these systems needs special attention from the research community. To gauge the extent to which research has been done in this area, we discuss the cybersecurity of these systems. It is essential to model the system from a security perspective, identify the threats and vulnerabilities, and then model the attacks. A survey in this direction explores the theoretical/analytical system and attack models that have been proposed over the years and identifies the research gap that needs to be addressed by the research community.
引用
收藏
页数:34
相关论文
共 50 条
  • [21] Towards Security Transparency of Autonomous Systems on the Internet
    Khadka, Shyam Krishna
    Holz, Ralph
    Hesselman, Cristian
    COMPUTER SECURITY. ESORICS 2023 INTERNATIONAL WORKSHOPS, CPS4CIP, PT II, 2024, 14399 : 510 - 513
  • [22] Control Layer Security: A New Security Paradigm for Cooperative Autonomous Systems
    Guo, Weisi
    Wei, Zhuangkun
    Gonzalez, Oscar
    Perrusquia, Adolfo
    Tsourdos, Antonios
    IEEE VEHICULAR TECHNOLOGY MAGAZINE, 2024, 19 (01): : 93 - 102
  • [23] Modeling security in distributed systems
    Riess, H.P.
    Proceedings of the IFIP International Conference on Computer Security and Information Integrity in Our Changing World, 1991,
  • [24] Modeling the security of steganographic systems
    Zöllner, J
    Federrath, H
    Klimant, H
    Pfitzmann, A
    Piotraschke, R
    Westfeld, A
    Wicke, G
    Wolf, G
    INFORMATION HIDING, 1998, 1525 : 344 - 354
  • [25] MODELING SECURITY IN DISTRIBUTED SYSTEMS
    RIESS, HP
    COMPUTER SECURITY AND INFORMATION INTEGRITY, 1991, : 371 - 381
  • [26] A Survey on Cyber-Security of Connected and Autonomous Vehicles (CAVs)
    Sun, Xiaoqiang
    Yu, F. Richard
    Zhang, Peng
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2022, 23 (07) : 6240 - 6259
  • [27] Autonomous vehicle security: Current survey and future research challenges
    Pali, Isha
    Amin, Ruhul
    Abdussami, Mohammad
    SECURITY AND PRIVACY, 2024, 7 (03)
  • [28] A survey on security attacks and defense techniques for connected and autonomous vehicles
    Minh Pham
    Xiong, Kaiqi
    COMPUTERS & SECURITY, 2021, 109
  • [29] On the Security of Smart Home Systems: A Survey
    Bin Yuan
    Jun Wan
    Yu-Han Wu
    De-Qing Zou
    Hai Jin
    Journal of Computer Science and Technology, 2023, 38 : 228 - 247
  • [30] A Survey of Visualization Systems for Network Security
    Shiravi, Hadi
    Shiravi, Ali
    Ghorbani, Ali A.
    IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, 2012, 18 (08) : 1313 - 1329