Araştırma Makalesi
BibTex RIS Kaynak Göster

Security Attacks Against Autonomous Vehicles

Yıl 2021, Cilt: 2 Sayı: 2, 22 - 28, 31.05.2021

Öz

The usage areas of autonomous vehicles and drones are increasing day by day. Autonomous vehicles enable maneuvers such as steering, deceleration and acceleration without the need for human factors through their automatic control systems. There is a lot of software on the basis of such systems. In control according to driving levels, there are situations such as being completely autonomous or belonging to the driver. Autonomous vehicles reduce the likelihood of traffic accidents caused by human error. On the other hand, autonomous vehicles that combine many different technologies can become vulnerable to some security errors and attacks. This study deals with cyber security attacks against autonomous vehicles and drones and their results.

Kaynakça

  • [1] Cui, Jin, Liew, Lin Shen, Sabaliauskaite, Giedre, Zhou, Fengjun. "A Review on Safety Failures, Security Attacks, and Available Countermeasures for Autonomous Vehicles". Ad Hoc Networks 90 (2019): 5-6.
  • [2] Mejri, Mohamed Nidhal, Jalel Ben-Othman, Mohamed Hamdi. "Survey on VANET security challenges and possible cryptographic solutions". Vehicular Communications 1.2 (2014): 1-11.
  • [3] Xu, Wenyuan, Member, Senior, IEEE, Yan, Chen, Jia, Weibin, Ji, Xiaoyu, Liu, Jianhao. "Analyzing and Enhancing the Security of Ultrasonic Sensors for Autonomous Vehicles". IEEE Internet of Things Journal 5.6 (2018): 1-14.
  • [4] Thing, Vrizlynn LL, Jiaxi Wu. "Autonomous Vehicle Security: A Taxonomy of Attacks and Defences". 2016 IEEE International Conference on Internet of Things (iThings), IEEE Green Computing, Communications (GreenCom), IEEE Cyber, Physical and Social Computing (CPSCom), IEEE Smart Data (SmartData). (IEEE, 2016): 165-170.
  • [5] Zhang, Tao, Helder Antunes, Siddhartha Aggarwal. "Defending connected vehicles against malware: Challenges and a solution framework". IEEE Internet of Things journal1.1 (2014): 15-20.
  • [6] Akram, Raja Naeem, Markantonakis, Konstantinos, Mayes, Keith, Habachi, Oussama, Sauveron, Damien, Steyven, Andreas, Chaumette, Serge. "Security, Privacy and Safety Evaluation of Dynamic and Static Fleets of Drones". 2017 IEEE/AIAA 36th Digital Avionics Systems Conference (DASC). IEEE, (2017): 1-3.
  • [7] Akram, Raja Naeem, Markantonakis, Konstantinos, Mayes, Keith, Bonnefoi, Pierre-François, Sauveron, Damien, Chaumette, Serge. "A secure and trusted protocol for enhancing safety of on-ground airplanes using uavs." 2017 Integrated Communications, Navigation and Surveillance Conference (ICNS). IEEE, (2017): 3-9.
  • [8] Pigatto, Daniel Fernando ve arkadaşları. "The HAMSTER Data Communication Architecture for Unmanned Aerial, Ground and Aquatic Systems." Journal of Intelligent & Robotic Systems 84.1-4 (2016): 1-16.
  • [9] Akram, Raja Naeem ve arkadaşları. "Secure autonomous uavs fleets by using new specific embedded secure elements". 2016 IEEE Trustcom/BigDataSE/ISPA. IEEE, (2016): 608.
  • [10] Akram, Raja Naeem ve arkadaşları. "A secure and trusted channel protocol for uavs fleets". IFIP International Conference on Information Security Theory and Practice. Springer, Cham, (2017): 3-19.
  • [11] Yan, Chen, Wenyuan Xu, Jianhao Liu. "Can you trust autonomous vehicles: Contactless attacks against sensors of self-driving vehicle".nDEF CON 24.8 (2016): 1-12.
  • [12] https://www.robotiksistem.com/arduino_nedir_arduino_ozellikleri.html. Web.25.01.2021.
  • [13] https://en.wikipedia.org/wiki/Low_Orbit_Ion_Cannon. Web.25.01.2021.
  • [14] https://en.wikipedia.org/wiki/High_Orbit_Ion_Cannon. Web.25.01.2021.
  • [15] https://tr.wikipedia.org/wiki/SYN_saldırısı. Web.25.01.2021.
  • [16] https://kb.mazebolt.com/knowledgebase/hulk-flood/. Web.25.01.2021.
  • [17] https://tr.wikipedia.org/wiki/Wireshark. Web.25.01.2021.
  • [18] https://www.ropaku.com/what-is-frame-time-why-is-frame-time-important/. Web.25.01.2021.
  • [19] https://en.wikipedia.org/wiki/Frame_rate. Web.25.01.2021.
  • [20] https://www.sweetwater.com/sweetcare/articles/which-buffer-size-setting-should-i-use-in-my-daw/. Web.25.01.2021.
  • [21] https://en.wikipedia.org/wiki/ESP32. Web.5.02.2021.

Otonom Araçlara Yönelik Güvenlik Saldırıları

Yıl 2021, Cilt: 2 Sayı: 2, 22 - 28, 31.05.2021

Öz

Otonom araçların (Autonomous Vehicle) ve drone’ların kullanım alanları gün geçtikçe artmaktadır. Otonom araçlar, otomatik kontrol sistemleri sayesinde insan faktörüne ihtiyaç duymadan direksiyon kontrolü, yavaşlama, hızlanma gibi manevraların gerçekleştirilmesini sağlamaktadır. Bu gibi sistemlerin temelinde birçok yazılım yer almaktadır. Sürüş seviyelerine göre kontrolde ise tamamen otonom olması veya sürücüye ait olması gibi durumlar mevcuttur. Otonom araçlar sayesinde insan hatasından kaynaklanan trafik kazaları olasılığı azalmaktadır. Diğer bir açıdan, birçok farklı teknolojiyi bir araya getiren otonom araçlar bazı güvenlik hatalarına ve saldırılarına karşı açık hale gelebilmektedir. Bu çalışmada, otonom araçlara ve drone’lara karşı gerçekleştirilen siber güvenlik saldırıları ve sonuçları ele alınmaktadır.

Kaynakça

  • [1] Cui, Jin, Liew, Lin Shen, Sabaliauskaite, Giedre, Zhou, Fengjun. "A Review on Safety Failures, Security Attacks, and Available Countermeasures for Autonomous Vehicles". Ad Hoc Networks 90 (2019): 5-6.
  • [2] Mejri, Mohamed Nidhal, Jalel Ben-Othman, Mohamed Hamdi. "Survey on VANET security challenges and possible cryptographic solutions". Vehicular Communications 1.2 (2014): 1-11.
  • [3] Xu, Wenyuan, Member, Senior, IEEE, Yan, Chen, Jia, Weibin, Ji, Xiaoyu, Liu, Jianhao. "Analyzing and Enhancing the Security of Ultrasonic Sensors for Autonomous Vehicles". IEEE Internet of Things Journal 5.6 (2018): 1-14.
  • [4] Thing, Vrizlynn LL, Jiaxi Wu. "Autonomous Vehicle Security: A Taxonomy of Attacks and Defences". 2016 IEEE International Conference on Internet of Things (iThings), IEEE Green Computing, Communications (GreenCom), IEEE Cyber, Physical and Social Computing (CPSCom), IEEE Smart Data (SmartData). (IEEE, 2016): 165-170.
  • [5] Zhang, Tao, Helder Antunes, Siddhartha Aggarwal. "Defending connected vehicles against malware: Challenges and a solution framework". IEEE Internet of Things journal1.1 (2014): 15-20.
  • [6] Akram, Raja Naeem, Markantonakis, Konstantinos, Mayes, Keith, Habachi, Oussama, Sauveron, Damien, Steyven, Andreas, Chaumette, Serge. "Security, Privacy and Safety Evaluation of Dynamic and Static Fleets of Drones". 2017 IEEE/AIAA 36th Digital Avionics Systems Conference (DASC). IEEE, (2017): 1-3.
  • [7] Akram, Raja Naeem, Markantonakis, Konstantinos, Mayes, Keith, Bonnefoi, Pierre-François, Sauveron, Damien, Chaumette, Serge. "A secure and trusted protocol for enhancing safety of on-ground airplanes using uavs." 2017 Integrated Communications, Navigation and Surveillance Conference (ICNS). IEEE, (2017): 3-9.
  • [8] Pigatto, Daniel Fernando ve arkadaşları. "The HAMSTER Data Communication Architecture for Unmanned Aerial, Ground and Aquatic Systems." Journal of Intelligent & Robotic Systems 84.1-4 (2016): 1-16.
  • [9] Akram, Raja Naeem ve arkadaşları. "Secure autonomous uavs fleets by using new specific embedded secure elements". 2016 IEEE Trustcom/BigDataSE/ISPA. IEEE, (2016): 608.
  • [10] Akram, Raja Naeem ve arkadaşları. "A secure and trusted channel protocol for uavs fleets". IFIP International Conference on Information Security Theory and Practice. Springer, Cham, (2017): 3-19.
  • [11] Yan, Chen, Wenyuan Xu, Jianhao Liu. "Can you trust autonomous vehicles: Contactless attacks against sensors of self-driving vehicle".nDEF CON 24.8 (2016): 1-12.
  • [12] https://www.robotiksistem.com/arduino_nedir_arduino_ozellikleri.html. Web.25.01.2021.
  • [13] https://en.wikipedia.org/wiki/Low_Orbit_Ion_Cannon. Web.25.01.2021.
  • [14] https://en.wikipedia.org/wiki/High_Orbit_Ion_Cannon. Web.25.01.2021.
  • [15] https://tr.wikipedia.org/wiki/SYN_saldırısı. Web.25.01.2021.
  • [16] https://kb.mazebolt.com/knowledgebase/hulk-flood/. Web.25.01.2021.
  • [17] https://tr.wikipedia.org/wiki/Wireshark. Web.25.01.2021.
  • [18] https://www.ropaku.com/what-is-frame-time-why-is-frame-time-important/. Web.25.01.2021.
  • [19] https://en.wikipedia.org/wiki/Frame_rate. Web.25.01.2021.
  • [20] https://www.sweetwater.com/sweetcare/articles/which-buffer-size-setting-should-i-use-in-my-daw/. Web.25.01.2021.
  • [21] https://en.wikipedia.org/wiki/ESP32. Web.5.02.2021.
Toplam 21 adet kaynakça vardır.

Ayrıntılar

Birincil Dil Türkçe
Konular Bilgisayar Yazılımı
Bölüm Araştırma Makaleleri
Yazarlar

Ayça Nur Kahya 0000-0002-6950-4421

Esra Yolaçan 0000-0002-0008-1037

Yayımlanma Tarihi 31 Mayıs 2021
Gönderilme Tarihi 13 Mart 2021
Kabul Tarihi 15 Nisan 2021
Yayımlandığı Sayı Yıl 2021 Cilt: 2 Sayı: 2

Kaynak Göster

IEEE A. N. Kahya ve E. Yolaçan, “Otonom Araçlara Yönelik Güvenlik Saldırıları”, ESTUDAM Bilişim, c. 2, sy. 2, ss. 22–28, 2021.

Dergimiz Index Copernicus, ASOS Indeks, Google Scholar ve ROAD indeks tarafından indekslenmektedir.