Autonomous Vehicles (Ground)
Technology Review #2
Autonomous Vehicles (Ground)
right3463290February 19, 2015
Insert Name 1000000February 19, 2015
Insert Name
Introduction
The future of automotive travel is now in the testing phases of production. This new technology that is being developed will change the world as we know it. In the next few year’s companies such as Land Rover, Audi, Mercedes Benz, Volvo and Google are in a race to be the first company worldwide to produce and manufacture autonomous vehicle to the worldwide automotive market place. Developers and labs are testing this technology in the United Kingdom as well as in the United States. With this new technology comes pro’s and con’s and it is a introduction of a new product on the market that leaves room for technology transfers to happen amongst the other companies in the market place. Where the companies can get access to the specifications of these cars and develop more add-ons or 3rd party parts for these autonomous vehicle. But it also opens up a new avenue in cybersecurity.
Autonomous vehicle can be programed to collect data. “An autonomous vehicle requires an array of sensors, such as laser, radar, light detection and ranging (LiDAR), GPS, and computer vision systems, to gather information CITATION ALE13 l 1033 (ALEXANDER M. WYGLINSKI, 2013).” This big data that is collected by the car is analyzed by a super computer that is located in the car. The findings in the data then tells the car how to move and react to its findings.
Pros of autonomous vehicle
Autonomous vehicle are a great concept. They will save most people a lot of time because with the autonomous vehicle technology the system in the cars will be able to control the flow of traffic, there for they should never be traffic jams because the car should always make the best move to stay clear of road hazards. “Vehicular Ad Hoc Networks (VANET) collect and distribute safety information to massively reduce the number of accidents by warning drivers about the danger before they actually face it. CITATION Lic l 1033 (Zhang, n.d.)” Autonomous vehicle are also looking to be the safest mode of transportation. That is not a hard goal to achieve because most other modes of transportation are ran by people and most accidents happen due to human error of some sort. For prevention reasons the autonomous vehicle will be connected on a mesh topology network so they can get information about approaching hazards from a car that is on the same route as them but in a different area. But it is a known fact that Mesh wireless networks have optimization problems “optimizing performance in WMNs can be seen as multi-objective optimization problem. CITATION Adm11 l 1033 (Admir Barolli, 2011)”
Autonomous vehicle can be a new way to travel for a lot of people. It could make sure that blind people get door to door service. It can also take children to things like soccer practice. It can also let you do work in the car while the car drives you to work. It also can be integrated with services at the grocery store where your driverless car parks at the supermarket and a person loads the car with groceries and the car drives back home with the groceries.
Autonomous vehicles can also be helpful to the armed services. They can use this technology on the frontlines of hostel situations the same why they use flying drones. That way if ambushed no human life is lost. They would also be excellent for recon missions because the amount of data it takes to navigate it can have extra sensors and cameras added and be recording everything that it sees and have the data analyzed in real time by Intel specialist miles away. “New technologies create new capabilities and strategic opportunities. CITATION Nic13 l 1033 (Nicholas Grossman, 2013)”
Autonomous vehicles are also good for the world’s economy. With this new ground breaking technology comes the need for people who know how to run the network the cars run on. Also it would create the need for people to build more satellites also people to build and work in signal boosters so that there are no blinds spots like tunnels where the car will not have reception In autonomous vehicles, companies can incorporate T.V.s with cable so the owner can spend a little more time with their family in the car interacting. With this new technology comes a new avenue of revenue companies can make upgrades to the super computer found in the car. They can also design apps that can be useful to the car and car owner. They can also create new software that protects the car and the network the car is on from cyberattacks the way anti-virus software does a home computer.
Cons of autonomous vehicles
With this new technology come new threats to the technology. Being that autonomous vehicles are so new people will be looking for ways of knowing who the car belongs too. They might uses way like social engineering to certainly ruin a person’s confidently. In the day and age that we live in people post pictures of their cars and details about where there going and what they are going to be doing on social media sites all the time. With the autonomous vehicles comes a treat of someone hacking into the technology and redirecting a person route to an area where someone could be kidnap or rob them. The modification of the signal from the car to the network mess up the integrity of the car. Also a hacker might redirect a bunch of cars routes to block a particular area so they can get a clear route in another area without any traffic, this method was used in movies “Takers”. It also would damage the interparty of the information that is given to the car.
A hacker could use Denial of service or DDOS to attack the network that the car is running on and that will hurt the availability of the car and the network it is on. Also someone could use jamming technology to block out the feed from the network to the car and that will damage the availability of the vehicle and all its functions. Someone could hack into the cars supercomputer and change the logged events of the day and show two different findings between the network and the car and that will take out the car and networks accountability because who can trust the event logs of both the car and the server.
Also autonomous vehicles might cause problems with privacy. “Local adversary is capable of observing vehicles at a time instant. A global adversary can follow a target and track it over a sustained period of time. CITATION Bri11 l 1033 (Brijesh Kumar Chaurasia, 2011)” The Hacker could hack into the car and take images from the inside of the car and sell them to paparazzi. Or the police might use that info as evidence the laws around driverless cars have not be really put into effect yet.
Ways to implement cybersecurity into driverless cars
There are many ways that cybersecurity can help the making of the driverless car a reality. As of currently “Cyber-security plays an important role in the development of multi-agent systems, however little work has been done on securing multi-agent systems as a sole entity in the software development process. CITATION Sar14 l 1033 (Sarah Schulz Mukisa, 2014)” Programmers and cybersecurity engineers should get together and brainstorm and design ways for this cars network to be safe and secure. Also they should plan a system that the car gets the latest patches and updates in a secure manor. Also possible implement anti-virus and mal ware detection in the software so that there will be a process of detection just in case anything goes wrong with the computer. There needs to be a multiple factor authentication method to be able to drive the car.
Conclusion
In conclusion driverless cars are a great addition to the future. They have many great things that the can contribute to the world. They can save millions of lives per year. They can help stop solders from getting killed by serving as decoys and collection Intel. In day to day traffic they prevent accidents from happening and also help with stress by navigating thought rush hour traffic in a minimal amount of time. Autonomous vehicles with create an opportunity for new jobs. With the right people working on the security of these cars I feel like they can help the world as a whole.
References
BIBLIOGRAPHY Admir Barolli, F. X. (2011, Jun). Optimization Problems and Resolution Methods for Node Placement in Wireless Mesh Networks. Retrieved from IEEE Computer Society: http://www.computer.org.ezproxy.umuc.edu/csdl/proceedings/nbis/2011/4458/00/4458a126.pdf
ALEXANDER M. WYGLINSKI, X. H. (2013, Feb). Security of Autonomous Systems Employing Embedded Computing and Sensors. Retrieved from PROLEGOMENA: http://www.computer.org.ezproxy.umuc.edu/csdl/mags/mi/2013/01/mmi2013010080.pdf
Brijesh Kumar Chaurasia, S. V. (2011, July). Attacks on Anonymity in VANET. Retrieved from IEEE Computer Society: http://www.computer.org.ezproxy.umuc.edu/csdl/proceedings/cicn/2011/4587/00/4587a217.pdf
Nicholas Grossman. (2013). Robotics and the future of asymmetric warfare. Retrieved from Proquest: http://search.proquest.com.ezproxy.umuc.edu/pqdtft/docview/1506155122/6D6AB3A1C82E46B7PQ/4?accountid=14580
Sarah Schulz Mukisa, A. R. (2014, Jun). Cyber-security challenges of Agent Technology in Intelligent Transportation Systems. Retrieved from http://delivery.acm.org.ezproxy.umuc.edu/10.1145/2610000/2602953/a9-mukisa.pdf?ip=54.84.104.155&id=2602953&acc=ACTIVE%20SERVICE&key=5F8E7AA76238C9EB%2EB1CB922B730AF910%2E4D4702B0C3E38B35%2E4D4702B0C3E38B35&CFID=479571626&CFTOKEN=64034787&__acm__=142405937
Zhang, L. (n.d.). Specifying and Modeling Automotive Cyber Physical Systems. Retrieved from IEEE Computer Society: http://www.computer.org.ezproxy.umuc.edu/csdl/proceedings/cse/2013/5096/00/5096a603.pdf

Leave a Reply
Want to join the discussion?Feel free to contribute!