000 05769nam a22006255i 4500
001 978-3-031-55044-7
003 DE-He213
005 20240730172108.0
007 cr nn 008mamaa
008 240515s2024 sz | s |||| 0|eng d
020 _a9783031550447
_9978-3-031-55044-7
024 7 _a10.1007/978-3-031-55044-7
_2doi
050 4 _aQ334-342
050 4 _aTA347.A78
072 7 _aUYQ
_2bicssc
072 7 _aCOM004000
_2bisacsh
072 7 _aUYQ
_2thema
082 0 4 _a006.3
_223
245 1 0 _aDeception in Autonomous Transport Systems
_h[electronic resource] :
_bThreats, Impacts and Mitigation Policies /
_cedited by Simon Parkinson, Alexandros Nikitas, Mauro Vallati.
250 _a1st ed. 2024.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2024.
300 _aVIII, 196 p. 20 illus., 12 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aWireless Networks,
_x2366-1445
505 0 _aIntroduction -- Ethical dilemmas in autonomous driving: philosophical, social and public policy implications -- Smart Cities: Concept, Pillars, and Challenges -- The Connected and Autonomous Vehicle Trade-off: Functional Benefits versus Security Risks -- Connected and Autonomous Vehicles and Infrastructure Needs Exploring Road Network Changes and Policy Interventions -- Centralised Intelligent Traffic Routing in the Light of Disobedience of Drivers -- Detecting Abnormal Vehicle Behaviour: A Clustering-Based Approach -- AI Approaches on Urban Public Transport Routing -- Cyber Threat Intelligence Analysis for Situational Understanding in Autonomous Transport Systems -- Interaction Attacks as Deceitful Connected and Automated Vehicle Behaviour -- Securing Vehicle-to-Drone (V2D) Communications: Challenges and Solutions -- The Use of GPS Spoofing Attacks in Location Deception.
520 _aThis book provides a comprehensive overview of deception in autonomous transport systems. This involves investigating the threats facing autonomous transport systems and how they can contribute towards a deceptive attack, followed by their potential impact if successful, and finally, how they can be mitigated. The work in this book is grouped into three parts. This first part focuses on the area of smart cities, policies, and ethics. This includes critically appraising the trade-off between functionality and security with connected and autonomous vehicles. The second discusses a range of AI applications in the wider field of smart transport and mobility, such as detecting anomalies in vehicle behaviour to investigating detecting disobedient vehicles. Finally, the third part presents and discusses cybersecurity-related aspects to consider when dealing with Connected and Autonomous Vehicles (CAVs) and smart urban infrastructure. This includes analysing different attacks to investigating secure communication technologies. CAVs are a game-changing technology with the potential to transform the way transport is perceived, mobility is serviced, travel ecosystems 'behave', and cities and societies as a whole function. There are many foreseen safety, accessibility and sustainability benefits resulting from the adoption of CAVs because of their ability, in theory, to operate error-free and collaboratively, ranging from accident prevention, congestion reduction and decreased carbon emissions to time savings, increased social inclusion, optimised routing, and better traffic control. However, no matter what the expected benefits are, CAVs are at the same time susceptible to an unprecedented number of new digital and physical threats. The severity of these threats has resulted in an increased effort to deepen our understanding of CAVs when it comes to their safety and resilience. In this complex and multi-faceted scenario, this book aims to provide an extensive overview of the risks related to the malicious exploitation of CAVs and beyond, the potential ways in which vulnerabilities can be exploited, prevention and mitigation policies and techniques, and the impact that the non-acceptance of Connected and Autonomous Mobility can have on the Smart City agenda. This book targets researchers, practitioners, and advanced-level students in computer science and transport engineering.
650 0 _aArtificial intelligence.
_93407
650 0 _aTransportation engineering.
_93560
650 0 _aTraffic engineering.
_915334
650 0 _aComputer networks
_xSecurity measures.
_93969
650 0 _aWireless communication systems.
_93474
650 0 _aMobile communication systems.
_94051
650 1 4 _aArtificial Intelligence.
_93407
650 2 4 _aTransportation Technology and Traffic Engineering.
_932448
650 2 4 _aMobile and Network Security.
_933624
650 2 4 _aWireless and Mobile Communication.
_9101759
700 1 _aParkinson, Simon.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9101760
700 1 _aNikitas, Alexandros.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9101761
700 1 _aVallati, Mauro.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9101762
710 2 _aSpringerLink (Online service)
_9101764
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783031550430
776 0 8 _iPrinted edition:
_z9783031550454
776 0 8 _iPrinted edition:
_z9783031550461
830 0 _aWireless Networks,
_x2366-1445
_9101765
856 4 0 _uhttps://doi.org/10.1007/978-3-031-55044-7
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
942 _cEBK
999 _c88009
_d88009