Secure Estimation and Attack Isolation for Connected and Automated Driving in the Presence of Malicious Vehicles.
Tianci YangChen LvPublished in: CoRR (2021)
Keyphrases
- malicious users
- security measures
- malicious attacks
- driving simulator
- countermeasures
- authentication mechanism
- authentication protocol
- car navigation
- traffic accidents
- dangerous situations
- block cipher
- key exchange protocol
- real time
- detecting malicious
- insider attacks
- malicious activities
- security issues
- detect malicious
- malicious behavior
- intrusion detection system
- attack detection
- lightweight
- image sequences
- ddos attacks
- cryptographic protocols
- key distribution