This paper presents a hacking risk arising in fullyautomated cooperative driving. As opposed to common cyberrisk scenarios, this scenario does not require internal access to an automated car at all, and is therefore largely independent of current on-board malware protection. A hacker uses a wireless mobile device, for example a hacked smartphone, to send vehicleto- vehicle (V2V) signals from a human-driven car, masquerading it as a fully-automated, cooperating vehicle. It deliberately engages only in high-risk cooperative maneuvers with other cars, in which the unwitting human driver is expected to perform a specific maneuver to avoid collisions with other vehicles. As
the human driver is unaware of the planned maneuver, he fails to react as expected by the other vehicles; depending on the situation, a severe collision risk can ensue. We propose a vision-based countermeasure that only requires state-of-the-art equipment for fully-automated vehicles, and assures that such an attack without internal access to an automated car is impossible.
«
This paper presents a hacking risk arising in fullyautomated cooperative driving. As opposed to common cyberrisk scenarios, this scenario does not require internal access to an automated car at all, and is therefore largely independent of current on-board malware protection. A hacker uses a wireless mobile device, for example a hacked smartphone, to send vehicleto- vehicle (V2V) signals from a human-driven car, masquerading it as a fully-automated, cooperating vehicle. It deliberately engages on...
»