0% found this document useful (0 votes)
42 views64 pages

FULLTEXT01

Safety and Security in Autonomous Vehicles - A Systematic Literature Review

Uploaded by

godwinudonkwo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
42 views64 pages

FULLTEXT01

Safety and Security in Autonomous Vehicles - A Systematic Literature Review

Uploaded by

godwinudonkwo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 64

Bachelor Degree Project

Safety and Security in Autonomous


Vehicles
- A Systematic Literature Review

Author: Mohammadali Rashidfarokhi


- Amirhossein Soltaninejad
Supervisor: Faiz Ul Muram
Semester: Spring 2023
Subject: Computer Science
Abstract
A transformative revolution in transportation is coming with the advent of Au-
tonomous Vehicles (AVs), which are expected to increase mobility, reduce traffic
congestion, and save fuel. Although AVs present significant advantages, they also
pose substantial challenges, particularly when it comes to security and safety. The
aim of this study is to map out the existing knowledge in order to facilitate further
research and development, which will hasten the rollout of secure and reliable au-
tonomous vehicles. This, in turn, will enable a sustainable and efficient future for
transportation. Research on AV safety and security is reviewed in this thesis in a
comprehensive systematic literature review. The search process identified a total of
283 studies published between 2019 and 2022, out of which 24 studies were selected
through a multi-stage process according to our predefined protocol. Based on re-
search topics in selected studies, our findings have a significant impact on the field
of Artificial Intelligence and automated vehicles. Based on our findings, we can
provide a summary of current knowledge regarding the safety, security, and stability
implications of autonomous vehicles. Simulations, real-life experiments, and physi-
cal tests were all used in the selected articles for evaluation. Aside from the excellent
results, we identified many limitations of the articles, including the limitations of the
data sets, the analysis of unusual events, and the verification practices.
Keywords: Autonomous Vehicles, Autonomous Driving (AD), sensors, LiDAR,
RADAR, Intelligent Transportation System (ITS), Safety, Security.
Preface

We would like to thank our supervisor, Faiz Ul Muram from Linnaeus University, for
consistently providing us with constructive feedback that has helped us to enhance this
project. Furthermore, we would like to acknowledge Daniel Toll from Linnaeus Univer-
sity, who has organized workshops throughout this project, offering valuable suggestions
and encouragement.
Contents
1 Introduction 1
1.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.2 Related work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.3 Problem formulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.4 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.5 Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.6 Scope/Limitation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.7 Target group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.8 Outline . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6

2 Method 7
2.1 Systematic Literature Review . . . . . . . . . . . . . . . . . . . . . . . . 7
2.1.1 Planning the review . . . . . . . . . . . . . . . . . . . . . . . . . 8
2.1.2 Specify goal and research questions . . . . . . . . . . . . . . . . 8
2.1.3 Search strategy . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
2.1.4 Inclusion and exclusion criteria . . . . . . . . . . . . . . . . . . 10
2.2 Conducting the review . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
2.2.1 Primary Studies Selection . . . . . . . . . . . . . . . . . . . . . 10
2.2.2 Data collection and extraction . . . . . . . . . . . . . . . . . . . 11
2.3 Reliability and Validity . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
2.4 Ethical considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14

3 Theoretical Background 15
3.1 Autonomous Vehicles . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
3.2 AV’s Technologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
3.3 Safety . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
3.4 Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
3.5 Communication Types and Protocols . . . . . . . . . . . . . . . . . . . . 28
3.6 Mapping and Localization . . . . . . . . . . . . . . . . . . . . . . . . . 32

4 Results 35
4.1 Types of Methods and Techniques (RQ1) . . . . . . . . . . . . . . . . . 36
4.1.1 Advanced Data Processing and Decision-Making Algorithms . . . 37
4.1.2 Communication and Networking Paradigms . . . . . . . . . . . . 38
4.1.3 Security Approaches and Techniques . . . . . . . . . . . . . . . 38
4.1.4 Object Detection and Localization Techniques . . . . . . . . . . 39
4.1.5 Sensor Data Integrity Verification and Tampering Detection . . . 39
4.1.6 Intersection and Traffic Management . . . . . . . . . . . . . . . 39
4.2 Evidence to Demonstrate the Result (RQ2) . . . . . . . . . . . . . . . . . 40
4.2.1 Simulation-Based Evaluation . . . . . . . . . . . . . . . . . . . . 40
4.2.2 Experimental Real-World Testing . . . . . . . . . . . . . . . . . 41
4.2.3 Data Analysis and Machine Learning Techniques . . . . . . . . . 41
4.2.4 Use of Data-sets . . . . . . . . . . . . . . . . . . . . . . . . . . 42
4.2.5 Comprehensive Review . . . . . . . . . . . . . . . . . . . . . . . 42
4.2.6 Histograms and Key Space Analysis . . . . . . . . . . . . . . . . 42
4.2.7 Prototyping and Hardware-Based Evaluation . . . . . . . . . . . 42
4.2.8 Computational Analysis and Protocol Verification . . . . . . . . . 42
4.3 Limitations (RQ3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
4.3.1 Scarcity of Data-sets . . . . . . . . . . . . . . . . . . . . . . . . 44
4.3.2 Communication Challenges . . . . . . . . . . . . . . . . . . . . 44
4.3.3 Hardware and Software Limitations . . . . . . . . . . . . . . . . 44
4.3.4 Performance and Real-Time Applications . . . . . . . . . . . . . 44
4.3.5 Assumptions and Simplifications . . . . . . . . . . . . . . . . . . 45
4.3.6 System Design and Implementation . . . . . . . . . . . . . . . . 45
4.3.7 Generalizability and Future Research . . . . . . . . . . . . . . . 45
4.3.8 Simulation and Testing . . . . . . . . . . . . . . . . . . . . . . . 45
4.3.9 Security Concerns and Cyber Attacks . . . . . . . . . . . . . . . 46
4.3.10 Scalability and Traffic Conditions . . . . . . . . . . . . . . . . . 46

5 Conclusion and Future Work 47


5.1 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
5.2 Future Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48

References 49

A Appendix 1 A

B Appendix 2 C
1 Introduction
Autonomous Vehicles (AVs) have the potential to bring about significant changes in
urban life and travel habits. The term "autonomous technology" in the automotive in-
dustry means that the technology can drive itself without requiring a human operator to
monitor or control it actively. There are already fleets of AVs in service in US cities [1].
An end-to-end autonomous driving solution requires smartly integrating different disci-
plines and technologies, such as sensors, communication, computation, machine learning,
data analytics, etc. [2].
Autonomous driving has gained a great deal of attention as the sophistication of in-
telligent vehicles advances rapidly. Although autonomous driving technologies are being
developed, they are still in the early stages. As a result, passengers and the vehicle itself
cannot be guaranteed to be safe and secure [3]. An AV’s perception system converts sen-
sory information into semantic information, including the identification and recognition
of road agents, such as cars, pedestrians, and cyclists, along with their positions, velocity,
and class, as well as the marking of lanes, drivable areas, and traffic signs. An important
consideration is that detecting and identifying road agents must be performed accurately
to prevent safety-related incidents. Self-driving vehicles use a variety of sensors, includ-
ing LiDAR and cameras [4]. Limited computing resource of AV makes it difficult to
adapt to different and complicated road traffic environments. Safety and Security in AVs
is the subject of this paper, which is a 15 HEC bachelor’s thesis in computer science.
Autonomous driving has gained popularity as smart cities become more common, and
continued research is being conducted on the topic.
To our knowledge, there is no in-depth study of state-of-the-art AVs solutions focused
on security and safety. The purpose of this thesis is to create a distinct resource that can
be used to compare and evaluate different AVs methods. Additionally, it aims to iden-
tify potential research opportunities for advancing the field by conducting a systematic
literature review of the most up-to-date AVs methods that have been published.

1.1 Background
There is considerable interest in autonomous driving due to the rapid development of
intelligent vehicles like private vehicles, taxis, and buses [3]. In order to develop faster,
more reliable, and safer traffic, Connected Autonomous Vehicles (CAVs) combine AVs
with Connected Vehicles (CVs) [5]. Developing CAV solutions that are AI-based plays
a crucial role in ensuring sustainable cities [5]. A CAV must meet stringent security,
safety, and reliability requirements due to convergence [5]. Increasing automation and
connectivity are standard features of vehicles in practice [5]. As vehicles become more
automated, they will rely more on sensor-based technologies and will be less reliant on
their drivers [5]. As humans develop autonomous transportation systems, CAVs will aid
them in achieving safety, and efficiency. A successful attack on one CAV, however, might
have significant implications for other CAVs and infrastructures due to CAVs’ intercon-
nectedness, which makes them vulnerable to attacks [6].
Cyberattacks can take place at three levels: application, network, and system levels [7]. A
Vehicle-To-Infrastructure (V2I) attack is one that can significantly impact the operation of
a specific application. As a result of these attacks, the vehicle stream can be temporarily
unstable or can experience severe collisions in extreme cases [7]. The next level of attack
is at the network level. In network-level attacks, an adversary intercepts communication
between vehicles in the platoon using the V2V communication medium. Collisions or
disruptions of vehicle stability can occur as a result of these attacks [7]. Lastly, an insider

1
attack can be conducted by physically accessing the CAVs, the software installed in the
CAVs, or the On-Board Software (OBS) port. As a result, an adversary who gains physi-
cal access can also steal, manipulate, and send fake commands, in addition to stealing the
data arriving in real-time [7].
As a result of mixing the technologies of sensor-based AVs with communication-
based CVs, CAVs will significantly improve safety, reduce costs, emissions, and en-
ergy consumption, and change how they are operated now by combining sensors with
communication-based CVs [5]. As vehicles become more connected and automated, the
level of connectivity will increase [5]. CAVs, on the other hand, reduce drivers’ respon-
sibility for managing the vehicle; increased automation exacerbates the security risk by
enhancing the possibility of adversaries initiating successful attacks [5]. Security risks are
evidently high with CAVs [5]. There has been much effort spent identifying vulnerabili-
ties in antivirus and CV software, respectively, and proposing mitigation techniques, but
it is still lacking comprehensive and in-depth research to understand how cyber-attacks
can undermine the physical operation and performance of CAVs by exploiting CAV vul-
nerabilities [5]. AVs offer several advantages, such as decreasing traffic congestion and
minimizing road accidents [3]. Ensuring vehicle safety is of utmost importance, and the
onboard controller plays a crucial role in achieving this goal. It assesses instructions com-
puted remotely from the cloud and can override them if needed to maintain the vehicle’s
safety. Although autonomous driving is a highly promising technology of this century,
it faces several challenges, with security being the most significant one [3]. The term
"security" for a self-driving vehicle usually pertains to the safety measures applied to its
sensory apparatus, operating software, management system, and its Vehicle to Everything
(V2X) connectivity, as well as the security of its roadside assistance systems [3]. Thus,
AVs require real-time information about their surroundings in order to plan safer and more
efficient paths. There are onboard sensors in AVs, such as LiDAR and cameras.

1.2 Related work


Parekh and Poddar conducted a study in 2022 [8]. In their study, they compared the
different technologies and approaches proposed. The researchers carried out a compre-
hensive analysis of the ongoing research and development in various facets of autonomous
vehicles. This included areas such as detecting the environment, identifying pedestrians,
plotting the course, controlling movement, and ensuring the cybersecurity of the vehicle.
Additionally, they stated that autonomous cars need to demonstrate tremendous accuracy
in how they solve these problems and gain public trust before becoming fully autonomous
[8]. In addition, They scrutinized the additional fields and technologies necessary for
constructing a self-driving vehicle and conducted an analysis of pertinent academic stud-
ies. Additionally, they discuss aspects of safety, path-planning algorithms, security, and
privacy. According to their findings, Level 3 vehicles are commercially viable, and au-
tonomous vehicles are the future [8]. A review approach has been used in this study, and
both safety and security aspects have been reviewed, but the study focuses on safety rather
than security since security has been briefly explained.
Alanazi conducted a study in 2023 [9]. The goal of Alanazi’s study was to examine
current traffic management strategies that use AVs and CVs to improve road safety and
promote safe travel [9]. Moreover, analyzing the results and goals attained after summa-
rizing these strategies was very enlightening. In the most prestigious libraries, Alanazi
found peer-reviewed publications published between 2012 and 2022 [9]. Following that,
100 primary studies were identified, and the selected literature was systematically ana-

2
lyzed. The results indicate that four main types of approaches can achieve driving objec-
tives, such as efficiency, safety, ecological responsibility, and passenger comfort, includ-
ing rule-based, optimization, hybrid, and machine-learning procedures. By conducting
thorough analyses, they were able to identify a variety of features, limitations, and per-
spectives related to the current solutions. It has been stated that rule-based approaches
represented 34 percent of the papers selected, followed by optimization techniques at 39
percent, hybrid methodologies at 13 percent, and machine learning techniques at 14 per-
cent [9]. The study findings assessed the effectiveness of the recommended approaches,
their safety, their environmental impact, and their passenger ease, and the study published
its findings. Approximately 95 percent of the selected articles supported their theories
using numerical tests, mathematics, simulators, and mathematical modeling, while 5 per-
cent used real cars, toy vehicles, or field tests [9]. Traffic management strategies were the
focus of the study.
Sheik and Maple conducted a study in 2019 [10]. Their research highlights crucial
challenges that need to be resolved to ensure the safety of cloud-assisted CAVs.These
challenges include developing security measures that can adapt to complex and constantly
changing environments, detecting emerging threats and attacks, and identifying research
priorities for immediate action. According to their study, cloud-assisted CAVs must meet
five key security requirements: Confidentiality, Integrity and Availability, Authenticity
and Trustworthiness, Auditability, and Safety. To reach their goal, they have conducted
an SLR to determine the range of cyber threats to automobiles. Therefore, attack tax-
onomies are used in threat analysis. Finally, they analyzed the taxonomy and provided
a foundation for future research on countermeasures. Next, it’s important to note that
CAVs may encounter different types of risks when interacting with connected infrastruc-
tures. Data processing and timely decision-making are becoming more difficult as ECUs,
sensors, and actuators multiply. Whenever data has a direct impact on key safety-critical
operations, this issue becomes critical [10]. CAV systems must comply with stringent
security requirements to prevent compromise. Connected automotive ecosystems also in-
clude multiple components that support future mobility. To enable cloud-assisted CAVs
to be fully autonomous, roadside units, edge computing capabilities, vehicle computa-
tion capabilities, and communications systems must all be improved. Despite this, ITS
has been hindered by security challenges, liability issues, and standardization. Security
requirements for vehicular applications are analyzed with consideration to secure life cy-
cle management. However, there are likely added new contributions of state-of-the-art
solutions since the review was published four years ago as new research continues to be
published in this area.
In 2020, Jiang and Zhang conducted a study in which they proposed a CT-AKA pro-
tocol that integrates passwords, biometrics, and smart cards to ensure secure access to
both cloud and AV services [11]. They have pointed out that to achieve three-factor au-
thentication without leaking the biometric information of users, three typical biometric
encryption approaches, including fuzzy vault, fuzzy commitment, and fuzzy extractor,
are combined. Consequently, they have evaluated CT-AKA’s security properties and ef-
ficiency, which show that it provides high-level security at reasonable computation and
communication costs. Their evaluation has shown that for achieving AKA among AVs,
the cloud, and users in a CAV system, a cloud-centric 3FAKA protocol is required. To
achieve three-factor authentication (password, smart card, and biometric) while main-
taining the privacy of the user’s identity and biometrics, CT-AKA unifies three typical
approaches to biometric privacy protection (fuzzy vault, fuzzy commitment, and fuzzy
extractor) [11]. Secure communication channels between the cloud, the user, and the AV

3
are established through mutual authentication and key agreement, preventing attackers
from maliciously controlling AVs. Additionally, they have been shown to be resilient to
the compromise of ephemeral security parameters when communicating between users
and the cloud.
Articles in the last two paragraphs emphasize security and safety [10] [11]. Neverthe-
less, they are outdated. On top of these related works, through an analysis, this thesis aims
to uncover the latest developments in AVs technology, its effects, methods of addressing
issues, future trends, possible opportunities, and any gaps in the literature.

1.3 Problem formulation


In the age of autonomous driving, advanced sensors, such as LiDAR, RADAR, Cam-
eras, and other advanced technologies are revolutionizing the automotive industry [12].
AVs have emerged as a promising technology with the potential to revolutionize trans-
portation systems. However, ensuring their safety and security remains a critical chal-
lenge that must be addressed before widespread adoption can be achieved. The problem
at hand is the need to comprehensively understand the safety and security aspects of AVs,
including identifying the challenges and vulnerabilities they face and developing effective
mitigation strategies. An SLR and consolidation of existing knowledge are necessary to
address these safety and security challenges. The purpose of this thesis is to conduct a
comprehensive SLR to determine how safety and security are currently being dealt with
in AVs. It involves recognizing the research gaps as well as understanding the key themes,
methodologies, and findings. In this thesis, a critical systematic literature review of the
state-of-the-art on AVs is presented for practitioners and researchers alike, highlighting
the advancement of safety and security aspects of AVs, their effects, strategies for address-
ing issues, and any gaps in the literature to give practitioners and researchers a perspective
on them. These obstacles have led to the research questions presented in Table 2.1 that
need to be addressed.

1.4 Motivation
Our society is experiencing an increase in technology, both in prototype vehicles as
well as in commercial vehicles. By enhancing the existing state-of-the-art perception
techniques, accidents can be reduced, and lives can be saved. In addition, mobility can be
increased for disabled and elderly people. Emissions can be reduced, and the infrastruc-
ture can be used more efficiently. Since AV technologies are immune to human mistakes
like a distraction, exhaustion, and emotional driving, which are responsible for roughly 94
percent of accidents, according to a statistics survey conducted by the National Highway
Traffic Safety Administration (NHTSA), it is one of the major motivations for speeding
up their advancement [13].
By reviewing state-of-the-art AVs methods, we aim to develop a unique resource that
enables comparison and consideration of these methods and identifies potential research
areas for advancing the field. Therefore, identifying AVs that are currently available for
this use case provides important safety and security considerations and information. This
thesis also investigates the role safety and security play in AVs’ technological develop-
ment, the outcomes of such development, strategies for addressing issues, and research
gaps. Lastly, this study provides useful guidance for future research to ensure that AVs
are safe and secure.

4
1.5 Results
By conducting an SLR of published state-of-the-art AVs methods, this thesis provides
a unique resource for comparison and consideration of AVs methods as well as identifies
potential areas for research in the field. By conducting automated searches, we iden-
tify 283 studies and reviewed 24 selected articles in depth according to our predefined
methodology. An analysis of 24 selected articles published between 2019 and 2022 was
conducted as part of the SLR. As a result of our findings, the field of AI and automated
vehicles will be impacted significantly. In light of our findings, we can summarize the
current state of knowledge regarding autonomous vehicle safety, security, and stability.
Several types of testing were used to evaluate the selected articles, including simulations,
real-life experiments, and physical tests. Despite the excellent results, we identified sig-
nificant limitations of the articles, such as limitations in the data sets, analyses of unusual
events, and verification methods. As a final step, the purpose, or main contribution, of
the studies was analyzed to identify areas of concern that were being addressed by the
researchers. This thesis aims to help developers and software architects choose the right
AV solution. It also provides guidance for researchers who want to conduct additional
research based on the results.

1.6 Scope/Limitation
This thesis discusses safety and security in AVs. Thus, the SLR excluded the other
forms of actuators, complex algorithms, machine learning systems, and powerful pro-
cessors to run the software. The focus of the study is primarily on sensors, safety, and
security. Therefore, other factors were less considered. This project was also limited by
the age of the literature included in its review. In this study, we focus on recent literature,
no more than four years old (2019-2022). This means that articles published before the
specified date were not considered. Additionally, gray literature and surveys were ex-
cluded from this study. Lastly, ACM, IEEE, Scopus, and ScienceDirect are the only four
databases used in this study as primary sources.

1.7 Target group


This thesis could benefit software developers and software architects working on con-
nected autonomous vehicle systems that implement "AVs." Specifically, researchers can
use this study to gain insight into the technological development of AVs and how it has
affected the industry. In addition, this study could serve as a valuable resource for com-
paring different approaches to AVs, evaluating their security and safety, and making in-
formed, deliberate decisions. Using this review, researchers can get a better understand-
ing of recent publications on this topic, identifying open problems that require further
research.

5
1.8 Outline
The format of the paper is as follows. Chapter 2 describes how the research method-
ology was developed and implemented in this study. Further considerations are discussed
regarding reliability, validity, and ethics. Chapter 3 describes AVs methods and tech-
niques and presents the theoretical background. A summary chart and descriptive text
can be found in Chapter 4, which presents the study’s results. As well as analyzing the
findings’ generalizability and validity, Chapter 5 consists of conclusions and possible fu-
ture directions.

6
2 Method
This section provides detailed and comprehensive data descriptions of the scientific
methods used in this study. In particular, Section 2.1 presents an overview of the research
methodology used in this thesis by introducing it. Additionally, it gives an overview of
how the project is carried out. Section 2.1.3 presents an overview of the search strategy.
So, it offers insight into which databases and search terms are used to find the articles. Fol-
lowing the inclusion and exclusion criteria, the selection process of articles is discussed in
Section 2.1.4. In Section 2.2.2, you find information about how a final selection is made
as well as what the purpose of the article is (i.e., which RQ it is related to). Discussions
of reliability, validity, and ethics follow in Sections 2.3 and 2.4.

2.1 Systematic Literature Review


An analysis of the literature that describes a specific research question, topic area,
or phenomenon of interest is known as an SLR (also known as a systematic literature
review) [14]. The study contributing to a review is referred to as a primary study, while
the review is classified as a secondary study. Researchers require a review when they
want to summarize all existing information about a certain phenomenon thoroughly and
unbiasedly [14]. A study may be undertaken as a prelude to further research to develop
a more general understanding of a phenomenon than individual studies can achieve. An
SLR is the first step in most research projects. The primary purpose of a review is to
synthesize existing work in a fair and reasonable manner [14]. It is necessary to follow a
predetermined search strategy when conducting reviews, for instance. The search strategy
must allow for an assessment of its effectiveness, to assess the completeness of the search
[14]. As part of a review, researchers should seek to identify and report both evidence that
does not support their preferred research hypothesis as well as evidence that does support
it [14].
This thesis aims to provide a knowledge base of cutting-edge solutions, their impact
on safety and security, and open problems concerning AVs and CAVs. Therefore, the goal
of this research methodology SLR is to summarize the current state-of-the-art solutions
in the area and provide a background for future research. Hence, an SLR is chosen to
conduct this project as it is considered, in this case, to be the most feasible and effective
method. General definitions of systematic literature reviews include mapping, identifying,
and evaluating research on a specific topic [14]. In this study, the project is divided into
three phases, with each phase containing a specific subset of activities, following the
iterative methodology described by Kitchenham and Charters, and Xiao et al. [14], [15].
An overall review process is demonstrated in Figure 2.1, where the planning phase
precedes the review. It is crucial to understand that these phases and activities are con-
stantly developing. Any phase or activity can be returned to whenever needed by the
researcher. Presenting the review is the third and current phase, which involves how the
results should be communicated.

7
Figure 2.1: Describes the methodology and activities associated with the systematic liter-
ature review.

Phase one of the process involves analyzing whether a review is necessary, as shown
in Figure 2.1. These results are outlined in Chapter 1. One of the most important tasks in
the first phase is creating a review protocol. The review protocol defines the methods for
conducting the review according to a defined plan. A study with this approach is more
reliable and reduces the risk of researcher bias. As described in the following sections,
the reviewing protocol describes in detail how the activities in the remaining two phases
are being carried out in the paper’s three following sections.

2.1.1 Planning the review


The goal of this activity is to identify the need for an SLR, which is already described
(see Section 1.4), the goal, and the research questions for developing a review protocol
(see Section 2.1.2), and defining the search strategy (see Section 2.1.3).

2.1.2 Specify goal and research questions


An essential part of any systematic literature review is the definition of research ques-
tions, which guide the selection of primary studies and data collection. To accomplish
this, we use the Goal-Question-Metric (GQM) framework, which is a systematic approach
to measuring outcomes [16]. To apply the GQM model, a goal must be specified (e.g.,
purpose, object, issue, and viewpoint). Several questions are then formulated as a result
of refining the goal. In order to conduct SLR, a goal needs to be defined using GQM. Af-
ter refining the goal, several research questions are formulated, which then provide means
to answer the goal. By analyzing the responses to these questions, it can be determined
whether the goals are being accomplished or not. This is the goal of our SLR:

• Purpose: Analyze the current state of knowledge in AVs to determine what addi-
tional research and development efforts are needed.

• Issue: No in-depth study of state-of-the-art AV solutions focused on security and


safety.

• Object: Review safety and security measurements used in autonomous vehicles.

• Viewpoint: From a researcher’s, software developer’s, and architecture’s viewpoint.

We formulate the following research questions based on the aforementioned goals that
are presented in Table 2.1.

8
Table 2.1: Research Questions
Id Question
RQ1 What types of methods or techniques have been proposed in the existing litera-
ture?
RQ2 What is the evidence used for demonstrating the results?
RQ3 What are the limitations of the existing methods?

RQ1 and RQ2 describe the current state of research on autonomous vehicle safety and
security, specifically how the most recent methods or techniques are evaluated and how
the most recent methods or techniques are proposed. To provide directions for further
research, RQ3 identifies gaps in current research that can lead to insight into safety and
security issues in the industry and identify potential open problems.

2.1.3 Search strategy


A search strategy should specify how and where to conduct searches in order to
achieve transparency and replicability. Several electronic databases are used in the search
process: IEEE Xplore, ACM Digital Library, ScienceDirect, Scopus, and Google Scholar.
A broad search result is achieved by including Google Scholar as well as the first four
databases, as they are relevant to the topic. Initial exploratory searches are conducted in
order to identify the research topic’s search words. During the search terms selection pro-
cess, it is important to be able to select words that effectively target the research questions.
The best results are generally obtained with relatively simple search strings during our ini-
tial exploratory searches. In general, OR operators are used when combining words from
the same concept, whereas AND operators are used when combining words from different
concepts. The search strings are created by testing various combinations of words against
each database in order to identify which combination yields the most accurate results. The
NOT operator is also used to obtain words common in non-relevant studies and include
them in the search strings during the test searches.
Table 2.2 shows the search strings that are used in the databases. Searches are re-
stricted to studies conducted between 2019 and 2022.

Table 2.2: Search Strings


Database Search String
IEEE Xplore ("Abstract":"autonomous vehicle") AND ("Abstract":"security") OR ("Ab-
stract":"safety") AND ("Abstract":"cloud-assisted") OR ("Abstract":"cloud con-
trol")
ACM [Abstract: "autonomous driving"] OR [Abstract: "autonomous vehicle"] OR
[[Abstract: "autonomous vehicles"] AND [Abstract: "security"]] OR [[Abstract:
"safety"] AND [Abstract: "cloud-assisted"]] OR [Abstract: "cloud control"]
AND [E-Publication Date: (01/01/2019 TO 12/31/2022)]
Scopus ABS ( "autonomous vehicle" AND "security" OR "safety" AND "cloud" ) AND
PUBYEAR > 2018 AND PUBYEAR < 2024 AND ( LIMIT-TO ( DOCTYPE ,
"ar" ) )
ScienceDirect ("Autonomous vehicle") AND ("security") OR ("safety") AND ("cloud-
assisted") OR ("cloud control")

9
2.1.4 Inclusion and exclusion criteria
A list of criteria for inclusion and exclusion is used for selecting primary studies.
Using these questions to determine whether to include or exclude an article from a thesis
project helps make decisions about its inclusion in the project. Our criteria for inclusion
and exclusion are listed in Table 2.3.

Table 2.3: Inclusion and Exclusion


Type Description
Inclusion The primary study is limited to just articles (Journals)
The primary study is limited to the articles related to Autonomous driving / Au-
tonomous vehicles
The primary study is limited to articles related to Safety and Security for Au-
tonomous Vehicles.
Exclusion The studies that are categorized as secondary studies such as surveys, and SLRs.
The studies that are categorized as a master’s thesis or doctoral dissertation (to
ensure a minimum level of quality).
The studies that are categorized as conference papers and workshops.
The studies that are not related to or answer any research question.
The studies that are not written in the English language.
The books and gray literature.

2.2 Conducting the review


This activity of the SLR is to perform the search strategy described in the planning
activity. The steps involved in conducting the review are primary studies (in our case
limited to articles) selection presented in Section 2.2.1, data collection and extraction
described in Section 2.2.2.

2.2.1 Primary Studies Selection


In accordance with the criteria used to pick the electronic databases for the study,
we conduct a search using the search string shown in Table 2.2. Then, to discover the
pertinent studies, we filter the retrieved studies using various levels. We first check the
titles of the retrieved publications and eliminate any duplicates discovered across several
databases. The remaining papers’ abstracts are next scrutinized, and the ones that need
additional analysis are chosen.
As illustrated in Figure 2.2, we describe the search process and identify the number of
primary studies at each stage. Collaboratively, two researchers identify relevant studies by
quickly scanning titles, abstracts, and keywords of publications (plus the conclusion when
extracting information from the abstract is difficult). Once the inclusion and exclusion
criteria are set, the next stage is the second selection process. In the selected studies,
we find a duplication. Based on the research we conduct, we define two inclusion and
exclusion criteria. Therefore, the first inclusion and exclusion criteria are established for
identifying and eliminating irrelevant articles. It is common for a study to be discarded
since it is not relevant to the review at hand. The study includes a total of 61 studies that
meet the initial criteria for inclusion and exclusion. After analyzing the remaining primary
studies thoroughly, we ensure that the studies we obtain are relevant. After applying the
second inclusion criteria and exclusion criteria, which are designed to find articles that

10
are specifically about the security and safety of AVs, we select 24 studies from the period
2019–2022 to be considered in our study.

Figure 2.2: An overview of our search process and its results.

2.2.2 Data collection and extraction


Creating a data extraction strategy should be part of the review protocol before the
review begins. Consequently, a data extraction form is developed to reduce bias and
ensure consistent data extraction for the research questions. An overview of the data
extraction form can be found in Table 2.4. Detailed analyses are conducted on all 24
primary studies remaining, and applicable data are gathered from these studies. After the
data extraction step, we correlate and record the extracted information using spreadsheets.
We focus on extracting the following data items from each study in this SLR. A set of
selected studies in Table 4.5 are analyzed in Table 2.4 to obtain the corresponding data.
Using the data collected in the data extraction step, we synthesize the information to be
appropriate for answering the research questions. In Section 4, we explain the rationale
for analyzing the extracted data and the methodology for obtaining them.

Table 2.4: Data Collection


Extracted data Relevant RQ
Author(s) Study overview
Title Study overview
Year Study overview
Publication types Study overview
Methodology RQ1, RQ3
Implementation and performance RQ1, RQ3
Types of study and evaluation RQ2

11
As mentioned previously, we select studies from four databases: Science Direct,
ACM, IEEE, and Scopus. Most of the selected studies come from Scopus (10 selected
articles), approximately 41.7%. Science Direct contributes the least, with 1 article, which
represents 4.2%. Six articles are selected as part of ACM searches, which contribute
25.0%. With seven selected articles and 29.2%, IEEE is the second largest contributor. In
Figure 2.3, the distribution of studies is visualized by the publisher.

Figure 2.3: Distribution of selected studies by publisher.

The selected studies cover the period from 2019 to 2022 since this review only exam-
ines studies published between those dates. The distribution of the studies over this time
period is shown in Figure 2.4. In 2020, there is a noticeable dip in studies, but between
2021 and 2022, there is a fairly even distribution. There is a small drop in 2019.

12
Figure 2.4: The distribution of selected studies each year.

2.3 Reliability and Validity


In general, validity involves whether the conclusions made from the results of the
research are valid and trustworthy. That is, whether the method and data support the
conclusions. The reliability of a research study is its ability to be replicated by others and
reproduce the results. Research must, therefore, produce reliable and valid results.
The validity of an observation can be affected by a variety of factors. Starting with
construct validity, this section discusses the three most significant ones. Readers interpret
the theoretical constructs of the paper according to their construct validity. AVs and CAVs
are widely used terms in this report to reduce problems with construct validity. These
terms are primarily identified through ongoing research. It is still possible that a non-
intended interpretation of the words or definitions can affect the validity of the report.
Problems with internal validity are the second type.
The internal validity of a study is determined by how well the data collected supports
the conclusions and results. Biases can negatively affect the internal validity of the project,
according to the SLR. We use a predefined inclusion criteria checklist (made into an Excel
file) to minimize the risk of bias in selecting studies for inclusion in the review. The
reviewers use this checklist to determine whether to include or exclude a study. Secondly,
bias can be transmitted to the current review through the literature included in the review.
The quality assessment checklist is used to assess each study to reduce the chance of
bias. Last but not least, external validity examines whether the results are reasonable in
their generality. The study’s objectives and research questions are intended to address
a feasible area to reduce external validity problems. In the review, articles are selected
using a range of databases and a rigorous selection process to obtain a representative
sample. The limitation of resources, however, may result in not including enough articles
to generalize the results. A study’s reliability refers to its ability to produce the same
results when replicated by other researchers. The paper includes policies and strategies

13
for searching, selecting, and extracting data to reduce reliability problems. To ensure
greater reliability, all stages and results of the selection process are carefully documented.
By assessing the quality of the research methods used and the relevance of the studies,
we determine the relevance of the research and the rigorousness of the study. By obtaining
insight into potential differences, and supporting the interpretation of the results, this
assessment helps limit bias in the conduct of the SLR. As part of the quality assessment,
three criteria are applied, based on Kitchenham and Charters’ and Xiao’s guidelines [14,
15]. Three options are available in the scoring procedure: "1 = Included," "0 = Excluded,"
or "24 = shows the final selections." Moreover, when it comes to the Relevance, validation,
and Coverage aspects, the following questions are being answered.

• Does this systematic literature review include all relevant studies?


This SLR focuses on collecting only those studies that report adequate infor-
mation to address the research questions. In order to assess quality, the first two
researchers review each study independently based on the inclusion and exclusion
criteria they define.

• Do all relevant studies appear in the systematic literature review?


To guarantee that no significant study is overlooked in this SLR, two researchers
independently review each study multiple times. After screening titles, abstracts,
keywords, and conclusions, the entire list of relevant studies is searched. After
obtaining the full text, in-depth analyses are conducted.

• Is the information and data collected from the collected studies sufficient?
An analysis of primary studies is presented in this SLR to determine if the infor-
mation contained in them is sufficient to answer targeted research questions. As part
of this validation assessment, we develop questions such as: Is the technique/tool
clearly defined? Does the technique undergo a rigorous evaluation? Is there any
value to the industry or academia in the study?

2.4 Ethical considerations


Neither interviews nor surveys are conducted in this study, so no sensitive data is gath-
ered. Therefore, confidentiality and participation consent are not relevant considerations.
A risk, however, exists related to the sampling of the studies. Findings found in gray
literature or preprints are discarded since all included studies are peer-reviewed. In addi-
tion, the study includes only studies from 2019 to 2022 and only four databases are used,
reducing its power. By having these limitations, the field is at risk of missing valuable
contributions. The benefits of the study, however, are considered superior because the
risk does not endanger anyone’s safety or health.

14
3 Theoretical Background
The purpose of this chapter is to provide a brief theoretical overview of the topic
under consideration. A total of six subsections are included in this chapter. The first step
in understanding AVs is providing a brief overview of their types and potential benefits.
As we move forward, sensors, LiDAR, cameras, and other key technologies used in AVs
are reviewed. As we move forward, we discuss the safety concerns associated with AVs.
Following this, an examination of the security concept for AVs is presented. After that, we
will discuss the various types of communication used by AVs. As a final note, Mapping,
and Localization are reviewed.

3.1 Autonomous Vehicles


A vehicle is one of the most commonly used machines today, and mechanical engi-
neering was once the domain of most daily-use machines. These devices, however, have
become smarter, more innovative, and web-connected thanks to the IoT and embedded
systems. As technology has developed, traditional vehicles have been transformed into
fully functional, intelligent machines able to provide superior functionality along with
ease of use. A foundation for intelligent vehicles lies in advances in automation and op-
portunities in cutting-edge technology. With an emphasis on comfort and safety, these
intelligent vehicles will be highly sought after in the future. Aside from sensing the envi-
ronment and connecting to the Internet, these vehicles navigate automatically, make quick
decisions, ensure pedestrian and passenger safety, park, and abide by traffic guidelines.
Vehicles that operate autonomously are referred to as AVs. As far as developing intelli-
gent vehicles goes, they are currently regarded as the best. Researchers and developers
of AVs are motivated primarily by the need for increased driving safety, the increasing
population, which also leads to a higher number of vehicles on the road, the expansion
of infrastructure, the convenience of depending on machines for duties such as driving,
coupled with the necessity to efficiently organize resources and time. [17].
Automated vehicles were first conceptualized by General Motors in 1939, which was
the first to exhibit the concept [18]. Later, in the 1950s, Radio Corporation of America
Sarnoff Laboratory and General Motors jointly initiated the initial phase of R&D [18]. In
the US, Europe, and Japan between 1964 and 2003, several other R&D programs were
carried out by different government agencies and academic institutions in order to develop
automated buses and trucks, super-smart vehicle systems, and video image processing for
recognizing driving scenes [18]. In 2021, Volvo brought its unsupervised automated vehi-
cle to market after launching its autonomous test vehicle in 2016 [18]. Since 2009, Google
has been gradually moving towards fully automated vehicles, and by 2017 the company’s
fleet of AVs, WAYMO, had driven three million miles throughout four states (USA) [18].
Around 90 percent of Tesla’s cars were capable of making self-driving decisions in 2014
[18]. A self-driving feature is now standard on all Tesla models. The first AVs reached
the market in 2020, including those from Audi, BMW, Mercedes-Benz, and Nissan [18].
A driver must simultaneously work on localization, perception, planning, controlling,
and managing. It is essential to acquire information before localization and perception
can be achieved. AVs can definitely be defined as vehicles that have all of these functions,
including information acquisition [18]. A CAV is one that communicates with other in-
frastructures to collect information or negotiate maneuvers [18]. Whenever a manually
driven vehicle, whether it is automated or manual, communicates with other infrastruc-
tures in order to collect information or negotiate maneuvers, it is referred to as a CV [18].
Private and commercial vehicles can operate with AVs. It is believed that autonomous pri-

15
vate cars are more convenient and flexible than conventional private cars because they can
be used by all family members simultaneously. A commercial automated vehicle could
be used as a taxi, a bus, or as a freight vehicle.
Mobility is predicted to be safer, sustainable, and more convenient in the future when
autonomous driving technology and capabilities are available, as the autonomous driving
system of an AV will replace the human driver for a variety of dynamic driving tasks
on some or all highways and environments [18]. AVs can perform five basic operational
functions through their ADS when they are capable of replacing human drivers – local-
ization, perception, planning, control, and management [18]. Thus, AVs are expected
to possess certain technological capabilities, advantages, or advantages over conventional
vehicles. In addition, platooning, fuel efficiency, Eco-driving, ACC, crash avoidance, lane
keeping, lane changing, valet parking and park assistance pilots, identification of traffic
signs and signals, detection of cyclists and pedestrians, and intersection maneuverability
are among them.
Automated systems are classified into six levels (0–5) by the SAE [19]. Nowadays,
most vehicles are classified as level 1, which means that everything related to safety is
controlled by the human driver [19]. There should, however, be at least one essential
function supported by the vehicle (such as steering and acceleration or deceleration con-
trol) [19]. One example of ACC is ACC in cars. Some manufacturers, however, have
produced vehicles with level 2 automation, which are already available on the market.
There are several examples of this level of automation, including Tesla, Mercedes-Benz,
BMW, and Volvo. Vehicles with higher levels of performance are not as readily available
as those with lower levels. Audi A8, for example, is the only level 3 vehicle available
on the market. However, other automakers have been developing it [19]. Each of the six
levels is summarized in Figure 3.5.

16
Figure 3.5: The classification of automation level according to the Society of Automotive
Engineers (SAE)

17
Increasing usage of smartphones, drunk driving, and speeding all contribute to drivers
being distracted behind the wheel. Human lives are lost, and injuries are suffered as a
result. AVs aim to minimize road accidents and the resulting traffic disruptions. It has
been proven that AVs are capable of traveling on any road infrastructure [20]. AVs must
be explicitly programmed to determine their evasive behavior depending on the object
they encounter and humans comprehend objects and traffic more easily while driving.
An appropriate countermeasure must be identified by the vehicle once it understands the
situation at hand [20]. A crucial question to ask is whether human life loss should be
prioritized more on the basis of the safety of vehicle occupants or pedestrians if death
is inevitable. It can be extremely difficult to adopt an innovative technology when such
liabilities are present.

3.2 AV’s Technologies


The conversion of a conventional vehicle into an autonomous vehicle can be achieved
by adding some additional components, including sensors, which give the vehicle a sense
of its environment and allows it to control its dynamics. There are four main stages in the
protocol architecture discussed below, enabling a Level 5 fully autonomous vehicle with
all users as passengers [21].
Perception involves detecting their own position based on their surroundings and sens-
ing the surrounding AVs through various sensors. This stage of development includes
RADAR, LiDAR, cameras, RTK, and others [21]. In turn, recognition modules process
the data collected from these sensors. The AV involves several components, including
an ADAF, a control system, LDWS, TSR, UOR, as well as a VPL [21]. As soon as this
information is processed, it is merged and passed on to the decision-making and planning
stage.
Decision and planning is the next stage, which utilizes the data collected during per-
ception to decide, plan, and control the AV’s motion [21]. During this stage, plans are
made, actions are predicted, obstacles are dodged, and decisions are made. In addition to
current and past data, the decision is also based on information provided by the user (such
as real-time map information, traffic patterns, traffic details, etc.) [21]. A data log module
may be available for storing information and errors.
Next, we come to the control stage. Control modules are responsible for steering,
braking, accelerating, and other physical operations of an AV [21]. They receive informa-
tion from decision and planning modules.
The chassis is in the final stage. At this stage, the chassis mechanical components,
such as accelerator pedals, brake pedals, steering wheel motors, and gear motors, are
interfaced with the computer [21]. The control module signals to and controls all of these
components.
As AVs take on increasingly complex tasks, sensors are critical to their ability to
perceive their environment and make decisions based on it. There are many sensors that
AVs use, including cameras, LiDAR, radar, ultrasonic sensors, Sensor fusion, and GPS.

• Ultrasonic Sensors:
Short-distance parking sensors rely on ultrasonic technology [22]. Most of them
can be located on the bumpers of the vehicle. Unlike human hearing, ultrasound
sensors use sound waves above 20 kHz [22]. In ultrasonic sensors, the sensor is
oriented toward an object, which is used to calculate the distance between the sen-
sor and that object. Ultrasonic sensors measure distance by sending audible signals

18
when the beacon transmits. Upon impacting the obstacle, the signal is reflected and
spreads toward the sensor as a result. By measuring the time between transmitted
and reflected waves, the sensor calculates the distance between itself and the object.
The distance of a signal can be measured based on its minimum length. This mea-
surement is dependent on the length of the transmitted signal [22]. A narrow range
of beam detection can be obtained through these directional sensors. To provide
a full FoV, multiple sensors are required [21]. The range error will be extreme if
there are multiple sensors working together, as they will influence each other. It is
generally possible to eliminate the echoes from other ultrasonic sensors in nearby
ranges by providing a unique signature or identification code. Short distances can
be measured with these sensors in AVs at slow speeds for short distances. It is used,
for instance, in SPAs and LDWSs [21]. The sensors also work satisfactorily even
in dusty environments, regardless of material (including colored materials) [21].
Ultrasonic sensors generate sound waves as their operating principle [22]. By
eliminating interference between the generated sound wave and the receiver, the
threshold for the receiver is set during the transmission of the sound wave. Depend-
ing on the distance achieved and the material’s reflection capability, the threshold
increases as time elapses from the beginning of the transmission [22].

• Radio Detection and Ranging:


Detecting objects around the vehicle, as well as identifying dangerous situa-
tions, are the functions of radars in cars. To alert or warn the driver of hazardous
situations, object detection, and hazardous situations detection can be used. It is
possible for an autonomous vehicle to interfere with braking or vehicle control at
higher levels of autonomy [22]. As well as detecting obstacles around a vehicle,
radar systems can also measure their relative speed. A radar sensor evaluates the
difference between the transmitted signal and the reflected signal received after
transmission [22].
The sensor radar calculates the distance by analyzing the variance between the
transmitted and reflected signals. To determine the distance of the detected object,
measuring the time elapsed and the speed of the sound wave spread is required.
A Doppler effect is used to determine the relative speed of detected objects with
respect to the vehicle [22]. Using the phase shift and frequency of the reflected
wave, it is possible to calculate the speed and direction of the detected object. There
are two bands of radar used by autonomous cars, 24 GHz and 77 GHz [22].
Modern vehicles use various frequency bands that can measure distances from
5 to 200 meters. These include 24, 60, 77, and 79 GHz [21]. AVs are measured by
comparing their transmitted and received signals to determine their distances from
objects. An AV’s RADAR uses an array of micro antennas to generate an array of
lobes which can improve range resolution and multiple target detection [21]. The
variation in Doppler shift can be used to accurately measure short-range targets
with mm-Wave RADAR due to its higher penetration and wider bandwidth [21].
As a result of their long wavelengths, mm-Wave radars are capable of detecting
rain, snow, fog, and low light despite rain, snow, and pollution. As a result, mm-
wave radars are capable of measuring relative velocity using the Doppler shift [21].
In addition to obstacle detection, pedestrian recognition, and vehicle recognition,
mm-Wave radars can be used for a wide variety of AV applications.

• Light Detection and Ranging:

19
A vehicle’s surroundings are sensed and understood by its LiDAR technology.
By using laser pulses, this technology creates 3-D maps of objects such as buildings,
roads, and other vehicles in the environment [23]. Safe navigation is then ensured
by combining this information with other data. Even though LiDAR is expensive
and has moving parts, high-level AVs use them to perceive their surroundings.
It is common for LiDAR and cameras to be combined in practice to comple-
ment one another. In comparison with LiDAR, a camera is inefficient at estimating
distances, while it is incapable of recognizing objects [23]. It is without a doubt
that precise physical and semantic information, in combination with map informa-
tion, will improve intention prediction [23]. Despite many years of development,
LiDAR-centric perception systems are mature from the perspective of model-based
algorithms, but this is changing with the advent of DL. There are several computa-
tionally friendly and explainable LiDAR data processing methods based on models.
As a result of data-driven DL methods, semantic information, which has been one
of the weakest points of traditional methods, has been shown to have extraordinary
capabilities [23].
In general, LiDAR work by scanning their FoV with laser beams [23]. This
is accomplished through a complex beam steering system. NIR wavelength laser
diodes emit the laser beam via amplitude-modulated laser diodes [23]. Using a
photo-detector, the scanner detects the returned signal from the laser beam after it
is reflected back by the environment. By filtering the signal and measuring the dif-
ferences between transmitted and received signals in relation to distance, fast elec-
tronics measure the distance between the transmitted and received signals. Based
on the difference between the sensor model and the actual sensor, the range can be
calculated. Through signal processing, surface materials as well as the state of the
milieu between transmitter and receiver, are compensated for their differences in
reflected energy variations. A LiDAR output includes a 3D point cloud correspond-
ing to the scanned surroundings and a color intensity corresponding to the reflected
laser energy [23].
The LiDAR can be divided into two types: the laser rangefinder systems and
the scanning systems [23]. Using a laser transmitter and a photo-detector, the laser
rangefinder illuminates the target using a modulated wave. After optical process-
ing and photoelectric conversion, the photo-detector generates the electronic signal
from the reflected photons. A laser beam is collimated and focused on a photo-
detector by optics. On the basis of the received signal, signal processing electronics
determine the distance between the laser source and the reflecting surface [23].
There are two spectra used by LiDAR: 905 nm and 1550 nm [21]. Modern Li-
DARs operate in the 1550 nm spectrum to minimize eye damage caused by the 905
nm spectrum [21]. Up to 200 meters is the maximum working distance of LiDAR
[21]. In addition to 2D and 3D LiDARs, there are solid-state LiDARs as well. An
ultra-high-speed mirror rotates with a single laser beam, creating a 2D LiDAR. By
placing multiple lasers on the pod, a 3D LiDAR is able to obtain a 3D image of the
environment. As of right now, 3D LiDAR produces reliable, accurate results with
an accuracy of a few centimeters by integrating 4–128 lasers that move horizontally
by 360 degrees and vertically by 20–45 degrees [21]. A solid-state LiDAR scans the
horizontal FoV several times by synchronizing the laser beam with a MEMS circuit
[21]. In spite of the fact that LiDAR is more accurate and 3D-aware than mm-Wave
radars, its performance suffers under adverse weather conditions like fog, snow,

20
or rain. Furthermore, the reflectivity of the object determines its operating range
detection.

• Cameras:
Vehicles with autonomous systems usually have cameras behind the windshield,
but they can also be installed elsewhere. Cameras used in AVs include CMOS and
CCDs [22]. Every pixel in a CMOS sensor converts light into voltage separately.
Pixel signals are measured and amplified by multiple transistors located near each
pixel. Data collection is performed on the whole chip in this arrangement, which
has the advantage of being cost-effective. This technique results in a chip rate that
is comparable to that of CMOS [22]. There is a significant difference in sensor ar-
chitecture caused by these different chip reading techniques. Sensors with CMOS
technology convert the charge of each pixel directly into electrical signals, which
leads to a reduction in sensitivity [22]. As far as CCDs are concerned, they measure
only the number of photons per pixel [22]. To get accurate color capture, it’s im-
portant to either use a color filter or a three-chip camera. There is a greater degree
of sensitivity with a CCD chip than with a CMOS chip [22].
It is possible to categorize car cameras in several different ways. When it
comes to classification, the camera’s location is the crucial factor [22]. Usually,
autonomous vehicles have sensors installed on their front or back. The Tesla car
manufacturer is an exception, which uses cameras to capture the surroundings on
the side [22]. Color also has its own classification, including black and white,
monochrome + one color, and RGB color. Further divisions can be made between
mono and stereo cameras. Most of the key features of a camera can be secured with
a black-and-white camera that captures only the brightness level of each pixel, Even
though the color of sensed environment can affect some of the camera’s functional-
ity [22]. Significant performance improvement can be achieved by adding at least
one color [22]. Red-sensitive pixels, for example, can improve the identification of
traffic signs. The use of stereo cameras is also important for 3D vision, which is
used to measure the distance between objects.
As a result of the wavelength of the device, AV cameras can be classified as
visible-light optics or IR optics [21]. Cameras use CCDs and CMOSs as image
sensors [21]. The camera can capture images up to 250 meters away, depending
on the quality of its lens [21]. RGB are the three bands of wavelengths used in
visible cameras, corresponding to the wavelength of the human eye, 400–780 nm.
To achieve the stereoscopic vision, two VIS cameras with known focal lengths are
utilized to generate depth information (D) [21]. Consequently, the RGBD camera
can leverage this capability to produce a three-dimensional representation of the
surroundings of the vehicle.
Passive IR sensors have a wavelength between 780 nm and 1 mm, which is the
wavelength of IR cameras [21]. With AVs, IR sensors control vision at peak illumi-
nation. This camera, In addition to BSD and side-view control, records accidents
and recognizes objects. It should be noted, however, that the camera’s performance
varies in bad weather conditions, including snow, fog, and variation in moment of
light. The primary benefit of a camera is its ability to capture and collect accurate
details about the texture, color patterns, and shape of the environment around it. As
a result of the narrow lens angle, the angle of observation is limited [21]. For this
reason, AVs feature multiple cameras to monitor their surroundings.

21
• Inertial Measurement Unit, Global Navigation Satellite System, and Global Posi-
tioning System:
In addition to helping the AV navigate, this technology determines the exact
location of the vehicle [21]. In GNSS, satellites orbit the Earth at regular intervals
to pinpoint a user’s location. The system maintains a record of the AV’s location,
velocity, and time. To function, it computes the Time of Flight (TOF) between the
signal emitted by the satellite and its reception. GPS coordinates are generally used
to determine the position of the AV [21]. GPS coordinates, typically having an
average accuracy of 3 meters and a standard deviation of 1 meter, are frequently
imprecise, resulting in location errors. Moreover, the accuracy of the GPS position
becomes even worse in urban environments, with errors ranging from 20 to 100
meters [21].
As an additional benefit, RTK systems can also be used in AVs to calculate
their precise position [21]. Moreover, DR and inertial positioning can be utilized
to locate and determine the direction of AVs [21]. The position of a vehicle can be
determined by using rotary sensors on its wheels using a technique known as odom-
etry [21]. The IMU utilizes data from inertia sensors, rotation sensors, and magnetic
field detectors, enabling the AV to identify incidents of slippage or sideways move-
ments. With the IMU combined with all the units, the measurement system can be
corrected for errors and should be able to increase its sampling speed. In spite of the
fact that the IMU cannot determine position error without the GNSS system, AVs
can use different sources of information to minimize errors and provide reliable po-
sition measurement, including RADAR, LiDAR, IMU, GNSS, UWB, and cameras.
To confirm and improve the position estimate of the AV, GPS can be combined with
techniques associated with IMUs, such as DR and inertial position [21].
A GNSS device provides a new and absolute position with every measurement,
and these positions are not conditioned on one another. Incremental sensors can
be used to estimate the vehicle’s initial position or to correct mistakes accumulated
over time [24]. In order to achieve robustness, GNSS must estimate the localiza-
tion error associated with each measurement, usually via a covariance. An accurate
GNSS system relies on several factors, including satellite signal quality, satellite
availability, and atmosphere signal distortion, as well as multi-path events and re-
flection of signals [24].
Using a 24-satellite cluster, GPS provides the precise position on Earth any-
where, at any time, and no matter what the weather is like [25]. With the use of this
technology, the exact location of the vehicle can be determined with a high level
of accuracy and precision. Four satellites must be in orbit at the same time for a
GPS receiver to determine a precise (x, y, z) position within 20 meters [25]. With
a DGPS, it is possible to minimize this error to less than two centimeters [25]. A
DGPS uses the same technology as GPS but has one drawback: obstacles (trees,
tunnels, buildings) can break the signal, resulting in vehicle guidance failure and
information loss. It is optimal to integrate GPS data with an inertial system in order
to improve this situation.
GPS is typically more accurate in areas with open terrains, such as highways
than in dead-reckoning positioning methods. It is possible, however, for the GPS
signal to be lost, posing two different scenarios. There are those short-term faults
that result in GPS signals being lost for less than one second, such as when buildings
obscure satellite signals in a city [25]. In this situation, steering wheel movement

22
can be abrupt and can cause undesirable maneuvering. In the second case, another
system becomes responsible if there has been a long-standing problem, for instance,
in a tunnel or in the canopy of a tree.
Lastly, GPS and INS have complementary properties that contribute to improv-
ing vehicle navigation [25]. The two systems maintain long-term stability and are
independent of external influences.

• Sensor Fusion:
Combining data from disparate sources so that coherent information is gener-
ated can be referred to as sensor fusion [26]. When these sources are combined,
the results are more accurate than if they are used separately. A combination of
different types of information makes this especially important. Having a camera
in an autonomous vehicle is important for cloning human vision, but LiDAR or
radar sensors are best for detecting the distance to obstacles. Since LiDAR data
and camera data complement each other, sensor fusion of the camera with LiDAR
is of great importance. A vehicle can improve its ability to measure the distance
of obstacles in its path or objects in its environment by utilizing both LiDAR and
radar information [26].
LiDAR is currently being used more often in autonomous vehicle development.
Using LiDAR and camera data for sensor fusion gives the best solution in terms of
the hardware complexity of the system, since only two types of sensors are required,
and the two sensors complement each other for system coverage [26]. As a result
of a combination of image data and 3D point cloud data, the 3D box hypothesis and
their confidence are predicted. The PointFusion network offers a novel solution to
this problem [26]. 3D object detection can be accomplished using this method [26].
For proper vehicle handling and safety of AVs, they need access to real-time
and precise information about the vehicle’s position, status, weight, stability, veloc-
ity, and other relevant parameters. In order to do so, the AVs use various sensors
to acquire this information. Through sensor fusion, data obtained from different
sensors are combined to produce coherent information [21]. A synthesis action is
performed on raw data obtained from complementary sources through the use of
the process [21]. By combining all the relevant information obtained from the dif-
ferent sensors, sensor fusion enables the AV to better understand its surroundings.
A variety of algorithms are used in AVs for the fusion process, including KFs and
Bayesian filters [21]. Given their utilization in fields such as RADAR tracking,
GPS guidance, and optical distance measurement, Kalman Filter (KF) algorithms
are deemed crucial for enabling autonomous vehicle operation.
KF is used for calculating the probability of the present state, the past state, or
the future state of a dynamic system [21]. A KF eliminates unwanted noise from
self-driving cars’ sensors and obtains accurate estimates by eliminating unneeded
noise. An AV’s position and velocity are used to determine the state of a system
(x). AV position or velocity measurements and observations depend on different
sensors, such as radar, LiDAR, ultrasonic, etc., whose accuracy varies depending
on the measurement mode. Using the KF, the measured data can be combined with
the prediction of the states to reduce the uncertainty in the data (of position and
velocity) [21].

23
3.3 Safety
AVs are cited as a benefit of rapid development and widespread adoption because of
safety arguments. It is argued that AVs will have lower rates of accidents, injuries, or
fatalities than human drivers if they are developed and used. Among the many arguments
in support of automated vehicles presented by the USA’s NHTSA Federal Automated
Vehicles Policy, released in September 2016, the safety argument is the first and most
comprehensive [27]. The US DOT is excited about HAVs based on safety concerns [27].
The need can be exemplified by two numbers. There were 35 092 road fatalities on U.S.
roadways alone in 2015 [27]. As a second fact, 94 percent of accidents are caused by
human choice or error.
Passive safety systems were the first approach to improving vehicle safety. Passive
safety systems did not interfere directly with driving but protected passengers. During the
early 1970s, the ABS was introduced as the first assistance system [28]. Using this active
system, the vehicle’s braking behavior is automatically intervened in to avoid an accident.
The first prototype of automotive radar was introduced at about the same time. Auto-
motive RADAR systems have been developed around the world since this very unwieldy
radar system was invented. In modern ADASs, RADAR sensors are used alongside ultra-
sonic sensors, LiDAR, and cameras, while AD is still in its prototype stages. In particular,
radar sensors are considered a crucial vehicle safety and comfort technology since they are
robust against adverse lighting conditions and weather. RADAR sensors will increasingly
be integrated into cars in the near future alongside the trend toward higher automation.
The ISO 26262 standard, for example, strictly regulates FuSa, which is mandatory to
protect road users due to ADAS’ direct impact on vehicle dynamics.
There have been many studies that focus on ’expected safety’, assessing its level as
an acceptable and desired one. In studies of AVs, researchers have examined how people
perceive AVs to be "safe enough" by considering risk-related variables such as technol-
ogy awareness, current AV safety standards, and years before AVs’ being safe enough as
well as different types of AVs. According to Perceived Safety, it translates into reducing
risks rather than preventing harm [29]. In addition, it facilitates humans feeling secure.
Various types of research have been conducted on how people perceive safety in different
fields: victimization, residences, environments, and automated vehicles. In Moody et al’s
study, perceptions of AV safety were explained by three factors: awareness of technol-
ogy, current AV safety, and the years before AVs were considered safe [29]. According to
statistics, there were more than 5.3 million vehicle crashes in 2011, resulting in approx-
imately 2.2 million injuries, 32 thousand deaths, and a billion-dollar loss for the nation
[30]. It has been reported that 93 percent of total crashes are caused by human factors,
such as speeding, distracted driving, alcohol use, and other behaviors [30]. The use of
AVs can significantly reduce car accidents by minimizing the involvement of human op-
erators. As a result of the substantial reduction in congestion, not only AV drivers but
also other motorists would benefit [30]. In spite of the fact that significant increases in
AV users may increase congestion, optimized vehicle operation and a reduction in crashes
and delays may also improve traffic conditions.
FuSa is concerned primarily with hardware and software failures. The ISO pub-
lished ISO 26262 in 2011 as a standard dedicated to the FuSa of electrical and/or elec-
tronic systems in production automobiles [31]. Standard ISO 26262 had nine normative
parts and a guideline as the 10th part as the first edition [31]. As part of ISO 26262, part
11 will specifically address the application of ISO 26262 to semiconductors in the second
edition, due to be published in 2018 [31].
Initially, ISO 26262 sets out to provide a life cycle of automotive safety, encom-

24
passing management, development, production, operation, service, and decommission-
ing, with support for tailoring these activities [31]. Aside from requirements specification,
ISO 26262 encompasses all aspects of FuSa development, including design, implementa-
tion, integration, verification, and validation [31]. As well as providing requirements for
validation and confirmation measures, it also provides requirements for safety levels to be
sufficient and acceptable [31]. Under ISO 26262, the safety mechanism plays a crucial
role in ensuring the intended functionality of a system and achieving a safe state in the
event of failure. Essentially, it detects, mitigates, or tolerates faults and controls or avoids
failures without posing an unreasonable risk.

3.4 Security
It is becoming increasingly difficult to maintain the security of AVs, firstly because of
the greater exposure of its functionality to potential attackers, and secondly due to relying
on multiple autonomous systems to provide functionalities; and thirdly, due to the inter-
action between a single vehicle and a multitude of other smart systems in the urban traffic
system. Aside from these technical concerns, it is believed that the security-by-design
principle is poorly understood and rarely applied to smart and complex autonomous sys-
tems, such as AVs [32].
As AVs have numerous computing devices and communication channels, the main
concern is security, as they can communicate with other vehicles or various components
within them. It is possible for hackers to enter the vehicle’s system and manipulate its
operations. There is a serious risk involved here because the vehicle could be controlled
by people in order to carry out nefarious activities. Due to the interconnection and com-
munication between vehicles, malware can quickly penetrate a large number of vehicles
through the vehicular network, causing widespread damage [20]. As a result of this mal-
ware, coordinated and controlled attacks can be carried out. By sending false information
from sensors, a hacker can take control of an autonomous vehicle through a security
breach. By connecting to the public network infrastructure and being physically exposed
to open space, connected AVs are vulnerable to cyber-attacks. Attack surfaces are the
collection of different attack vectors that hackers can use to attempt to take control of
the system by injecting malicious code or data or extracting information from the system
to compromise the system’s security. These attacks are typically introduced by external
agents or events, or even by internal components with malicious intent that attempt to
compromise the autonomous functionality of the AV [32].
The academic research community has discovered potential security threats to CAVs, al-
though no significant cyberattacks have occurred on publicly deployed CAV programs
[33]. The potential security attacks on automated transportation systems will be more
damaging than those on non-automated systems because drivers may not be able to take
over driving if they are mentally or physically unavailable, and engineers and technicians
might not be able to recover compromised systems immediately. A few cyberattacks have
been demonstrated on currently sold and operational CAVs and their components [33].
There are two types of attacks: remote access (remote access attacks) and physical access
(physical access attacks) [33]. The attacker does not have to physically modify parts of
the CAV or attach instruments to it when performing Remote-access attacks. It is possible
to launch an attack from a distance, for example, from another vehicle. A large amount of
information transferred between CAVs and humans makes this type of attack more com-
mon than physical-access attacks. CAV components that communicate and interact with
their surroundings are susceptible to remote attacks [33]. Attacks that target remote ac-

25
cess usually involve sending counterfeit data, blocking signals, or collecting confidential
information. It is intended to trick CAVs so that they can gain significant control over
their behavior by sending counterfeit data to it. It is also possible for attackers to collect
confidential data for further attacks, as well as block CAVs from receiving information
that ensures their proper functioning.
A physical-access attack requires attackers to modify components on a CAV or
physically attach a device to that CAV. An example of this is reprogramming an ECU and
falsifying input data. When attackers tamper with CAVs, they may be detected, making
physical-access attacks harder to carry out. Nevertheless, we must consider the motiva-
tions behind the attack as well. CAVs are typically attacked for three reasons: to interrupt
their operation (without controlling them), to control them as attackers wish, or to steal
data from them [33]. In the first place, attackers aim to interrupt operations by corrupting
CAV components that are essential for autonomous driving, resulting in the inability of
CAVs to drive autonomously. Attacks such as this are analogous to attacks carried out
against networks through denial-of-service schemes [33]. Additionally, attackers are ca-
pable of gaining control over CAVs through the use of emergency brakes, changing routes,
and changing speeds to alter vehicle movements. A third approach involves stealing infor-
mation from the CAV. Further attacks may be conducted with the collected information.
Figure 3.6 presents an overview of attack motives.

Figure 3.6: Attack motives.

Throughout the years, manufacturers have strived to make AVs more reliable. By
improving the accuracy of data sensed by these vehicles’ various sensors, these objectives
are primarily achieved. Model S, one of Tesla’s cars, was one of the cars that crashed
into a truck and caused death [20]. Tesla is considered one of the industry’s leaders in
AVs [20]. Sensors whose performance is accurate under normal road conditions are vital

26
in preventing accidents like this one. Furthermore, external inputs and hacks should not
be allowed on the sensors. The sensors could produce false readings and malfunction if
external inputs or hacks are successful [20]. As a result, the road will be plagued with
disastrous consequences. An autonomous vehicle has several different types of sensors,
including ultrasonic sensors, MMW radars, onboard cameras, LiDAR, and GPS.
In order to determine the distance of an obstacle from the sensor, it is measured
the time it takes to receive these reflected waves. The process of ultrasonic jamming
involves generating ultrasonic signals in the same frequency range as a vehicle’s sensor
and transmitting them continuously [20]. Therefore, a vehicle collides with obstacles
because the ultrasonic sensors fail to detect them.
MMW radars operate using MMWs, which are capable of being attacked [20]. It
is noted that these waves have a frequency above that of radio waves but below that of
visible light. In order to determine time and frequency differences, these waves are used as
probes and their reflections are measured. An MMW radar jammer sends constant signals
in the same frequency range as the actual radars on the vehicles to launch a jamming
attack [20]. As a result of the jamming signals, the noise level is increased and the signal-
to-noise ratio is considerably reduced. Thus, the vehicle’s radar system fails to detect
vehicles or obstacles in front of it, and no vehicle or obstacle can be detected.
Regarding attacks against onboard cameras, for an autonomous vehicle to com-
prehend the environment it is operating in, onboard cameras use visible light and optics.
Detection of lanes and traffic signals, as well as road signs, are among the most useful
uses of cameras. As a result of this data, AVs are able to enhance their stopping and driv-
ing capabilities. This attack aims to temporarily blind the camera from recognizing actual
traffic signals or objects by shining strong intensity light on the sensor.
The LiDARs device is used in the detection of obstacles and helps to navigate the
autonomous vehicle through its surroundings. The data generated by the LiDAR system
provides information about where obstacles exist in an environment and the position of
the autonomous vehicle with respect to the obstacle. The purpose of this attack is to relay
the original reflected signal from an object to be coming from another position. This way
the autonomous vehicle is tricked into understanding the false position of a real object as
being either closer or farther away.
Vehicles that are autonomous use GPS satellites to determine where they are ge-
ographically [20]. AVs rely on precise geographic coordinates and vehicle identification,
which are obtained through satellites, for their successful implementation. Using a GPS
satellite simulator, a malicious user can exploit the behavior of a satellite in order to
perpetuate a positioning attack. When this device’s signal is stronger than that of the
authentic GPS satellites, it can provide false information about a vehicle’s location to
unsuspecting drivers.
Lastly, denial of service attacks is extremely serious attacks aimed at preventing
authentic users from accessing networks and network resources [20]. To decrease the effi-
ciency and performance of the network, attackers send dummy messages into the network
in order to overwhelm the users. If an attack is detected, correcting it can be challenging
because of its severity. A summary of the possible attack targets on CAVs can be found
in Figure 3.7.

27
Figure 3.7: The possible targets of an attack on a CAV.

3.5 Communication Types and Protocols


The Internet of Things (IoT) is a technology that is still evolving and has many appli-
cations. One example of these applications is the development of intelligent infrastructure
for vehicles that utilize internet-connected devices. In connection with the IoT, there is a
branch of IoT called Internet of Vehicles (IoV) [34].
As a network of devices that communicate and share information, the IoT platform
is defined as a collection of connected devices to form a network. With the development
of new and improved devices and services, IoT has become a leading technology. In light
of this expansion, the IoT platform has become increasingly popular and applicable to
a wide variety of research fields, leading to new areas of application. VANETs, which
connect vehicles to other vehicles and infrastructure, are one example of vehicular ad hoc
networks. VANETs have evolved into IoVs and are expected to become the IoAVs in the
near future [34].
VANETs, allow mobile devices/vehicles to spontaneously create networks [21].
In addition to V2V, VANETs can also be used for V2I communications [21]. As a result
of such technology, road safety is enhanced; for instance, vehicles are able to communi-
cate with each other and the network to exchange essential information during hazardous
conditions.
In VANET technology, the following components are present: In every vehicle,
there is a GPS tracking device (called OBU) to communicate with one another and with

28
an RSU [21]. The main objective of this system is to establish wireless communications
between different RSUs and OBUs. With IoV, data can be collected utilizing sensors
found in vehicles or roadside units, including GPS, proximity radar, accelerometers, Li-
DARs, image sensors, and various performance and control modules contained in the
OBU [34].
It is possible to collect vehicle-related data such as the vehicle’s speed, its location,
and its direction of movement, and roadside data such as traffic flow statistics. The col-
lected data is then used to improve traffic management, enhance road safety, and respond
more effectively to accidents.
IVC systems and sensors are the main components of vehicular networks [34].
Vehicle networks follow the same layered architecture as other networks. Although it has
a layered structure, it differs from conventional networks.
The IoAV architecture has been proposed in several different ways. In general,
the sensing layers (combining physical and data links) are classified into three groups:
the network layer, the sensing layer, and the application layer [34]. A summary of the
sensing layers classification can be found in Figure 3.8.

Figure 3.8: sensing layers classification.

A three-layered architecture starts with a sensing layer at the bottom. As part of


this architecture, the sensing layer is composed of the physical layer and the data link
layer [34]. Information about the environment is collected by this layer through the use of
available sensors [34]. In addition to driving patterns and environmental conditions, data
can be collected on vehicle situations, vehicle conditions, and more.
Regarding Network Layer, upon receiving data from the bottom layer, the appli-
cation layer processes it and transmits it. Many types of network technologies are used to
process the abundance of data, including LANs, wireless/wired networks, and transmis-
sion mediums such as WLANs, Bluetooth, and Zigbees [34]. Since it is responsible for
providing connectivity, this layer is appropriately called the communication layer [34]. It
handles V2V, V2I, pedestrian-to-pedestrian, and sensor-to-sensor communication [34].
As the application layer provides storage and processing for the data, it is the
powerhouse of the resource. A major responsibility of the role is the management of

29
data, storage, processing, and even the decision-making process [34]. Additionally, the
layer supports big data analysis, wireless sensor networks, cloud computing, etc. The
application layer and the business layer can be subdivided further within this layer. The
IoAV platform is accessed through this layer. Different applications are managed through
this layer, which facilitates their management.
Roadside units, also known as RSUs, are fixed at specific locations such as road-
side areas, parking lots, and intersections [21]. By connecting AVs to infrastructure and
assisting in vehicle localization, its main purpose is to provide connectivity between AVs
and infrastructure. Moreover, it can be used to connect vehicles to different types of
RSUs.
An established TA manages the VANET registration and communication process
to ensure only valid RSUs and OBUs can register [21]. As well as providing security, it
authenticates the vehicle and verifies the OBU ID.
V2V communication, V2I communication, and V2X communication can be ac-
complished utilizing VANETs [21], the details have been illustrated in Figure 3.9. V2V
communication, also known as IVC, enables vehicles to communicate with one another
and exchange traffic congestion, accident, and speeding information [21]. MIVC is used
for long-range communication like traffic monitoring, while SIVC is used for short-range
applications like lane merging and ACC. There are several advantages that come from
V2V communication, including BSD, FCWS, AEB, and LDWS. The nodes (vehicles) in
a V2V communication network are connected using a mesh (partial or full) topology. A
SIVC or MIVC system is categorized based on how many hops are used for IVC.
Through Vehicle-to-Infrastructure (V2I) Communication and Roadside-to-Vehicle
Communication (RVC), vehicles are able to engage with Roadside Units (RSUs). [21].
This device is capable of identifying traffic signals, cameras, lane indicators, and park-
ing meters. In an ad hoc network, the ad hoc and bidirectional communication between
vehicles and the infrastructure is wireless and ad hoc. Data gathered from infrastructure
enables oversight and control of traffic. These data are utilized to adjust various speed pa-
rameters, aiming to optimize fuel efficiency and regulate traffic movement. RVC systems
are classified as SRVCs and URVCs depending on the infrastructure [21]. Communica-
tion services are provided only by SRVC systems at hotspots, such as gas stations and
parking spaces, while URVC systems provide coverage throughout the road even at high
speeds. Due to this, URVC requires significant investment in order to maintain network
coverage.
With the V2X concept, vehicles can communicate omnidirectionally with other
vehicles (V2V), with infrastructure (V2I), with pedestrians (V2P), and with networks
(V2N/V2C) that connect to networks and clouds [35]. Using this technology, pedestri-
ans, vehicles, road networks, and cloud environments can be connected. Not only can
V2X assist vehicles in obtaining information and promote innovation and application of
automated driving technology, but it can also contribute to the creation of an intelligent
transport network, and it can encourage the development of new modes and new forms
of automobiles and transportation services in the future [35]. Traffic efficiency, pollution
reduction, resource conservation, accident prevention, and traffic management can all be
improved with this technology.
LTE-V2X and DSRC are the two main types of communications technology used
for V2X at present [35]. There are several standards that make up the DSRC system, in-
cluding IEEE and SAE guidelines. DSRC uses the 802.11p protocol at both the physical
and medium access control layers [35]. This protocol enables vehicles to broadcast rele-
vant security information directly to neighboring vehicles and pedestrians by simplifying

30
authentication, associated processes, and data transmission before transmitting data.

Figure 3.9: The vehicle communication system (VC).

Through different wireless technologies, an AV can communicate with other ve-


hicles and network infrastructure. When the AV is engaged in V2X communication, real-
time data (audio/video) may be transmitted and received in real-time; in case of fog or an
accident, warning information can be exchanged with neighboring vehicles in real-time.
Using Figure 3.10, we illustrate how autonomous vehicle wireless technologies can be
differentiated by their transmission ranges.

Figure 3.10: A variety of VANET technologies are being considered for AVs.

Bluetooth Technology is a notable example of Short-Range Communication Tech-


nology [21]. Vehicular networks can utilize wireless short-distance communication tech-
nologies like Bluetooth, which is based on the IEEE 802.15.1 standard. Operating in the
2.4 GHz frequency band, this wireless network can provide data transmission speeds of

31
up to 14Mbps over diverse distances. As Bluetooth propagates, it varies in range as a
result of antenna sensitivity, gain, and propagation conditions.
IoT networks are needed to be low-cost and low-power, so ZigBee technology
was developed [21]. Approximately 250 kbps of data can be transferred over a distance
of 100 m with the supported connectivity range [21]. In addition to being known as IEEE
802.15.4, it is also referred to as LRWPAN and is operated at different frequencies (868
MHz, 902–968 MHz, and 2.4 GHz) [21].
It is noteworthy that DSRC technologies are part of medium-range communication
technologies [21]. An example of this is DSRC, which is referred to as WAVE. It uses
WAVEs to provide reliable communication between vehicles and vehicle infrastructures.
In order to create a wide area network between vehicles, the technology can be deployed
in OBUs and RSUs [21]. Vehicles communicate using DSRC when communicating with
one another through V2V communication. As well as V2I communication, it can be used
to send traffic signals as well as accident alerts to vehicles over the network infrastructure.
As far as Long Range Communications Technology is concerned, C-V2X Tech-
nology stands out [21]. Cellular networks are used to connect vehicles with their sur-
roundings. Release 14 of 3GPP introduced C-V2X technology, and release 15 developed
it further in order to meet 5G communication criteria [21]. As a result, C-V2X is ex-
tremely reliable, capable of communicating between vehicles at high speeds, is capable
of operating perfectly in dense traffic conditions, In doing so, it mitigates the congestion
problems related to DSRC, and facilitates both close and extended distance communica-
tion between vehicles and the Roadside Unit (RSU).
Lastly, with 5G-NR, developed by 3GPP, data rates increase, latency decreases,
and devices can communicate more effectively [21].

3.6 Mapping and Localization


The field of mapping is extremely important in the field of Intelligent Transportation
Systems (ITS) and has increasingly been studied. An example of one of the most widely
used mapping techniques is road network mapping, which is based on the network of
roads in a given area. There are numerous applications of it, including vehicle local-
ization, route planning, and navigation control. The road network is typically extracted
from Google Maps or OSM, unlike OGM, which is constructed through the use of range
measurements like LiDARs or SONARs [36].
With the ability to build a map, we now have access to various other applications,
including vehicle localization. GPS is primarily used in ITS applications such as vehicle
positioning, which is a highly crucial task. The data is, however, affected by a wide
range of error sources, which makes it difficult to calculate accurate trajectory data. The
data must be linked to the road network through Map Matching in order to be useful for
vehicle localization. Based on noisy GPS measurements, map matching determines the
actual route the vehicle took to arrive at its destination [36]. Many methods are used
to implement map matching, but the HMM and an algorithm based on it are the most
widely used [36]. Based on knowledge of the road networks’ connectivity, the HMM
can provide reasonable routes based on a probability-based approach [36]. Generally, the
route planner is already aware of the route that the vehicle should follow in autonomous
driving applications. As a result, complex HMMs are considered unsuitable for such
applications.
There are three types of localization on highways: Road-level localization (RLL),
Ego-lane level localization (ELL), and Lane-level localization (LLL) [37].

32
In order to perform the RLL, digital maps are used (e.g., Google, OSM, and Waze)
[37]. Geodetic coordinates (latitude, longitude, and altitude) are retrieved using GNSS
receivers [37]. A Map-Matching procedure is then performed to determine the right road,
matching the location of the ego-vehicle. While localization is obtained with meters of
accuracy, there is still a lot of uncertainty.
When it comes to RLL, almost all vehicles are equipped with positioning devices
that allow drivers to know where their vehicles are in the world. These positioning devices
are inherently inaccurate, which makes this estimation very noisy. A correcting process
is required to resolve this problem, which matches the vehicle position with a map-based
road network. A map-matching technique is used to achieve this [37].
In addition to identifying the vehicle’s physical location, map-matching improves
its position accuracy when spatial road network data is available. As a result, the Map-
Matching algorithm is the one that determines the RLL knowledge. Numerous applica-
tions require RLLs as prerequisites [37].
Online Map-Matching has been a major subject of research since GPS became
available in the 1990s because of its importance to the RLL [37]. In terms of map-
matching techniques, there are two main categories: online and offline [37]. When
Map-Matching is performed online, it occurs in a streaming mode. As a result, real-
time applications require an adequate procedure. To achieve full Map-Matching in offline
Map-Matching, the trajectory must be completed before Map-Matching is performed.
There are four categories of map-matching techniques from a methodological
standpoint, namely geometric, topological, probabilistic, and advanced [37]. The map-
matching methods have, however, been outperformed and new technologies have emerged
over the last several years, resulting in the classification becoming obsolete. The exist-
ing Map-Matching methods are classified into two categories: Probabilistic Models and
Deterministic Models [37]. The categories are further divided into subcategories [37].
Figure 3.11 depicts each category in detail.

Figure 3.11: Classification using map-matching techniques can be divided into two main
categories - deterministic and probabilistic.

With regard to ELL, a vehicle’s awareness of the road on which it is traveling is


not sufficient for some applications, such as lane-keeping. [37]. It is essential that these
systems know where the host lane in the road is so that they can provide appropriate
maneuvering instructions and maintain vehicle safety. More accurate localization of AVs

33
is also needed, which is possible by analyzing the longitudinal and lateral positions of
the vehicle in the ego lane [37]. Overtaking maneuvers, for example, require flawless
knowledge of the vehicle’s lateral position with respect to the ego-lane marking in order
to detect if it should overtake the obstacle.
The majority of researchers use lane marking detection to determine the location of
ego lanes at the level of an individual [37]. A modular pipeline approach, a model-driven
approach, or a monolithic end-to-end approach can all be classified as existing approaches
to lane marking detection [37]. A model-driven approach is the standard for lane marking
detection. In general, lane marking detection should be broken down into independent
modules that can be tested independently. In modular pipelines, intermediate represen-
tations are comprised of human-interpretable elements that are helpful in understanding
how a system fails [37]. It has been observed that modular methods inherently lack suit-
ability for tasks such as identifying lanes based on intermediate representations built by
humans [37]. Models based on ANNs that learn from start to finish are an alternative to
modular pipelines.
Regarding the LLL, for an autonomous vehicle to function properly, it must be able
to evaluate the road environment in which it operates. In order to evaluate the situation
properly, it is crucial to comprehend some essential components of localization levels.
The concept of LLL is a broad term that refers to two distinct topics[37]. As a first step,
the ego lane should be determined, i.e., the lane that the vehicle is currently traveling on.
Furthermore, it may refer to determining the vehicle’s lateral position inside the overall
road. In addition to LLL, there are various systems that can help AVs obtain it. GNSS
receivers can be used by some systems to locate the ego-vehicle on the road [37]. With
the IMU, proprioceptive sensors can compensate for the lack of accuracy provided by
classical GNSS, which can be caused by poor satellite signals, high precision dilution, or
multi-path in urban scenes [37].

34
4 Results
This section presents the results of the review of the selected articles and comprises
different sections that aim to answer the proposed research questions. The first part per-
tains to types of methods and techniques, providing information to answer the first re-
search question. The second part presents evidence to demonstrate the results, aiming
to answer the second research question. Finally, we discuss the limitations identified in
the proposed methods to answer the last research question. As this review considers only
studies published from 2019 to 2022, the selected studies span this period. Table 4.5
illustrates the distribution of these studies over this time span. Moreover, the references
of all the selected documents are presented in Table 1.8.

Table 4.5: Selected primary studies


Id Title year Type
S1 Adaptive Driving Assistant Model (ADAM) for Advising Drivers of Autonomous Vehicles 2022 Article
S2 MADRaS : Multi-Agent Driving Simulator 2021 Article
S3 Crossroads+: A Time-aware Approach for Intersection Management of Connected Autonomous Vehicles 2020 Article
S4 Cooperative Intersection Crossing Over 5G 2021 Article
S5 Semi-Direct Monocular Visual-Inertial Odometry Using Point and Line Features for IoV 2022 Article
S6 Design and Analysis of Delay-Tolerant Intelligent Intersection Management 2020 Article
S7 Autonomous Vehicle: Security by Design 2021 Article
S8 Collaborative Analysis Framework of Safety and Security for Autonomous Vehicles. 2019 Article
S9 Trajectory Planning and Safety Assessment of Autonomous Vehicles Based on Motion Prediction and Model Predictive Control 2019 Article
S10 RFAP: A Revocable Fine-Grained Access Control Mechanism for Autonomous Vehicle Platoon 2022 Article
S11 A Methodology for the Design of SafetyCompliant and Secure Communication of Autonomous Vehicles 2019 Article
S12 LiDAR Data Integrity Verification for Autonomous Vehicle 2019 Article
S13 RACE: Reinforced Cooperative Autonomous Vehicle Collision Avoidance 2020 Article
S14 Photonic-Radar Based Multiple-Target Tracking under Complex Traffic-Environments 2020 Article
S15 Achieving Lightweight and Privacy-Preserving Object Detection for Connected Autonomous Vehicles 2022 Article
S16 Semantic Point Cloud-Based Adaptive Multiple Object Detection and Tracking for Autonomous Vehicles 2021 Article
S17 An enhanced conceptual security model for autonomous vehicles 2020 Article
S18 Virtual Traffic Light Implementation on a Roadside Unit over 802.11p Wireless Access in Vehicular Environments 2022 Article
S19 Edge Computing for Autonomous Driving: Opportunities and Challenges 2019 Article
S20 Unified Biometric Privacy Preserving Three-Factor Authentication and Key Agreement for Cloud-Assisted Autonomous Vehicles 2020 Article
S21 Safe and Effective Transfer of Feedback Control Signals Based on Vision 2021 Article
S22 Chaos-based privacy preserving vehicle safety protocol for 5G Connected Autonomous Vehicle networks 2020 Article
S23 Developing an Evaluation Method for Potential Cyber Threat Severity to Connected and Autonomous Vehicles 2020 Article
S24 Cybersecurity challenges in vehicular communications 2019 Article

35
4.1 Types of Methods and Techniques (RQ1)
This section presents the types of methods and techniques used in selected primary
studies. The information provided in Table 4.6 displays different types of methods/techniques
primarily used or developed in the selected studies. Because the table doesn’t present
comprehensive information, the remainder of this subsection provides an in-depth de-
scription of the studies.

Table 4.6: Proposed Techniques


ID Technique
S1 Adaptive Driving Assistant Model (ADAM)
S2 MADRaS: Multi-Agent Driving Simulator
S3 Crossroads+
S4 Control algorithm and a communication paradigm over 5G networks
S5 Semi-Direct Monocular Visual-Inertial Odometry using Point and Line Features (SDMPL-VIO)
S6 Delay-tolerant protocol for general multi-lane intersection management
S7 Security-by-design framework for AV
S8 Collaborative Analysis Framework
S9 Trajectory Planning and Safety Assessment
S10 RFAP: A Revocable Fine-Grained Access Control
S11 Adopted the Arrowhead Framework and a contract-based approach
S12 Semi-fragile data hiding-based technique
S13 RACE: Reinforced Cooperative Autonomous Vehicle Collision Avoidance
S14 Photonic-Radar Based Multiple-Target Tracking
S15 Privacy-preserving object detection (P2OD) framework
S16 A semantic point cloud-based adaptive MODT system
S17 Conceptual model of autonomous vehicles
S18 Road-Side Unit-based Virtual Intersection Management (RSU-VIM)
S19 Review edge computing system designs, V2X applications, and autonomous vehicle security.
S20 Cloud-centric Three-factor Authentication and Key Agreement protocol (CT-AKA)
S21 Pipeline of cryptographic operations
S22 5G radio network architecture
S23 Identified cyber attacks on CAV
S24 Three-layer framework (sensing, communication and control)

36
Figure 4.12: Types of Methods and Techniques overview.

Figure 4.12 offers an overview of the types of methods and techniques developed
and utilized in the selected articles, depicted in percentages. It is worth mentioning that
more than 50% of the studies develop methods in the field of security and object detec-
tion and localization techniques for AVs. This finding suggests that these two fields are
trending in recent years.

4.1.1 Advanced Data Processing and Decision-Making Algorithms


Numerous studies propose advanced data processing techniques and decision-making
algorithms to enhance autonomous vehicle functionality and safety. For instance, one
study (S1) proposes an architecture for adaptive autonomous driving assistance, employ-
ing a two-layer fusion model and a two-stage development process involving predictive
trust in automation and ADAMs. Machine learning techniques such as ANN, SVM, and
RF are instrumental in this approach [38]. Another study (S2) presents MADRaS, an
open-source motion planning simulator used for developing and evaluating autonomous
driving algorithms, relying heavily on the PPO algorithm [39]. The study (S3) develops
Crossroads+, a time-sensitive intersection management approach accounting for various
factors, including network delays and the physical behavior of CAVs [40].
The study (S9) utilizes Monte Carlo simulations to predict the probabilistic occupancy
rates of an object, creating a map of probability statistics that correspond to actual sce-
narios. This approach accounts for the motion predictions of other traffic participants,
enabling the model to handle dynamic environments with high requirements on percep-
tual systems effectively [41].

37
4.1.2 Communication and Networking Paradigms
A few studies (S4, S18) focus on developing new communication paradigms to facili-
tate effective communication between AVs and infrastructures. The study (S4) presents a
low-latency generalized message exchange system, Hermes, leveraging the simplicity of
Client-Server and the efficiency of Multicast communication [42]. The study (S18) pro-
poses a VIM system using RSUs through 802.11p, adapted from existing virtual traffic
light methodologies [43].
One study (S22) proposes a 5G radio network architecture that utilizes multiple ra-
dio access technologies in conjunction with CRAN capabilities to preserve privacy on
CAV networks without compromising security. The study also proposes a reliable, se-
cure, and privacy-preserving protocol for disseminating messages in CAV networks [44].
Edge computing and V2X applications are explored in a study (S19). The authors review
state-of-the-art approaches in edge computing system designs, V2X applications, and au-
tonomous vehicle security, discussing recent advancements and challenges in building
edge computing systems for AVs [45]

4.1.3 Security Approaches and Techniques


The topic of security is a major cause for concern in AVs, with multiple studies (S7,
S8, S10, S11, S17, S20, S21, S23, S24) proposing various security approaches and tech-
niques. One study (S7) derives security objectives and controls from AV safety require-
ments and proposes AV security approaches within a socio-technical framework. The
paper focuses on the integration of security measures into the design and development
of autonomous vehicles. By considering security from the early stages, adopting secure
design principles, and addressing the unique security challenges, the paper aims to en-
hance the overall security and resilience of autonomous vehicles in the face of potential
threats and attacks [32]. Another study (S8) proposes a method for integrating safety and
security with international standards like ISO 26262 and SAE J3061. Due to the automa-
tion levels of DAS, TARA and HARA should correspond with each DAL, i.e., TARA and
HARA must consider particular properties of each DAL [46]. Similarly, the study (S11)
takes a contract-based approach to specify safety, combined with the Arrowhead Frame-
work to support security. This contract-based approach can neatly distinguish between
the responsibilities of different components in the form of assumptions and guarantees,
expressed as assertions in the pattern-based BCL language [47]. A conceptual model of
AVs focusing on their assets, vulnerabilities, and threats is proposed in the study (S17)
[48]. Lastly, the study (S20) introduces a cloud-centric three-factor authentication and
CT-AKA to ensure secure access to the cloud and AVs [11].
The study (S10) proposes a Revocation-based Attribute-based Access Control mecha-
nism (RFAP) for AVPs. This mechanism achieves fine-grained access control through en-
cryption and facilitates immediate revocation and secure outsourced decryption through
ECUs. The proposal includes four PPT algorithms: Setup, KeyGen, Encrypt, and De-
crypt. Similarly, the study (S21) proposes a new stream cipher, demonstrating better
performance than past block ciphers and efficient authenticated encryption, particularly
useful for the safe and efficient transfer of sensor data between computing devices [49].
The study (S23) identifies significant CAV cyberattacks, conducts an analysis of the
target asset, possible risks, and consequences for each identified cyberattack, and suggests
mitigation methods [50]. Similarly, the study (S24) proposes a three-layer framework to
enhance the understanding of automotive security threats in the context of modern vehi-
cles that can connect to an external infrastructure and increasingly use V2X communica-

38
tion technologies. The three layers include a sensing layer, composed of vehicle dynamics
and environmental sensors vulnerable to various attacks; a communication layer, which
includes both in-vehicle and V2X communications, susceptible to a range of attacks; and
a control layer, which enables autonomous vehicular functionality and can be compro-
mised by attacks targeting the lower two layers [51].

4.1.4 Object Detection and Localization Techniques


Object detection and localization are addressed in various studies (S5, S14, S15, S16).
The study (S5) develops an SDMPL-VIO for precise vehicle localization [52]. Similarly,
the study (S15) proposes an integrated approach to the extraction of features and bounding
boxes from objects in an image using multiple secure computing protocols, while the
study (S16) proposes an adaptive MODT system based on SPCs [53]. The study (S14)
develops a linear frequency-modulated continuous-wave photonic radar to carry out a
radar cross-section-based tracking of multiple mobile targets in complex traffic scenarios
under various weather conditions such as fog, cloud, and rain [54].

4.1.5 Sensor Data Integrity Verification and Tampering Detection


Ensuring sensor data integrity and detecting tampering is the focus of two studies
(S12, S13). Both propose a semi-fragile data hiding-based technique for verifying the
integrity of sensor data in real time, as well as detecting and localizing tampering in real-
time. They use a 3-dimensional QIM-based data hiding for inserting binary watermarks
into LiDAR data [55], [56].

4.1.6 Intersection and Traffic Management


Two studies (S3, S6) present solutions for intersection and traffic management. The
study (S3) proposes Crossroads+, a time-sensitive intersection management approach
taking network delays and CAVs’ physical behavior into account. On the other hand,
the study (S6) develops a delay-tolerant protocol for managing intersections with several
lanes in each direction, aiming to minimize deadlocks and increase efficiency [40], [57].

39
4.2 Evidence to Demonstrate the Result (RQ2)
This section presents the evidence and evaluation methods that the studies used to
demonstrate and evaluate their results. Moreover, it can be mentioned that as the studies
utilize different limitation techniques, we will explain them based on the categorization.

Figure 4.13: Overview of evidence for demonstrating the result.

Figure 4.13 provides an overview of the different evaluation methods in the selected
articles in percentage. We mention that simulation-based evaluations and experimental
real-world testing are more utilized in the process of evaluating the results.

4.2.1 Simulation-Based Evaluation


Several studies utilize various simulation tools to evaluate their proposed models,
techniques, or frameworks. One study (S2) uses MADRaS, an open-source MADRaS, to
evaluate autonomous driving motion planning algorithms. Experiments simulate complex
driving scenarios and various control modes [39]. Similarly, another study (S3) uses a
two-pronged approach, employing real-world experiments and a custom-built simulator
to validate their Crossroads+ technique for managing intersections [40]. The researchers
in the study (S6) extend the SUMO traffic simulation suite to analyze the performance of
their delay-tolerant intersection management protocol [41]. Simulation-based quantitative
analysis is also used in the study (S9), where Monte Carlo simulation is employed for
predicting the probabilistic occupancy of other traffic participants [41].
The research team in the study (S10) uses the Veins traffic simulator with the PLEXE
package to evaluate the efficiency and resistance of their RFAP mechanism to continu-
ous jamming attacks [49]. Finally, the last study (S13) uses TORCS to evaluate their

40
proposed RACE framework, focusing on metrics such as collisions, scalability, and la-
tency. In the study (S14), a wide range of traffic scenarios is modeled using MATLAB™
software to simulate different types of mobile targets with varying radar cross-sections,
testing the radar’s performance in both normal and complex traffic scenarios [56]. Simi-
larly, the study (S15) utilizes a PyCharm simulation platform to execute secure computing
protocols within the P2OD framework. The study (S16) incorporates the Carla simula-
tor, providing a semantic point cloud labeled as ground truth, to complement the KITTI
data set in evaluating their tracking performance [53]. Lastly, the study (S24) evaluates
the security of vehicular communications and proposes the use of machine learning and
blockchain technologies through various simulation platforms [51].
The researchers in the study (S7) use software simulations to evaluate the security of
AVs under three key attack scenarios [32]. Similarly, the study (S10) combines theoretical
and experimental analyses to demonstrate the results of their AVP security solution, RFAP
[49]. The researchers in the study (S11) employ a contract-based approach for specifying
safety, incorporating it into the design flow with the Arrowhead Framework to support
security [47].

4.2.2 Experimental Real-World Testing


Some studies employ real-world testing or demonstration to evaluate their proposed
techniques. In the study (S1), telemetry data from automated vehicles are used in com-
bination with machine learning techniques to develop a model predicting drivers’ trust in
automation [38]. The study (S4) tests a control algorithm and communication paradigm
over 5G networks at the AstaZero proving ground in Goteborg, Sweden [42]. The study
(S7) conducts physical testing to evaluate the security of AVs under three key attack sce-
narios [32]. The physical demonstration is also used in one of the studies (S11), where
model cars are used to showcase a platooning autonomous vehicle system [47]. In the
study (S17), a multi-layered approach is applied to evaluate the vulnerabilities of AVs
to cyber-attacks, focusing on a specific instance of a cyber-attack on a Jeep Cherokee to
understand potential attack surfaces [48]. Similarly, the study (S23) examines the severity
of potential cyber-attacks on CAVs and proposes mitigation methods [50].

4.2.3 Data Analysis and Machine Learning Techniques


Several studies utilize data analysis or machine learning techniques to evaluate their
proposals. The study (S1) uses machine learning models to predict trust in automation
based on various vehicle attributes [38]. The mentioned models are two layers of sen-
sor fusion models. The first layer includes models for speed conditions, road conditions,
driver distraction, and trust prediction. The second layer integrates the outputs from the
first stage to trigger appropriate voice instructions, enhancing driver safety [38]. The
researchers in the study (S5) employ an SDMPL-VIO model for vehicle localization,
tested on both indoor (EuRoC) and outdoor (KITTI) datasets [52]. In the study (S8),
the researchers use an integrated safety and security method (S12) based on international
vehicle safety and security standards for analyzing potential failures and attacks on Li-
DAR [46], [55]. The use of mathematical proofs is also evident in the study (S6), where
the researchers formally prove the safety, liveness, and deadlock-free properties of their
protocol [57].

41
4.2.4 Use of Data-sets
Data sets are utilized as a primary method of evaluation in multiple studies (S15, S16).
The researchers in the first study (S15) use the KITTI data set to train and test the P2OD
framework. Evaluating the computational cost, communication overhead, and accuracy
of various detection and classification phases [53]. Similarly, the study (S16) employs
the KITTI data set in conjunction with a simulator to verify tracking performance in real-
world scenarios [58]. In the study (S12), A technique based on semi-delicate data hiding
is utilized for the real-time validation of sensor data integrity and for identifying and
locating any tampering. The method is evaluated on a benchmarking LiDAR dataset [55].

4.2.5 Comprehensive Review


In the study (S19), The researchers utilize a comprehensive review and analysis of
existing technologies and methodologies in their evaluation. They conduct an extensive
study of advancements in edge computing system designs, V2X applications, and au-
tonomous vehicle security [45].

4.2.6 Histograms and Key Space Analysis


The study (S22) uses histograms and key space analysis to verify the security of the
proposed encryption algorithm, measuring its computational time cost and impact on net-
work latency [44].

4.2.7 Prototyping and Hardware-Based Evaluation


In the study (S18), the researchers evaluate their RSU-VIM system using a prototype
setup that includes hardware such as SDRs, an FPGA, and a Raspberry Pi. The system’s
performance is evaluated based on metrics such as system delay, packet transmission
delay, and reliability [43].

4.2.8 Computational Analysis and Protocol Verification


In two different studies (S20, S21), computational analysis and protocol verification
serve as evaluation methods. The first study (S20) employs Proverif v1.97, an automatic
cryptographic protocol verifier, to assess the security of the proposed CT-AKA proto-
col. The protocol’s efficiency is analyzed from two aspects - computational time and
communication cost [11]. In the study (S21), a series of experiments is run on embedded
computers to compare the performance of different cryptographic methods, with latencies
calculated for various schemes [59].

42
4.3 Limitations (RQ3)
This section presents the limitations and open problems of existing methods that could
potentially point to interesting future research directions for practitioners and researchers
in the context of improving the safety and security of AVs. Moreover, it can be mentioned
that as the studies face different limitations, we explain based on the categorization.

Figure 4.14: Overview of limitations result.

Figure 4.14 provides an overview of the different limitations identified in the selected
articles in percentage. It is evident that there are two significant problems that researchers
face 1) simulation and testing and 2) security concerns and cyber attacks.

Table 4.7: Mapping of Limitations in Selected Studies


Limitations Studies Total
Scarcity of Data-sets S1,S4,S5,S16,S18 5
Communication Challenges S3,S4,S6,S10,S13 5
Hardware and Software Limitations S5,S7,S10,S12,S15,S16 6
Performance and Real-Time Applica- S16,S18 2
tions
Assumptions and Simplifications S3,S6,S7,S9,S10,S11,S13 7
System Design and Implementation S19,S21,S2 3
Generalizability and Future Research S1,S19,S23,S24 4
Simulation and Testing S2,S3,S6,S9,S10,S12,S13,S14,S16 9
Security Concerns and Cyber Attacks S8,S10,S11,S17,S19,S20,S23,S24 8
Scalability and Traffic Conditions S15,S22 2

43
Table 4.7 presents the reference mapping of the categories of limitations identified
in the articles. Given that some articles encounter multiple limitations, they appear in
different categories concurrently and are examined separately according to their limitation
types.

4.3.1 Scarcity of Data-sets


By analyzing the results of the SLR, we find that existing studies face the limitation
of the insufficient data set or diversity of data set to evaluate their proposed method. This
limited diversity and quantity hinder the ability to train and test autonomous systems
on various real-world scenarios, potentially leading to performance gaps when facing
unfamiliar or rare situations.
Three of the studies (S1, S4, S5) have limitations because either there is insufficient
data or data has to be generated to make up for the lack of it. This scarcity affects the eval-
uation of models and possibly the generalizability of the findings. While 2 of the studies
(S1, S5) use generated data and still find satisfactory results, the authors acknowledge the
need for more subject data to improve model accuracy [38], [52]. Another study’s (S4)
experimental setup is limited to a controlled environment and a few vehicles. Hence the
results might not fully reflect real-world conditions [42].
The two studies (S16 and S18) discuss limitations related to the data sets used in the
studies. In one of the studies (S16), the limitation arises because the KITTI tracking data
set does not contain areas visible to the camera in front of the ego vehicle, and in another
study (S18), the researchers use randomly generated traffic data rather than real-world
intersection data, which may not fully represent real-world scenarios [58], [43].

4.3.2 Communication Challenges


By inspecting the selected articles, we identify some limitations related to communi-
cation challenges. 5 out of 24 studies (S3,S4,S6,S10,S13) mention limitations related to
communication technology. The challenges they face include the RTD causing discrep-
ancies in communication (S3), degradation of communication performance due to urban
structures (S4), assumptions about communication delays (S6), security concerns with
the ECUs (S10), and assumptions about the robustness of VANETs (S13) [40], [42], [57],
[49], [56].

4.3.3 Hardware and Software Limitations


Several studies (S5, S7, S10, S12, S15, S16) mention limitations related to the hard-
ware and software used. This ranges from time-consuming feature extraction and ac-
cumulation of errors (S5), specific system configurations that may not reflect different
hardware setups (S7), reliance on specific DL models (S12), computational costs, and
high communication overheads (S15), to the performance of the PCSS network affecting
the overall tracking performance (S16) [52], [32], [49], [55], [53], [58].

4.3.4 Performance and Real-Time Applications


Based on the analysis of SLR-selected studies, two studies (S16, S18) highlight lim-
itations regarding real-time application and system performance. The first study (S16)
mentions that the performance of their PCSS network can affect the tracking perfor-
mance of the system. It also states that the system speed drops to about seven FPS with

44
RangeNet++, which might be a challenge for real-time applications [58]. Similarly, the
second study (S18) mentions an increase in delay due to the GNU radio software, which
could affect the real-time functionality of the system [43].

4.3.5 Assumptions and Simplifications


By checking the result of selected studies, we note limitations due to assumptions or
simplifications made in several studies (S3, S6, S7, S9, S10, S11, S13). These include
assumptions about vehicles strictly adhering to instructions (S3), modeling of communi-
cation delays (S6), assuming a semi-trusted and easy-to-compromise edge computing unit
(S10) [40], [57], [49]. The other found assumptions are about vehicle authentication pro-
cesses (S11), disregarding the specifics of the communication technology used (S13), and
assuming constant longitudinal velocity during lane-change maneuvers (S9) [47], [56],
[41].

4.3.6 System Design and Implementation


System Design and Implementation emerges as one of the identified limitations that
researchers face during their research. Three articles (S19, S21, S24) highlight limitations
in the design and implementation of their systems. The first study (S19) highlights the
need for further research to improve the edge computer architecture for autonomous driv-
ing and the design of run-time layers for efficient workload mapping [45]. The second
study (S21) faces limitations with the use of compression and decompression, which off-
set the potential gains by reducing the data size [59]. Lastly, the third study (S24) points
out that some properties of the blockchain are too resource-intensive for onboard hard-
ware to handle, limiting its implementation to more powerful MECUs instead of ECUs
[51].

4.3.7 Generalizability and Future Research


Different studies (S17, S19, S23, S24) mention limitations regarding the generalizabil-
ity of their findings and the need for future research. The findings of the study (S17) are
based on a single case study, which may not be applicable to other autonomous vehicles
with different designs or security protocols [48]. The study (S19) underscores the need
for more research in defining attack surfaces against autonomous driving edge computing
ecosystems [45]. The study (S23) discusses potential cyber-attacks only in the context of
existing CAV technologies and traditional cyber attacks [50]. The study (S24) identifies
the need to optimize the architecture of these models due to the hard limits on computing,
memory, and power usage of automotive platforms [51].

4.3.8 Simulation and Testing


Simulations play a crucial role in the development and testing of AVs, as we observe
that many studies perform limited simulations. These include not covering all aspects
of real-world driving (S2, S3, S6), not considering unusual events or deviations from
nominal behavior (S9), and not fully capturing the complexities of real-world vehicular
networks (S10, S13) [41], [49], [56]. To demonstrate the limitation, we can mention that,
for instance, one study’s (S2) simulator’s performance is based on specific car models and
driving tracks and remains untested in other conditions [39]. Another study’s (S4) exper-
iments are limited to three vehicles only, indicating the need for more extensive testing

45
[42]. The study (S7) does not include real-world testing or validation of the proposed
countermeasures for identified failures and attacks [32]. The controlled nature of the ex-
periments in some studies (S12, S14) might limit the external validity of the findings [55],
[54]. Lastly, the study (S16) mentions limitations associated with the performance of the
PCSS network, which could affect the overall tracking performance [58].

4.3.9 Security Concerns and Cyber Attacks


By analyzing the results of the selected studies in the SLR process, we find that ex-
isting studies face many limitations regarding security Concerns and cyber Attacks. This
limitation on addressing security concerns hinders some aspects of the studies that we will
explain. The studies (S8, S10, S11) specifically mention security limitations. The method
used in one of the studies (S8) requires a secured and trusted execution environment, the
compromise of which could affect the results [46]. Another study (S10) highlights con-
cerns about the security of ECUs, and one study (S11) acknowledges that the proposed
solution does not address all possible attacks on the authentication process [49], [47]. 5
out of 24 studies (S17, S19, S20, S23, S24) all touch on different aspects of security con-
cerns. One study (S17) focuses on a single case study of a cyber-attack, and the analysis
may not cover all potential vulnerabilities in different AVs [48]. Another study (S19)
mentions technical challenges in how different vehicles’ edge computing systems coop-
erate for sensing and planning decisions and the need for industrial security verification
standards [45]. Similarly, another study (S20) brings up a security analysis that is largely
theoretical and may not fully account for the ingenuity of potential attackers [11]. One of
the mentioned studies (S23) discusses potential cyber-attacks only in the context of exist-
ing CAV technologies and traditional cyber attacks, leaving out newer or unknown threats
[50]. Lastly, One of the studies (S24) identifies the susceptibility to replay attacks due
to a lack of timestamp checking and the challenge of protecting ML/DL models against
adversarial attacks [51].

4.3.10 Scalability and Traffic Conditions


After analyzing the selected studies, a few studies mention the limitation on scalabil-
ity and traffic Conditions. The first study (S15) explicitly discusses the limitation of their
approach when considering large-scale deployments. The study acknowledges that their
solution incurs high computational costs and communication overheads, which could im-
pede scalability [53]. Moreover, The second study (S22) discusses limitations related to
scalability and real-world traffic conditions. The research tests the proposed scheme in
scenarios with 100 and 150 vehicles, which may not reflect real-world traffic conditions.
It also points out that evaluating latency over the dynamic network architecture presents
a challenge [44].

46
5 Conclusion and Future Work
5.1 Conclusion
A review of recently proposed approaches to safety and security issues for AVs is
presented in this study. An analysis of 24 selected papers published between 2019 and
2022 is conducted through an SLR. The purpose of this review is to answer the following
questions: (1) What types of methods or techniques are proposed in the existing literature?
(2) What is the evidence used for demonstrating the results? (3) What are the limitations
of the existing methods?
As part of our study, we aim to identify the current methods and techniques in this field
and investigate a variety of dimensions ranging from the methods, techniques, analysis,
and limitations of the identified studies to their practical applications. A total of 283
studies are found by conducting automated searches, of which 24 are studied in depth in
accordance with our predefined SLR protocol. As a result of analyzing and interpreting
the collected data, we discover a number of interesting findings as well as a number of
gaps and open problems that could provide insight for future research.
From our outcome, we conclude that our results are primarily relevant to the industry
of AI and autonomous vehicles. These findings summarize what is currently known about
the safety and security implications of AVs, making them suitable for application in many
different parts of the automation and AI industries. Given the limitations of time and the
university scope and timetable within which this project is accomplished, the research is
limited. Therefore, if the researchers could extend the delivery time of this study, the
results would be more comprehensive, particularly if articles published before 2019 were
included.
Ultimately, the development of methods and techniques leads to some promising ac-
complishments in the field of the safety and security of AVs in recent years. The research,
as explained, addresses some of the safety issues in AVs, some of security issues of AVs,
and proposes methods that can be used to improve autonomous vehicle systems in terms
of both safety and security. The majority of these methods and techniques develop using
new approaches and methods.
Their evaluation results support their proposed method and prove the benefits of their
proposed techniques based on the analysis of their proposed methods and techniques. In
the selected articles, various types of evaluation are used, including simulations, real-
world experiments, and physical tests. In addition to the outstanding results, we identify
many limitations of the articles, including the limitations of data sets, the analysis of
unusual events, and the verification practices within industrial security.

47
5.2 Future Work
The following two parts explain two types of future works. The first part discusses
the future work that can be done based on the limitation of the presented SLR, and the
second part discusses the future work based on the identified limitations in different AV
technologies in the field of security and safety.

1. The quality is affected because the researchers have limited time to complete the
project, and the deadline matches the university’s timetable. Therefore, the selected
articles are limited to 2019-2022. Consequently, the article’s publication range can
be extended in the future. The use of SLR standards may also assist future re-
searchers in conducting this work for more comprehensive results. In the future, we
can prioritize ensuring the safety and security of CVs instead of AVs.

2. As many identified limitations are discussed previously in this article, like the
scarcity of viable data sets, lack of real-world driving scenarios, and time-consuming
nature of line feature extraction. Using the identified limitations as a starting point,
future research can be conducted in order to further improve autonomous vehicle
safety and security.

48
References
[1] D. Rojas-rueda, M. J. Nieuwenhuijsen, H. Khreis, and H. Frumkin, “Autonomous
vehicles and public health,” Annual Review of Public Health, vol. 41,
no. 1, pp. 329–345, 2020, pMID: 32004116. [Online]. Available: https:
//doi.org/10.1146/annurev-publhealth-040119-094035

[2] M. A. Khan, H. El Sayed, S. Malik, M. T. Zia, N. Alkaabi, and J. Khan, “A jour-


ney towards fully autonomous driving-fueled by a smart communication system,”
Vehicular Communications, p. 100476, 2022.

[3] C. Gao, G. Wang, W. Shi, Z. Wang, and Y. Chen, “Autonomous driving security:
State of the art and challenges,” IEEE Internet of Things Journal, vol. 9, no. 10, pp.
7572–7595, 2022.

[4] E. Arnold, O. Y. Al-Jarrah, M. Dianati, S. Fallah, D. Oxtoby, and A. Mouzakitis, “A


survey on 3d object detection methods for autonomous driving applications,” IEEE
Transactions on Intelligent Transportation Systems, vol. 20, no. 10, pp. 3782–3795,
2019.

[5] Z. Wang, H. Wei, J. Wang, X. Zeng, and Y. Chang, “Security issues and
solutions for connected and autonomous vehicles in a sustainable city: A
survey,” Sustainability, vol. 14, no. 19, 2022. [Online]. Available: https:
//www.mdpi.com/2071-1050/14/19/12409

[6] M. Pham and K. Xiong, “A survey on security attacks and defense techniques for
connected and autonomous vehicles,” Computers & Security, vol. 109, p. 102269,
2021.

[7] Z. H. Khattak, B. L. Smith, and M. D. Fontaine, “Impact of cyberattacks on safety


and stability of connected and automated vehicle platoons under lane changes,”
Accident Analysis Prevention, vol. 150, p. 105861, 2021. [Online]. Available:
https://www.sciencedirect.com/science/article/pii/S000145752031681X

[8] D. Parekh, N. Poddar, A. Rajpurkar, M. Chahal, N. Kumar, G. P. Joshi, and W. Cho,


“A review on autonomous vehicles: Progress, methods and challenges,” Electronics,
vol. 11, no. 14, p. 2162, 2022.

[9] F. Alanazi, “A systematic literature review of autonomous and connected vehicles in


traffic management,” Applied Sciences, vol. 13, no. 3, p. 1789, 2023.

[10] A. Sheik and C. Maple, “Key security challenges for cloud-assisted connected and
autonomous vehicles,” 2019.

[11] Q. Jiang, N. Zhang, J. Ni, J. Ma, X. Ma, and K.-K. R. Choo, “Unified biometric
privacy preserving three-factor authentication and key agreement for cloud-assisted
autonomous vehicles,” IEEE Transactions on Vehicular Technology, vol. 69, no. 9,
pp. 9390–9401, 2020.

[12] J. Wang, J. Liu, and N. Kato, “Networking and communications in autonomous


driving: A survey,” IEEE Communications Surveys Tutorials, vol. 21, no. 2, pp.
1243–1274, 2019.

49
[13] J. Van Brummelen, M. O’Brien, D. Gruyer, and H. Najjaran, “Autonomous vehicle
perception: The technology of today and tomorrow,” Transportation Research
Part C: Emerging Technologies, vol. 89, pp. 384–406, 2018. [Online]. Available:
https://www.sciencedirect.com/science/article/pii/S0968090X18302134

[14] S. Keele et al., “Guidelines for performing systematic literature reviews in software
engineering,” 2007.

[15] Y. Xiao and M. Watson, “Guidance on conducting a systematic literature review,”


Journal of planning education and research, vol. 39, no. 1, pp. 93–112, 2019.

[16] V. R. Basili and D. M. Weiss, “A methodology for collecting valid software engi-
neering data,” IEEE Transactions on Software Engineering, vol. SE-10, no. 6, pp.
728–738, 1984.

[17] D. Parekh, N. Poddar, A. Rajpurkar, M. Chahal, N. Kumar, G. P. Joshi,


and W. Cho, “A review on autonomous vehicles: Progress, methods,
and challenges,” Electronics, vol. 11, no. 14, 2022. [Online]. Available:
https://www.mdpi.com/2079-9292/11/14/2162

[18] A. Faisal, M. Kamruzzaman, T. Yigitcanlar, and G. Currie, “Understanding au-


tonomous vehicles,” Journal of transport and land use, vol. 12, no. 1, pp. 45–72,
2019.

[19] A. Alsalman, L. N. Assi, S. Ghotbi, S. Ghahari, and A. Shubbar, “Users, planners,


and governments perspectives: A public survey on autonomous vehicles future ad-
vancements,” Transportation Engineering, vol. 3, p. 100044, 2021.

[20] F. Khan, R. L. Kumar, S. Kadry, Y. Nam, and M. N. Meqdad, “Autonomous vehi-


cles: A study of implementation and security.” International Journal of Electrical &
Computer Engineering (2088-8708), vol. 11, no. 4, 2021.

[21] M. N. Ahangar, Q. Z. Ahmed, F. A. Khan, and M. Hafeez, “A survey of autonomous


vehicles: Enabling communication technologies and challenges,” Sensors, vol. 21,
no. 3, p. 706, 2021.

[22] M. Taraba, J. Adamec, M. Danko, and P. Drgona, “Utilization of modern sensors in


autonomous vehicles,” in 2018 ELEKTRO. IEEE, 2018, pp. 1–5.

[23] Y. Li and J. Ibanez-Guzman, “Lidar for autonomous driving: The principles, chal-
lenges, and trends for automotive lidar and perception systems,” IEEE Signal Pro-
cessing Magazine, vol. 37, no. 4, pp. 50–61, 2020.

[24] D. Perea-Strom, A. Morell, J. Toledo, and L. Acosta, “Gnss integration in the local-
ization system of an autonomous vehicle based on particle weighting,” IEEE Sensors
Journal, vol. 20, no. 6, pp. 3314–3323, 2019.

[25] V. Milanés, J. E. Naranjo, C. González, J. Alonso, and T. de Pedro, “Autonomous


vehicle based in cooperative gps and inertial systems,” Robotica, vol. 26, no. 5, pp.
627–633, 2008.

[26] J. Kocić, N. Jovičić, and V. Drndarević, “Sensors and sensor fusion in autonomous
vehicles,” in 2018 26th Telecommunications Forum (TELFOR). IEEE, 2018, pp.
420–425.

50
[27] D. J. Hicks, “The safety of autonomous vehicles: Lessons from philosophy of sci-
ence,” IEEE Technology and Society Magazine, vol. 37, no. 1, pp. 62–69, 2018.

[28] M. Gerstmair, A. Melzer, A. Onic, and M. Huemer, “On the safe road toward au-
tonomous driving: Phase noise monitoring in radar sensors for functional safety
compliance,” IEEE Signal Processing Magazine, vol. 36, no. 5, pp. 60–70, 2019.

[29] H. Tan, C. Chen, and Y. Hao, “How people perceive and expect safety in autonomous
vehicles: An empirical study for risk sensitivity and risk-related feelings,” Interna-
tional Journal of Human–Computer Interaction, vol. 37, no. 4, pp. 340–351, 2021.

[30] J. Wang, L. Zhang, Y. Huang, J. Zhao, and F. Bella, “Safety of autonomous vehi-
cles,” Journal of advanced transportation, vol. 2020, pp. 1–13, 2020.

[31] R. Mariani, “An overview of autonomous vehicles safety,” in 2018 IEEE Interna-
tional Reliability Physics Symposium (IRPS). IEEE, 2018, pp. 6A–1.

[32] A. Chattopadhyay, K.-Y. Lam, and Y. Tavva, “Autonomous vehicle: Security by


design,” IEEE Transactions on Intelligent Transportation Systems, vol. 22, no. 11,
pp. 7015–7029, 2020.

[33] M. Pham and K. Xiong, “A survey on security attacks and defense techniques for
connected and autonomous vehicles,” Computers & Security, vol. 109, p. 102269,
2021.

[34] A. Nanda, D. Puthal, J. J. Rodrigues, and S. A. Kozlov, “Internet of autonomous


vehicles communications security: overview, issues, and directions,” IEEE Wireless
Communications, vol. 26, no. 4, pp. 60–65, 2019.

[35] J. Wang, Y. Shao, Y. Ge, and R. Yu, “A survey of vehicle to everything (v2x) testing,”
Sensors, vol. 19, no. 2, p. 334, 2019.

[36] M. Ismail, A. Tarek, P. M. Plaza, D. M. Gomez, J. M. Armingol, and M. Abde-


laziz, “Advanced mapping and localization for autonomous vehicles using osm,” in
2019 IEEE International Conference on Vehicular Electronics and Safety (ICVES).
IEEE, 2019, pp. 1–6.

[37] J. Laconte, A. Kasmi, R. Aufrère, M. Vaidis, and R. Chapuis, “A survey of local-


ization methods for autonomous vehicles in highway scenarios,” Sensors, vol. 22,
no. 1, p. 247, 2021.

[38] S.-J. Hsieh, A. R. Wang, A. Madison, C. Tossell, and E. de Visser, “Adaptive driving
assistant model (adam) for advising drivers of autonomous vehicles,” ACM Trans-
actions on Interactive Intelligent Systems (TiiS), vol. 12, no. 3, pp. 1–28, 2022.

[39] A. Santara, S. Rudra, S. A. Buridi, M. Kaushik, A. Naik, B. Kaul, and B. Ravindran,


“Madras: Multi agent driving simulator,” Journal of Artificial Intelligence Research,
vol. 70, pp. 1517–1555, 2021.

[40] M. Khayatian, Y. Lou, M. Mehrabian, and A. Shirvastava, “Crossroads+: A


time-aware approach for intersection management of connected autonomous
vehicles,” ACM Trans. Cyber-Phys. Syst., vol. 4, no. 2, nov 2019. [Online].
Available: https://doi-org.proxy.lnu.se/10.1145/3364182

51
[41] Y. Wang, Z. Liu, Z. Zuo, Z. Li, L. Wang, and X. Luo, “Trajectory planning and
safety assessment of autonomous vehicles based on motion prediction and model
predictive control,” IEEE Transactions on Vehicular Technology, vol. 68, no. 9, pp.
8546–8556, 2019.
[42] L. M. Castiglione, P. Falcone, A. Petrillo, S. P. Romano, and S. Santini, “Coopera-
tive intersection crossing over 5g,” IEEE/ACM Transactions on Networking, vol. 29,
no. 1, pp. 303–317, 2020.
[43] R. Wong, J. White, S. Gill, and S. Tayeb, “Virtual traffic light implementation on
a roadside unit over 802.11 p wireless access in vehicular environments,” Sensors,
vol. 22, no. 20, p. 7699, 2022.
[44] S. Ansari, J. Ahmad, S. Aziz Shah, A. Kashif Bashir, T. Boutaleb, and S. Sinanovic,
“Chaos-based privacy preserving vehicle safety protocol for 5g connected au-
tonomous vehicle networks,” Transactions on Emerging Telecommunications Tech-
nologies, vol. 31, no. 5, p. e3966, 2020.
[45] S. Liu, L. Liu, J. Tang, B. Yu, Y. Wang, and W. Shi, “Edge computing for au-
tonomous driving: Opportunities and challenges,” Proceedings of the IEEE, vol.
107, no. 8, pp. 1697–1716, 2019.
[46] J. Cui, G. Sabaliauskaite, L. S. Liew, F. Zhou, and B. Zhang, “Collaborative analysis
framework of safety and security for autonomous vehicles,” IEEE Access, vol. 7, pp.
148 672–148 683, 2019.
[47] R. Passerone, D. Cancila, M. Albano, S. Mouelhi, S. Plosz, E. Jantunen,
A. Ryabokon, E. Laarouchi, C. Hegedűs, and P. Varga, “A methodology for the de-
sign of safety-compliant and secure communication of autonomous vehicles,” IEEE
Access, vol. 7, pp. 125 022–125 037, 2019.
[48] A. O. Al Zaabi, C. Y. Yeun, E. Damiani, and G. Lee, “An enhanced conceptual
security model for autonomous vehicles,” 2020.
[49] Y. Zhao, Y. Wang, X. Cheng, H. Chen, H. Yu, and Y. Ren, “Rfap: A revocable fine-
grained access control mechanism for autonomous vehicle platoon,” IEEE Transac-
tions on Intelligent Transportation Systems, vol. 23, no. 7, pp. 9668–9679, 2021.
[50] Q. He, X. Meng, and R. Qu, “Towards a severity assessment method for potential
cyber attacks to connected and autonomous vehicles,” Journal of advanced trans-
portation, vol. 2020, pp. 1–15, 2020.
[51] Z. El-Rewini, K. Sadatsharan, D. F. Selvaraj, S. J. Plathottam, and P. Ranganathan,
“Cybersecurity challenges in vehicular communications,” Vehicular Communica-
tions, vol. 23, p. 100214, 2020.
[52] N. Jiang, D. Huang, J. Chen, J. Wen, H. Zhang, and H. Chen, “Semi-direct
monocular visual-inertial odometry using point and line features for iov,”
ACM Trans. Internet Technol., vol. 22, no. 1, sep 2021. [Online]. Available:
https://doi-org.proxy.lnu.se/10.1145/3432248
[53] R. Bi, J. Xiong, Y. Tian, Q. Li, and K.-K. R. Choo, “Achieving lightweight and
privacy-preserving object detection for connected autonomous vehicles,” IEEE In-
ternet of Things Journal, 2022.

52
[54] V. Sharma and L. Kumar, “Photonic-radar based multiple-target tracking under com-
plex traffic-environments,” IEEE Access, vol. 8, pp. 225 845–225 856, 2020.

[55] R. Changalvala and H. Malik, “Lidar data integrity verification for autonomous ve-
hicle,” IEEE Access, vol. 7, pp. 138 018–138 031, 2019.

[56] Y. Yuan, R. Tasik, S. S. Adhatarao, Y. Yuan, Z. Liu, and X. Fu, “Race: Reinforced
cooperative autonomous vehicle collision avoidance,” IEEE transactions on vehicu-
lar technology, vol. 69, no. 9, pp. 9279–9291, 2020.

[57] B. Zheng, C.-W. Lin, S. Shiraishi, and Q. Zhu, “Design and analysis of delay-
tolerant intelligent intersection management,” ACM Transactions on Cyber-Physical
Systems, vol. 4, no. 1, pp. 1–27, 2019.

[58] S. Kim, J. Ha, and K. Jo, “Semantic point cloud-based adaptive multiple object
detection and tracking for autonomous vehicles,” IEEE Access, vol. 9, pp. 157 550–
157 562, 2021.

[59] Ø. Volden, P. Solnør, S. Petrovic, and T. I. Fossen, “Secure and efficient transmission
of vision-based feedback control signals,” Journal of Intelligent & Robotic Systems,
vol. 103, no. 2, p. 26, 2021.

53
A Appendix 1

ID Full Reference
S.-J. Hsieh, A. R. Wang, A. Madison, C. Tossell, and E. de Visser, “Adaptive driving
S1 assistant model (adam) for advising drivers of autonomous vehicles,”ACM Trans
-actions on Interactive Intelligent Systems (TiiS), vol. 12, no. 3, pp. 1–28, 2022.
A. Santara, S. Rudra, S. A. Buridi, M. Kaushik, A. Naik, B. Kaul, and B. Ravindran,
S2 “Madras: Multi agent driving simulator,” Journal of Artificial Intelligence Research,
vol. 70, pp. 1517–1555, 2021.
M. Khayatian, Y. Lou, M. Mehrabian, and A. Shirvastava, “Crossroads+: A
time-aware approach for intersection management of connected autonomous
S3
vehicles,” ACM Trans. Cyber-Phys. Syst., vol. 4, no. 2, nov 2019. [Online].
Available: https://doi-org.proxy.lnu.se/10.1145/3364182
L. M. Castiglione, P. Falcone, A. Petrillo, S. P. Romano, and S. Santini, “Coopera
S4 - tive intersection crossing over 5g,” IEEE/ACM Transactions on Networking, vol. 29,
no. 1, pp. 303–317, 2020.
N. Jiang, D. Huang, J. Chen, J. Wen, H. Zhang, and H. Chen, “Semi-direct
monocular visual-inertial odometry using point and line features for iov,”
S5
ACM Trans. Internet Technol., vol. 22, no. 1, sep 2021. [Online]. Available:
https://doi-org.proxy.lnu.se/10.1145/3432248
B. Zheng, C.-W. Lin, S. Shiraishi, and Q. Zhu, “Design and analysis of delay-
S6 tolerant intelligent intersection management,” ACM Transactions on Cyber-Physical
Systems, vol. 4, no. 1, pp. 1–27, 2019.
A. Chattopadhyay, K.-Y. Lam, and Y. Tavva, “Autonomous vehicle: Security by
S7 design,” IEEE Transactions on Intelligent Transportation Systems, vol. 22, no. 11,
pp. 7015–7029, 2020.
J. Cui, G. Sabaliauskaite, L. S. Liew, F. Zhou, and B. Zhang, “Collaborative analysis
S8 framework of safety and security for autonomous vehicles,” IEEE Access, vol. 7, pp.
148 672–148 683, 2019.
Y. Wang, Z. Liu, Z. Zuo, Z. Li, L. Wang, and X. Luo, “Trajectory planning and
safety assessment of autonomous vehicles based on motion prediction and model
S9
predictive control,” IEEE Transactions on Vehicular Technology, vol. 68, no. 9, pp.
8546–8556, 2019.
Y. Zhao, Y. Wang, X. Cheng, H. Chen, H. Yu, and Y. Ren, “Rfap: A revocable fine-
S10 grained access control mechanism for autonomous vehicle platoon,” IEEE Transac-
tions on Intelligent Transportation Systems, vol. 23, no. 7, pp. 9668–9679, 2021.
R. Passerone, D. Cancila, M. Albano, S. Mouelhi, S. Plosz, E. Jantunen,
A. Ryabokon, E. Laarouchi, C. Heged us, and P. Varga, “A methodology for the de-
S11
sign of safety-compliant and secure communication of autonomous vehicles,” IEEE
Access, vol. 7, pp. 125 022–125 037, 2019.
R. Changalvala and H. Malik, “LiDAR data integrity verification for autonomous ve-
S12
hicle,” IEEE Access, vol. 7, pp. 138 018–138 031, 2019.
Y. Yuan, R. Tasik, S. S. Adhatarao, Y. Yuan, Z. Liu, and X. Fu, “Race: Reinforced
S13 cooperative autonomous vehicle collision avoidance,” IEEE transactions on vehicu-
lar technology, vol. 69, no. 9, pp. 9279–9291, 2020.
V. Sharma and L. Kumar, “Photonic-radar based multiple-target tracking under com-
S14
plex traffic-environments,” IEEE Access, vol. 8, pp. 225 845–225 856, 2020.

A
ID Full Reference
R. Bi, J. Xiong, Y. Tian, Q. Li, and K.-K. R. Choo, “Achieving lightweight and
S15 privacy-preserving object detection for connected autonomous vehicles,” IEEE In-
ternet of Things Journal, 2022.
S. Kim, J. Ha, and K. Jo, “Semantic point cloud-based adaptive multiple object
S16 detection and tracking for autonomous vehicles,” IEEE Access, vol. 9, pp. 157 550–
157 562, 2021.
A. O. Al Zaabi, C. Y. Yeun, E. Damiani, and G. Lee, “An enhanced conceptual
S17
security model for autonomous vehicles,” 2020.
R. Wong, J. White, S. Gill, and S. Tayeb, “Virtual traffic light implementation on
S18 a roadside unit over 802.11 p wireless access in vehicular environments,” Sensors,
vol. 22, no. 20, p. 7699, 2022.
S. Liu, L. Liu, J. Tang, B. Yu, Y. Wang, and W. Shi, “Edge computing for au-
S19 tonomous driving: Opportunities and challenges,” Proceedings of the IEEE, vol.
107, no. 8, pp. 1697–1716, 2019.
Q. Jiang, N. Zhang, J. Ni, J. Ma, X. Ma, and K.-K. R. Choo, “Unified biometric
privacy preserving three-factor authentication and key agreement for cloud-assisted
S20
autonomous vehicles,” IEEE Transactions on Vehicular Technology, vol. 69, no. 9,
pp. 9390–9401, 2020.
Ø. Volden, P. Solnør, S. Petrovic, and T. I. Fossen, “Secure and efficient transmission
S21 of vision-based feedback control signals,” Journal of Intelligent & Robotic Systems,
vol. 103, no. 2, p. 26, 2021.
S. Ansari, J. Ahmad, S. Aziz Shah, A. Kashif Bashir, T. Boutaleb, and S. Sinanovic,
“Chaos-based privacy preserving vehicle safety protocol for 5g connected au-
S22
tonomous vehicle networks,” Transactions on Emerging Telecommunications Tech-
nologies, vol. 31, no. 5, p. e3966, 2020.
Q. He, X. Meng, and R. Qu, “Towards a severity assessment method for potential
S23 cyber attacks to connected and autonomous vehicles,” Journal of advanced trans-
portation, vol. 2020, pp. 1–15, 2020.
Z. El-Rewini, K. Sadatsharan, D. F. Selvaraj, S. J. Plathottam, and P. Ranganathan,
S24 “Cybersecurity challenges in vehicular communications,” Vehicular Communica-
tions, vol. 23, p. 100214, 2020.
Table 1.8: Full References

B
B Appendix 2
Abbreviations are integral to daily communication in today’s fast-paced world with
lightning-fast information exchange. Abbreviations offer an efficient and concise way
to convey complex or lengthy ideas, from acronyms and initialisms to short forms and
shorthand. The following table describes the abbreviation used in this study.

Abbreviation Definition
AVs Autonomous Vehicles
CAVs Connected Autonomous Vehicles
V2I Vehicle-To-Infrastructure
V2V Vehicle-To-Vehicle
OBS On-Board Software
V2X Vehicle-To-Everything
ECUs Electronic Control Units
ITS Intelligent Transportation Systems
CT-AKA Cloud-centric Three-factor Authentication and Key Agreement
SLR Systematic Literature Review
IoT Internet of Things
R&D Research and Development
CVs Connected Vehicles
SAE Society of Automotive Engineers
RSUs Road-side Units
FuSa Functional Safety
ISO International Organization For Standardization
MMW Millimeter Wave
IoV Internet of Vehicles
IoAVs Internet of Autonomous Vehicles
OBU Onboard Unit
VANETs Mobile Ad-hoc Networks
TA Trusted Authority
IVC Inter-Vehicle Communication
MIVC Multi-hop Inter-Vehicle Communication
SIVC Single-hop Inter-Vehicle Communication
ACC Adaptive Cruise Control
BSD Blind Spot Detection
FCWS Forward Collision Warning Systems
AEB Automatic Emergency Braking Systems
LDWS Lane Departure Warning Systems
RVC Roadside-to-vehicle Communication
SRVCs Sparse RVCs
URVCs Ubiquitous RVCs
V2P Vehicle to Pedestrian
V2N Vehicle to Network
V2C Vehicle to Cloud
V2X Vehicle to Everything
LTE-V2X Long Term Evolution
DSRC Dedicated Short Range Communication
Continued on next page

C
List of Abbreviation
Abbreviation Definition
VC Vehicle Communication System
UWB Ultra-Wide Band
WAVE Wireless Access in Vehicular Environment
OBUs On Board Units
RSUs Remote Status Units
C-V2X Cellular-vehicle to Everything
3GPP Third Generation Partnership Project
5G-NR 5G-new Radio
RTK Real-time kinetics
ADAF Adaptive Detection and Recognition Framework
UOR Obstacle Recognition
VPL Vehicle Positioning and Localization Module
LDWS Lane Departure Warning System
TSR Traffic Sign Recognition
SPA Self-Parking Assistance
RADAR Radio Detection and Ranging
LiDAR Light Detection and Ranging
DL Deep Learning
FoV Field of View
NIR Near-infrared
MEMS Micro Electromechanical System
CMOS Complementary Metal Oxide Semiconductors
CCDs Charge-coupled Devices
RGB Red, Green, and Blue
IR Infrared
GNSS Global Navigation Satellite System
GPS Global Positioning System
IMU Inertial Measurement Unit
TOF Time of Flight
DR Dead Reckoning
DGPS Differential Global Positioning System
INS Inertial Navigation Systems
KF Kalman Filter
OSM OpenStreetMap
OGM Occupancy Grid Maps
HMM Hidden Markov Model
RLL Road-level Localization
ELL Ego-lane Level Localization
LLL Lane-level Localization
ADAM Adaptive Driving Assistant Model
MADRaS Multi-Agent Driving Simulator
SDMPL-VIO Semi-Direct Monocular Visual-Inertial Odometry
RFAP Revocable Fine-Grained Access Control
P2OD Privacy-preserving Object Detection
ANN A Neural Network
SVM Support Vector Machine
Continued on next page

D
List of Abbreviation
Abbreviation Definition
RF Random Forest
PPO Proximal Policy Optimization
RL ReinforcementLearning
IM IntersectionManager
RTD Round-Trip Delay
SUMO Simulation of Urban MObility
RFAP Revocation for AVP
PPT Probabilistic Polynomial-time
QIM Quantization Index Modulation
ADAS Advanced Driver Assistance Systems
CNN Convolutional Neural Network
R-CNN Reconvolutional Neural Network
MODT Multiple Object Detection and Tracking
CAN Controller Area Network
ROS Robot Operating System
CRAN Cloud Radio Access Network
TD-ERCS Tangent-Delay Ellipse Reflecting Cavity-Map System
AI Artificial Intelligence
CSs Curve Speed Standard Deviation
RTT Round Trip Time
KF Keyframe
IST Inliers Scale Threshold
RE Relative Error
SS Safety and Security
AVP Autonomous Vehicle Platoon
TORCS The Open Racing Car Simulator
RACE Reinforced Cooperative Autonomous Vehicle Collision AvoidancE
ADVs Autonomous Driving Vehicles
POMDP Partially Observable Markov Decision Process
MOTA Multiple Object Tracking Accuracy
MOTP Multiple Object Tracking Precision
IDS Identity Switches
SPC Semantic Point Cloud
VIM Virtual Intersection Management
SDRs Software Defined Radios
FPGA Field-Programmable Gate Array
ECUs Edge Computing Units
FOI Fake Object Insertion
TOD Target Object Deletion
SRU Secure ReLU
SMP Secure Max-pooling
PCSS Point Cloud Semantic Segmentation
FPS Frames Per Second
MECUs Mother ECUs
NHTSA National Highway Traffic Safety Administration
DOT Department of Transportation
Continued on next page

E
List of Abbreviation
Abbreviation Definition
HAVs Highly Automated Vehicles
ABS Antilock Braking System
ADASs Advanced Driver Assistance Systems
AD Autonomous Driving
GQM Goal-Question-Metric
DAL Driving Automation Level
HARA Hazard Analysis and Risk Assessment
TARA The Analysis and Risk Assessment

You might also like