Skip to main content

Showing 1–2 of 2 results for author: Jedh, M B

Searching in archive cs. Search in all archives.
.
  1. arXiv:2302.00876  [pdf, other

    cs.CR eess.SY

    Improvement and Evaluation of Resilience of Adaptive Cruise Control Against Spoofing Attacks Using Intrusion Detection System

    Authors: Mubark B. Jedh, Lotfi ben Othmane, Arun K. Somani

    Abstract: The Adaptive Cruise Control (ACC) system automatically adjusts the vehicle speed to maintain a safe distance between the vehicle and the lead (ahead) vehicle. The controller's decision to accelerate or decelerate is computed using the target speed of the vehicle and the difference between the vehicle's distance to the lead vehicle and the safe distance from that vehicle. Spoofing the vehicle speed… ▽ More

    Submitted 1 February, 2023; originally announced February 2023.

  2. arXiv:2201.06680  [pdf, other

    cs.CR

    Evaluation of the Architecture Alternatives for Real-time Intrusion Detection Systems for Connected Vehicles

    Authors: Mubark B Jedh, Jian Kai Lee, Lotfi ben Othmane

    Abstract: Attackers demonstrated the use of remote access to the in-vehicle network of connected vehicles to launch cyber-attacks and remotely take control of these vehicles. Machine-learning-based Intrusion Detection Systems (IDSs) techniques have been proposed for the detection of such attacks. The evaluation of some of these IDS demonstrated their efficacy in terms of accuracy in detecting message inject… ▽ More

    Submitted 17 January, 2022; originally announced January 2022.