Security of Emergent Automotive Systems: a Tutorial Introduction and Perspectives on Practice

Total Page:16

File Type:pdf, Size:1020Kb

Security of Emergent Automotive Systems: a Tutorial Introduction and Perspectives on Practice Survey Security of Emergent Automotive Systems: A Tutorial Introduction and Perspectives on Practice Anthony Lopez, Arnav Vaibhav Malawade, Srivalli Boddupalli and Sandip Ray and Mohammad Abdullah Al Faruque University of Florida at Gainesville University of California at Irvine be accomplished under hard real-time Editor’s note: requirements. for example, a pedestrian Emerging automotive systems are governed by various complicated detec tion algorithm must complete a hardware and software systems. Hence, security is an important issue in slew of complex activities, including the highly interconnected automotive systems. This article presents a survey of capture of sensory data, aggregation, current automotive security research. communication, analytics, image pro- —Partha Pratim Pande, Washington State University cessing, security analysis, and so on, within the time constraints to enable THE LAST FEW DECADES have seen a transfor- successful completion of the appropriate actuarial mation in automotive systems from mechanical response such as warning the driver or automatical or electromechanical systems to electronic, soft- braking. Furthermore, the complexity is anticipated ware-based systems. Modern automotive systems are to rise sharply with increasing autonomy levels in complex distributed systems involving the coordina- vehicles. For instance, a future self-driving car with tion of hundreds of electronic control units (ECUs) autonomy level 4 will include several elements not communicating through a variety of in-vehicle available in today’s (level 2) systems. The following networks and the execution of several hundred are some example elements. megabytes of software. However, they induce two • Vehicle-to-vehicle ( V2V) and vehicle-to-infra- additional constraints that result in significant design structure ( V2I) communications with a variety of complexities beyond traditional distributed systems. networks of different levels of trustworthiness. First, the systems are cyber–physical: the ECUs coor- • A diversity of sensors to detect driving conditions dinate, monitor, and control a variety of sensors (e.g., potholes, moisture, pedestrians, etc.). and actuators including light detection and ranging • Distributed computing elements to perform (LIDAR), cameras, radar, light matrices, devices for in- vehicle analytics and react to evolving condi- sensing angular momentum of the wheels, devices for tions on the fly. automated brake and steering control, and so on. Second, many computation and communi ca tion tasks Security is obviously of paramount impor- across different ECUs, sensors, and actuators must tance for automotive systems. Given that the sys- tem involves the complex interaction of sensory, actuarial, and computational elements, an inno- Digital Object Identifier 10.1109/MDAT.2019.2944086 Date of publication: 27 September 2019; date of current cent misconfiguration or error in one component version: 31 October 2019. may result in a subtle vulnerability that can be 10 2168-2356/19©2019 IEEE Copublished by the IEEE CEDA, IEEE CASS, IEEE SSCS, and TTTC IEEE Design&Test exploited in field with potentially catastrophic This article represents the first step to address consequences. A recent work has shown that it the above problem. Our goal is to provide a com- is viable, and even relatively straightforward, to prehensive, systematic overview of both research hack a vehicle remotely, get control over its driv- and practice in automotive security. We develop a ing functionality, and cause an accident. The sit- systematic categorization of research advances in uation will be exacerbated in the future with the various aspects of both attacks and defenses on increase in autonomy level and the reliance on automotive electronics. Furthermore, we discuss sensors and communications—an attacker may current practices in security assurance, point out the hack a vehicle remotely through the interception constraints and tradeoffs, and provide perspectives or tampering of sensor data and/or V2V and V2I on the rationale involved. Our objective is to make messages without requiring physical access or this article a comprehensive one for a researcher to even proximity to the vehicle under attack, thus begin investigation on all aspects of the security of resulting in a sharp increase in the attack surface. connected and autonomous vehicles. Consequently, the proliferation and adoption of Background autonomous, self-driving cars critically depend on our ability to ensure that they perform securely Electronics and software in modern in a potentially adversarial environment [125], automotive systems [126]. Unsurprisingly, there has been a large inter- The transformation of automotive systems from est in recent years in the security of automotive a mechanical or an electromechanical system to systems, with a flurry of publications demon- a chiefly electronic one arguably began with the strating a diversity of security vulnerabilities and development of engine control and fuel injection exploits, as well as techniques for defense against systems in the 1970s. Starting from the 1990s, the these ­vulnerabilities. design complexity of automotive systems has been Unfortunately, in spite of this interest, there has dominated by electronic parts, with more focus on been little effort to consolidate, structure, and unify software components in the last decade. Today’s this large body of research. Consequently, pub- cars include electronics and software for infotain- lications in the area typically appear as isolated ment, driver assistance [advanced driver-assistance approaches for specific attacks or defenses, rather system (ADAS)], and energy efficiency (e.g., emis- than a disciplined study of security challenges or sion control), to name a few. The electronic and soft- systematic approaches to counter them. Further- ware components in an automobile (which we will more, much of the research on automotive secu- loosely refer to as electronics) are typically divided rity is conflated with other related areas on security into five functional domains: assurance with analogous but different challenges, • Telematics: This includes the multimedia and info- including wearables, the Internet of Things (IoT), tainment components of the car, including radio, or even traditional hardware and software designs. rear-seat entertainment, and navigation systems. Finally, there has been an increasing divergence • Body: This includes air-conditioning and climate between academic research and industrial prac- control, the electronic dashboard, power doors, tice in the area, each of which has evolved inde- seats, windows, mirrors, lights, park distance pendently with little interaction and, in some control, and so on. cases, with little understanding of the assump- • Chassis: This includes features such as the anti- tions, issues, tradeoffs, and scales considered by lock braking system (ABS), stability control, the other. All this leaves a researcher getting initi- adaptive cruise control, and so on. ated in this area with the daunting tasks of sifting • Powertrain: This includes the electronics for con- through the various challenges, complexities, and trolling the engine, fuel injection, transmission research directions; identifying approaches appli- gear, ignition timing, and so on. cable to automotive systems in particular; and • Passive safety: This includes all the electronics comprehending evolving challenges caused by the designed to add safety mechanisms, including rising complexity of these systems through the past, roll-over sensors, airbags, belt pretensioners, present, and future. and so on. November/December 2019 11 Survey Obviously, many automotive features cross- Security requirements cut a variety of functional domains. For example, Traditionally, the security of functional safety of many modern cars include speed-compensated electrical/electronic/programmable electronic (E/E/ volume adjustment, that is, adjustment of multi- PE) safety-related system includes the following media volume in response to increasing speed of foundational pillars: confidentiality, integrity, and the car. This requires communication between the availability, also referred to as the CIA pillars [57]. radio (part of telematics) and ADAS components. More recently, authentication and repudiation have Other similar examples include automatic brak- been added as additional pillars, particularly for ing while reversing if the backup camera senses a communicating systems and devices. child or small obstacle and showing the reversing trajectory on display (which requires computation • Confidentiality: This refers to the requirement that of angular momentum of the wheels). To enable sensitive, critical system information and data these features, automotive system architectures are not perceivable by parties who are not the involve significant and complex communication intended recipients. among the different in-vehicle components. This • Integrity: This refers to the requirement that an is implemented through a variety of protocols unauthorized entity cannot corrupt or modify including controller area network bus (CAN-Bus), sensitive data or information. In the context of local interconnect network (LIN), FlexRay, and communicating agents, integrity involves the media- oriented systems transport (MOST). Figure 1 requirement that data received is not different shows a representative automotive architecture. from what was originally intended to be sent. Fur- In addition to
Recommended publications
  • Intrusion Detection System for Automotive Controller Area Network (CAN) Bus System: a Review Siti-Farhana Lokman* , Abu Talib Othman and Muhammad-Husaini Abu-Bakar
    Lokman et al. EURASIP Journal on Wireless Communications and Networking (2019) 2019:184 https://doi.org/10.1186/s13638-019-1484-3 REVIEW Open Access Intrusion detection system for automotive Controller Area Network (CAN) bus system: a review Siti-Farhana Lokman* , Abu Talib Othman and Muhammad-Husaini Abu-Bakar Abstract The modern vehicles nowadays are managed by networked controllers. Most of the networks were designed with little concern about security which has recently motivated researchers to demonstrate various kinds of attacks against the system. In this paper, we discussed the vulnerabilities of the Controller Area Network (CAN) within in- vehicle communication protocol along with some potential attacks that could be exploited against it. Besides, we present some of the security solutions proposed in the current state of research in order to overcome the attacks. However, the main goal of this paper is to highlight a holistic approach known as intrusion detection system (IDS) which has been a significant tool in securing networks and information systems over the past decades. To the best of our knowledge, there is no recorded literature on a comprehensive overview of IDS implementation specifically in the CAN bus network system. Thus, we proposed an in-depth investigation of IDS found in the literature based on the following aspects: detection approaches, deployment strategies, attacking techniques, and finally technical challenges. In addition, we also categorized the anomaly-based IDS according to these methods, e.g., frequency- based, machine learning-based, statistical-based, and hybrid-based as part of our contributions. Correspondingly, this study will help to accelerate other researchers to pursue IDS research in the CAN bus system.
    [Show full text]
  • A Survey of Autonomous Driving: Common Practices and Emerging Technologies
    Accepted March 22, 2020 Digital Object Identifier 10.1109/ACCESS.2020.2983149 A Survey of Autonomous Driving: Common Practices and Emerging Technologies EKIM YURTSEVER1, (Member, IEEE), JACOB LAMBERT 1, ALEXANDER CARBALLO 1, (Member, IEEE), AND KAZUYA TAKEDA 1, 2, (Senior Member, IEEE) 1Nagoya University, Furo-cho, Nagoya, 464-8603, Japan 2Tier4 Inc. Nagoya, Japan Corresponding author: Ekim Yurtsever (e-mail: [email protected]). ABSTRACT Automated driving systems (ADSs) promise a safe, comfortable and efficient driving experience. However, fatalities involving vehicles equipped with ADSs are on the rise. The full potential of ADSs cannot be realized unless the robustness of state-of-the-art is improved further. This paper discusses unsolved problems and surveys the technical aspect of automated driving. Studies regarding present challenges, high- level system architectures, emerging methodologies and core functions including localization, mapping, perception, planning, and human machine interfaces, were thoroughly reviewed. Furthermore, many state- of-the-art algorithms were implemented and compared on our own platform in a real-world driving setting. The paper concludes with an overview of available datasets and tools for ADS development. INDEX TERMS Autonomous Vehicles, Control, Robotics, Automation, Intelligent Vehicles, Intelligent Transportation Systems I. INTRODUCTION necessary here. CCORDING to a recent technical report by the Eureka Project PROMETHEUS [11] was carried out in A National Highway Traffic Safety Administration Europe between 1987-1995, and it was one of the earliest (NHTSA), 94% of road accidents are caused by human major automated driving studies. The project led to the errors [1]. Against this backdrop, Automated Driving Sys- development of VITA II by Daimler-Benz, which succeeded tems (ADSs) are being developed with the promise of in automatically driving on highways [12].
    [Show full text]
  • A Survey of Autonomous Vehicles: Enabling Communication Technologies and Challenges
    sensors Review A Survey of Autonomous Vehicles: Enabling Communication Technologies and Challenges M. Nadeem Ahangar 1, Qasim Z. Ahmed 1,*, Fahd A. Khan 2 and Maryam Hafeez 1 1 School of Computing and Engineering, University of Huddersfield, Huddersfield HD1 3DH, UK; [email protected] (M.N.A.); [email protected] (M.H.) 2 School of Electrical Engineering and Computer Science, National University of Sciences and Technology, Islamabad 44000, Pakistan; [email protected] * Correspondence: [email protected] Abstract: The Department of Transport in the United Kingdom recorded 25,080 motor vehicle fatali- ties in 2019. This situation stresses the need for an intelligent transport system (ITS) that improves road safety and security by avoiding human errors with the use of autonomous vehicles (AVs). There- fore, this survey discusses the current development of two main components of an ITS: (1) gathering of AVs surrounding data using sensors; and (2) enabling vehicular communication technologies. First, the paper discusses various sensors and their role in AVs. Then, various communication tech- nologies for AVs to facilitate vehicle to everything (V2X) communication are discussed. Based on the transmission range, these technologies are grouped into three main categories: long-range, medium- range and short-range. The short-range group presents the development of Bluetooth, ZigBee and ultra-wide band communication for AVs. The medium-range examines the properties of dedicated short-range communications (DSRC). Finally, the long-range group presents the cellular-vehicle to everything (C-V2X) and 5G-new radio (5G-NR). An important characteristic which differentiates each category and its suitable application is latency.
    [Show full text]
  • Automotive Cybersecurity: Foundations for Next-Generation Vehicles
    Automotive Cybersecurity: Foundations for Next-Generation Vehicles Michele Scalas, Student Member, IEEE Giorgio Giacinto, Senior Member, IEEE Department of Electrical and Electronic Engineering Department of Electrical and Electronic Engineering University of Cagliari University of Cagliari Cagliari, Italy Cagliari, Italy [email protected] [email protected] Abstract—The automotive industry is experiencing a serious Vehicle-to-Vehicle), with a generic infrastructure (V2I) or with transformation due to a digitalisation process and the transition pedestrians (V2P). The typical application of these models is to the new paradigm of Mobility-as-a-Service. The next-generation smart cities, with the aim of optimising traffic management, vehicles are going to be very complex cyber-physical systems, whose design must be reinvented to fulfil the increasing demand sending alerts in case of incidents, coordinating a fleet of of smart services, both for safety and entertainment purposes, vehicles. causing the manufacturers’ model to converge towards that of As regards autonomous driving, it consists in expanding the IT companies. Connected cars and autonomous driving are the current Advanced Driver Assistance Systems (ADASs), such preeminent factors that drive along this route, and they cause the as lane keeping and braking assistants, in order to obtain a necessity of a new design to address the emerging cybersecurity issues: the ”old” automotive architecture relied on a single closed fully autonomous driverless car. The Society of Automotive network, with no external communications; modern vehicles are Engineers (SAE) provides, in fact, six possible levels of going to be always connected indeed, which means the attack autonomy, from level 0, with no assistance, to level 5, where surface will be much more extended.
    [Show full text]
  • Securing the Modern Vehicle: a Study of Automotive Industry Cybersecurity Practices
    Securing the Modern Vehicle: A Study of Automotive Industry Cybersecurity Practices An independent study commissioned by and Table of Contents Executive Summary ............................................................................................ 1 Organizational Dynamics and Challenges ........................................................... 3 Technical Dynamics and Challenges .................................................................... 6 Product Development and Security Testing Practices ......................................... 9 Supply Chain and Third-Party Component Challenges ........................................ 13 Conclusions ........................................................................................................ 14 Methods ............................................................................................................. 15 Appendix: Detailed Survey Results ..................................................................... 18 Ponemon Institute .............................................................................................. 29 Executive Summary Today’s vehicle is a connected, mobile computer, which has introduced an issue the automotive industry has little experience dealing with: cybersecurity risk. Automotive manufacturers have become as much software as transportation companies, facing all the challenges inherent to software security. Synopsys and SAE International partnered to commission this independent survey of the current cybersecurity practices in the automotive
    [Show full text]
  • A PRACTICAL METHOD of IDENTIFYING CYBERATTACKS February 2018 INDEX
    In Collaboration With A PRACTICAL METHOD OF IDENTIFYING CYBERATTACKS February 2018 INDEX TOPICS EXECUTIVE SUMMARY 4 OVERVIEW 5 THE RESPONSES TO A GROWING THREAT 7 DIFFERENT TYPES OF PERPETRATORS 10 THE SCOURGE OF CYBERCRIME 11 THE EVOLUTION OF CYBERWARFARE 12 CYBERACTIVISM: ACTIVE AS EVER 13 THE ATTRIBUTION PROBLEM 14 TRACKING THE ORIGINS OF CYBERATTACKS 17 CONCLUSION 20 APPENDIX: TIMELINE OF CYBERSECURITY 21 INCIDENTS 2 A Practical Method of Identifying Cyberattacks EXECUTIVE OVERVIEW SUMMARY The frequency and scope of cyberattacks Cyberattacks carried out by a range of entities are continue to grow, and yet despite the seriousness a growing threat to the security of governments of the problem, it remains extremely difficult to and their citizens. There are three main sources differentiate between the various sources of an of attacks; activists, criminals and governments, attack. This paper aims to shed light on the main and - based on the evidence - it is sometimes types of cyberattacks and provides examples hard to differentiate them. Indeed, they may of each. In particular, a high level framework sometimes work together when their interests for investigation is presented, aimed at helping are aligned. The increasing frequency and severity analysts in gaining a better understanding of the of the attacks makes it more important than ever origins of threats, the motive of the attacker, the to understand the source. Knowing who planned technical origin of the attack, the information an attack might make it easier to capture the contained in the coding of the malware and culprits or frame an appropriate response. the attacker’s modus operandi.
    [Show full text]
  • From Vehicular Ad-Hoc Networks to Internet of Vehicles
    From Vehicular Ad-hoc Networks to Internet of Vehicles Eugen Borcoci University Politehnica Bucharest Electronics, Telecommunications and Information Technology Faculty ( ETTI) [email protected] NexComm 2017 Conference, April 23-27, Venice Slide 1 From Vehicular Ad-hoc Networks to Internet of Vehicles Acknowledgement This overview is compiled and structured by the author, based on public documents, like conferences material, studies, research papers, standards, projects, overviews, etc. (see specific references in the text and Reference list). Given the extension of the topics, this presentation is limited to a high level overview only, being mainly focused on architectural aspects. NexComm 2017 Conference, April 23-27, Venice Slide 2 From Vehicular Ad-hoc Networks to Internet of Vehicles Motivation of this talk The traditional Intelligent Transport System (ITS) has significantly evolved, including vehicular communication Main communications: V2V, V2R, V2I Vehicular ad-hoc Networks (VANET) VANET – is an important part of the ITS VANET (special class of Mobile ad-hoc Network - MANET ) has both technical and business-related limitations still - not very large scale deployment in the world Recent approach: IoV – significant extension of the VANET capabilities global network of vehicles – enabled by Wireless Access Technologies (WAT) involving Internet and including heterogeneous access networks IoV – special case of Internet of Things (IoT) IoV Target domains: vehicles driving and safety (basic function – in VANET) and additionally: • urban traffic management, automobile production • repair and vehicle insurance, road infrastructure construction and repair, logistics and transportation, etc. NexComm 2017 Conference, April 23-27, Venice Slide 3 CONTENTS 1. Introduction 2. Vehicular networks - short overview 3. IoV objectives, use cases and challenges 4.
    [Show full text]
  • Specification-Based Automotive Intrusion Detection Using Controller Area Network
    This is the author's version of an article that has been published in this journal. Changes were made to this version by the publisher prior to publication. The final version of record is available at http://dx.doi.org/10.1109/TVT.2019.2961344 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. XX, NO. XX, XXX 2019 1 SAIDuCANT: Specification-based Automotive Intrusion Detection using Controller Area Network (CAN) Timing Habeeb Olufowobi, Clinton Young, Joseph Zambreno, Senior Member, IEEE, and Gedare Bloom, Senior Member, IEEE Abstract—The proliferation of embedded devices in modern and attacks [2]. Vulnerabilities across the autonomous vehi- vehicles has opened the traditionally-closed vehicular system to cles, vehicular ad-hoc networks, vehicle-to-vehicle, vehicle-to- the risk of cybersecurity attacks through physical and remote infrastructure, connected car, intelligent transportation system, access to the in-vehicle network such as the controller area network (CAN). The CAN bus does not implement a security and even traditional (non-connected) automobiles motivate protocol that can protect the vehicle against the increasing cyber adversaries to launch cyberattacks against vehicles [3]. Unfor- and physical attacks. To address this risk, we introduce a novel tunately, today’s car lacks the necessary security mechanisms algorithm to extract the real-time model parameters of the CAN to protect the vehicular system from attack. bus and develop SAIDuCANT, a specification-based intrusion A critical asset to secure is the automotive in-vehicle detection system (IDS) using anomaly-based supervised learning with the real-time model as input. We evaluate the effectiveness of network, which facilitates communication between ECUs over SAIDuCANT with real CAN logs collected from two passenger multiple physical networks and protocols, with the most preva- cars and on an open-source CAN dataset collected from real- lent being the controller area network (CAN).
    [Show full text]
  • Security Control Mechanism for Safety Critical Functions Operating on an Automotive Controller Area Network
    Security Control Mechanism for Safety Critical Functions Operating on an Automotive Controller Area Network A Thesis Presented in Partial Fulfillment of the Requirements for the Degree Master of Science in the Graduate School of The Ohio State University By Matt Appel, Graduate Program in Electrical and Computer Engineering The Ohio State University 2020 Master's Examination Committee: Prof. Girogio Rizzoni, Advisor Prof. Ness Shroff Prof. Qadeer Ahmed c Copyright by Matt Appel 2020 Abstract Safety-critical systems in automotive design are facing new challenges associated with advancements in autonomous functionality and connectivity. One of those chal- lenges is security in these systems. There are a multitude of different problems with all of these additional connectivity and sensing units. The focus of this thesis is on the internal communication of Network Control Systems(NCS) of a vehicle. The Controller Area Network (CAN) is the primary network used in safety-critical vehi- cle operation and is lacking inherent security. This thesis presents a security control mechanism for CAN that uses vehicle models to detect and mitigate malicious mes- sages on CAN. The security control mechanism is an Intrusion Detection System (IDS) that uses an unknown input observer implementation to address stealth, re- play, and covert attacks. The goal of this method is to address performance challenges in the authentication of an entire CAN bus. It uses vehicle dynamic behavior to au- thenticate messages rather than using encryption methods to require CAN message authentication when the vehicle is not under attack reducing the burden caused by implementing and continually using secure communication protocols on top of CAN.
    [Show full text]
  • Kaspersky Transportation Systems Security Portfolio
    Driving automotive cybersecurity Introduction IHS Markit forecasts that by 2023, worldwide sales Connected cars are more than just physical cars of connected cars will reach 72.5 million units, with digital technology – they are vehicles with up from 24 million units in 2015. That means almost connected infrastructures that include mobile 69% of passenger vehicles sold will be exchanging data with external sources, bringing new services systems and more. As a result, we end up with and business models to bear in automotive connected car ecosystems with multiple entry markets*. points that are vulnerable to cyberattacks. But there’s still a long way to go to guarantee Kaspersky has introduced a set of products connected vehicles are safe and secure for and serv passengers. For that to happen there needs cybersecurity to connected cars and their to be a transformation in the multiple approaches infrastructures and to support the development used across the automotive industry. of new mobility technologies, including autonomous, electric and shared technologies. Transportation System Security Automotive In-vehicle Infrastructure services security security Kaspersky Kaspersky Kaspersky Transportation Kaspersky Kaspersky Kaspersky Kaspersky Security Penetration Tailored Threat Cybersecurity Automotive Mobile Security Fraud Threat Assessment Testing Intelligence for ECUs Adaptive SDK Prevention Intelligence Reporting Platform for Vehicle SOC * Ihsmarkit.com/topic/autonomous-connected-car.html Uncover the Security Risks Security Assessment The Security Assessment service is the ideal starting point for addressing the cybersecurity agenda for connected cars and their infrastructures. It detects vulnerabilities, software architecture inconsistencies, and gaps in ECUs, hardware and software security mechanisms both in manufactured vehicles and future models and their components.
    [Show full text]
  • Detecting and Preventing Automotive Hardware Security Vulnerabilities
    Detecting and Preventing Automotive Hardware Security Vulnerabilities Ensuring hardware security, one chip at a time. VISIT: TORTUGALOGIC.COM Automating the Automotive Security Development Lifecycle Connected and autonomous vehicles present a exposed not one but a chain of security issues. promising target, much like retailers or banks, For Fiat-Chrysler vehicles, it was a remote attack where hackers can troll for personal details and that could be performed against vehicles located identity theft. anywhere in the United State that caused a 1.4 million vehicle recall as well as changes to the Is your vehicle secure? Tesla found out the hard Sprint carrier network. way. Hacking typically begins by finding a series of vulnerability issues that create a path through European vehicles are also not immune. A study the car’s maze of defenses. So, when research- by German auto club ADAC found hackers could ers at the Chinese firm Tencent revealed they wirelessly open any BMW, Mini and Rolls-Royce could burrow through the Wi-Fi connection of vehicles in minutes. An estimated 2.2 million a Tesla S, all the way to its driving systems and vehicles equipped with BMW’s ConnectedDrive then remotely activate the vehicle’s brakes, they service were vulnerable. Connected and autonomous vehicles present a promising target, much like retailers or banks, where hackers can troll for credit card numbers, home addresses, e-mail information and other personal details required for identity theft. Hackers bent on identity theft are expected to infiltrate vehicles through the infotainment portal, as the Jeep hackers did, as well as with malicious apps that appear harmless or even helpful but steal personal information.
    [Show full text]
  • Deep Learning Based Vehicular Mobility Models for Intelligent Transportation Systems Jian Zhang
    Deep Learning based Vehicular Mobility Models for Intelligent Transportation Systems Jian Zhang To cite this version: Jian Zhang. Deep Learning based Vehicular Mobility Models for Intelligent Transportation Systems. Automatic Control Engineering. Ecole Centrale de Lille, 2018. English. NNT : 2018ECLI0015. tel-02136219 HAL Id: tel-02136219 https://tel.archives-ouvertes.fr/tel-02136219 Submitted on 21 May 2019 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. No d’ordre : 3 6 7 CENTRALE LILLE THÈSE présentée en vue d’obtenir le grade de DOCTEUR Spécialité : Automatique, génie informatique, traitement du signal et des images par ZHANG Jian Master of Engineering of Beijing Jiao Tong University (BJTU) Doctorat délivré par Centrale Lille Titre de la thèse : Modèles de Mobilité de Véhicules par Apprentissage Profond dans les Systèmes de Transport Intelligents Soutenue le 7 décembre 2018 devant le jury : M. Pierre BORNE École Centrale de Lille Président M. Ismael LOPEZ-JUAREZ Centre de Recherche CINVESTAV, Mexique Rapporteur Mme. Shaoping WANG Beihang University, Chine Rapporteur M. Alejandro CASTILLO ATOCHE Universidad Autónoma de Yucatán, Mexique Examinateur M. Abdelkader EL KAMEL École Centrale de Lille Directeur de Thèse M. Gaston LEFRANC Pontificia Universidad Católica de Valparaíso, Chili Examinateur Mme.
    [Show full text]