All Issue

2021 Vol.39, Issue 4 Preview Page

Article

31 August 2021. pp. 493-515
Abstract
References
1
Acharya S., Dvorkin Y., Pandžić H., Karri R. (2020), Cybersecurity of Smart Electric Vehicle Charging: A Power Grid Perspective, IEEE Access, 8, 214434-214453. 10.1109/ACCESS.2020.3041074
2
Alcaraz C., Lopez J., Wolthusen S. (2017), OCPP Protocol: Security Threats and Challenges, IEEE Transactions on Smart Grid, 8(5), 2452-2459. 10.1109/TSG.2017.2669647
3
Aloqaily M., Otoum S., Al Ridhawi I., Jararweh Y. (2019), An intrusion Detection System for Connected Vehicles in Smart Cities, Ad Hoc Networks, 90, 101842. 10.1016/j.adhoc.2019.02.001
4
Arias-Molinares D., García-Palomares J. C. (2020), The Ws of MaaS: Understanding Mobility as a Service Fromaliterature review, IATSS research. 10.1016/j.iatssr.2020.02.001
5
Arul R., Raja G., Almagrabi A. O., Alkatheiri M. S., Chauhdary S. H., Bashir A. K. (2019), A Quantum-safe Key Hierarchy and Dynamic Security Association for LTE/SAE in 5G Scenario, IEEE Transactions on Industrial Informatics, 16(1), 681-690. 10.1109/TII.2019.2949354
6
Bezemskij A., Loukas G., Gan D., Anthony R. J. (2017), Detecting Cyber-Physical Threats in an Autonomous Robotic Vehicle Using Bayesian Networks, 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Exter, 98-103. 10.1109/iThings-GreenCom-CPSCom-SmartData.2017.20
7
Butler L., Yigitcanlar T., Paz A. (2020), How Can Smart Mobility Innovations Alleviate Transportation Disadvantage? Assembling a Conceptual Framework through a Systematic Review, Applied Sciences, 10(18), 6306. 10.3390/app10186306
8
De Melo H. N., Trovao J. P. F., Pereirinha P. G., Jorge H. M., Antunes C. H. (2017), A Controllable Bidirectional Battery Charger for Electric Vehicles with Vehicle-to-grid Capability, IEEE Transactions on Vehicular Technology, 67(1), 114-123. 10.1109/TVT.2017.2774189
9
Deichmann J., Klein B., Scherf G., Stützle R. (2019), The Race for Cybersecurity: Protecting the Connected Car in the Era of New Regulation, no.October.
10
Deichmann J., Klein B., Scherf G., Stutzle R. (2019), The Race for Cybersecurity: Protecting the Connected car in the Era of New Regulation, White paper.
11
Delucchi M. A., Yang C., Burke A. F., Ogden J. M., Kurani K., Kessler J., Sperling D. (2014), An Assessment of Electric Vehicles: Technology, Infrastructure Requirements, Greenhouse-gas Emissions, Petroleum Use, Material Use, Lifetime Cost, Consumer Acceptance and Policy Initiatives, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences, 372(2006), 20120325. 10.1098/rsta.2012.032524298079
12
Dey S., Khanra M. (2020), Cybersecurity of Plug-In Electric Vehicles: Cyberattack Detection During Charging, IEEE Transactions on Industrial Electronics, 68(1), 478-487. 10.1109/TIE.2020.2965497
13
Gao Feng. (2016), Ga Feng Viewpoint-Reimagining Mobility in the China Context.
14
Greenblatt J. B., Shaheen S. (2015), Automated Vehicles, On-demand Mobility, and Environmental Impacts, Current Sustainable/renewable Energy Reports, 2(3), 74-81. 10.1007/s40518-015-0038-5
15
Grisleri P., Fedriga I. (2010), The Braive Autonomous Ground Vehicle Platform, IFAC Proceedings Volumes, 43(16), 497-502. 10.3182/20100906-3-IT-2019.00086
16
Hankyoreh (2021), ‘Tesla’s Rapid Growth, the New Year’s ‘Electric Vehicle Battle’ is Unfolding’.
17
Imadali S., Kaiser A., Sivrikaya F., El Sayed N., Boc M., Klaudel W., Vèque V. (2014), A Review of Network Mobility Protocols for Fully Electrical Vehicles Servicesm, IEEE Intelligent Transportation Systems Magazine, 6(3), 80-95. 10.1109/MITS.2014.2325331
18
Jiang S., Zhu X., Wang L. (2016), An Efficient Anonymous Batch Authentication Scheme Based on HMAC for VANETs, IEEE Transactions on Intelligent Transportation Systems, 17(8), 2193-2204. 10.1109/TITS.2016.2517603
19
Korea Energy Agency (2017), KEA Brief Issuses of Energy, 174.
20
Kouvelas A. (2019), Interview: In the Next Few Years, There Will be More Automation in Mobility, NSL Newsletter, 43.
21
Levi M., Allouche Y., Kontorovich A. (2018), Advanced Analytics for Connected Car Cybersecurity, In 2018 IEEE 87th Vehicular Technology Conference (VTC Spring) 1-7, IEEE. 10.1109/VTCSpring.2018.8417690PMC5984723
22
Li Y., Tu Y., Fan Q., Dong C., Wang W. (2018), Influence of Cyber-attacks on Longitudinal Safety of Connected and Automated Vehicles, Accident Analysis & Prevention, 121, 148-156. 10.1016/j.aap.2018.09.01630248530
23
Li Y., Tu Y., Fan Q., Dong C., Wang W. (2018), Influence of Cyber-attacks on Longitudinal Safety of Connected and Automated Vehicles, Accident Analysis & Prevention, 121, 148-156. 10.1016/j.aap.2018.09.01630248530
24
Liu Q., Zhang H., Wan J., Chen X. (2017), An Access Control Model for Resource Sharing Based on the Role-based Access Control Intended for Multi-domain Manufacturing Internet of Yhings, IEEE Access, 5, 7001-7011. 10.1109/ACCESS.2017.2693380
25
Lu Y., Shou G., Hu Y., Guo Z. (2009), The Research and Efficient FPGA Implementation of Ghash Core for GMAC, In 2009 International Conference on E-Business and Information System Security, 1-5, IEEE. 10.1109/EBISS.2009.5138125
26
McKinsey (2020), Perspective on Robotaxis and Autonomous Driving, 14, McKinsey Center for Future Mobility.
27
Miller C., Valasek C. (2015), Remote Exploitation of an Unaltered Passenger Vehicle, Black Hat USA 2015.S 91.
28
Miyata H. (2018, December), Digital Transformation of Automobile and Mobility Service, In 2018 International Conference on Field-Programmable Technology (FPT), 1-5, IEEE. 10.1109/FPT.2018.00012PMC6284828
29
MOLIT (Ministry of Land, Infrastructure and Transport), Press Relase, Announced 2020.11.19., From20, Autonomous Vehicle Provisional Driving License Regulations Amendment Administrative Notice.
30
Nobre J. C., de Souza A. M., Rosário D., Both C., Villas L. A., Cerqueira E., Gerla M. (2019), Vehicular Software-defined Networking and Fog Computing: Integration and Design principles, Ad Hoc Networks, 82, 172-181. 10.1016/j.adhoc.2018.07.016
31
O’Hanlon B. W., Psiaki M. L., Bhatti J. A., Shepard D. P., Humphreys T. E. (2013), Real-time GPS Spoofing Detection Via Correlation of Encrypted Signals, NAVIGATION, Journal of the Institute of Navigation, 60(4), 267-278. 10.1002/navi.44
32
Park K. H., Jeon H. M., Jung K. C., Son B. S. (2017), Charging Behavior Analysis of Electric Vehicle, J. Korean Soc. Transp., 35(3), Korean Society of Transportation, 210-219. 10.7470/jkst.2017.35.3.210
33
Parkinson S., Ward P., Wilson K., Miller J. (2017), Cyber Threats Facing Autonomous and Connected Vehicles: Future Challenges, IEEE Transactions on Intelligent Transportation Systems, 18(11), 2898-2915. 10.1109/TITS.2017.2665968
34
Petit J., Shladover S. E. (2014), Potential Cyberattacks on Automated Vehicles, IEEE Transactions on Intelligent Transportation Systems, 16(2), 546-556. 10.1109/TITS.2014.2342271
35
Reed D., Sporny M., Longley D., Allen C., Grant R., Sabadello M., Holt J. (2020), Decentralized Identifiers (dids) 1.0. Draft Community Group Report.
36
Reeh D., Tapia F. C., Chung Y. W., Khaki B., Chu C., Gadh R. (2019), Vulnerability Analysis and Risk Assessment of EV Charging System under Cyber-Physical Threats, In 2019 IEEE Transportation Electrification Conference and Expo (ITEC), 1-6, IEEE. 10.1109/ITEC.2019.8790593
37
Rouf I., Miller R. D., Mustafa H. A., Taylor T., Oh S., Xu W., Seskar I. (2010, August), Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study, In USENIX Security Symposium, 10.
38
Sejong City, Press Relase, Announced 2020.05.08., Run on Autonomous Vehicles that Apply Blockchain Technology in Sejong City.
39
So J. H., Kim T. H., Kim M. J., Kang J. W., Lee H., Choi J. M. (2019), A Study on the Concept of Smart City and Smart City Transport, J. Korean Soc. Transp., 37(2), Korean Society of Transportation, 79-91. 10.7470/jkst.2019.37.1.079
40
Sovacool B. K., Noel L., Axsen J., Kempton W. (2018), The Neglected Social Dimensions to a Vehicle-to-grid (V2G) Transition: A Critical and Systematic Review, Environmental Research Letters, 13(1), 013001. 10.1088/1748-9326/aa9c6d
41
Tencent Keen Security Lab, New Vehicle Security Research by KeenLab: Experimental Security Assessment of BMW Cars, Keen Security Lab Blog, 2018.05.22., https://keenlab.tencent.com/en/2018/05/22/New-CarHacking-Research-by-KeenLab-Experimental-Security-Assessment-of-BMW-Cars/
42
Ueda H., Kurachi R., Takada H., Mizutani T., Inoue M., Horihata S. (2015), Security Authentication System for In-vehicle network, SEI Technical Review, 81, 5-9.
43
Ueda H., Kurachi R., Takada H., Mizutani T., Inoue M., Horihata S. (2015), Security Authentication System for In-Vehicle Network, SEI Technical Review.
44
WIRED (2020), This Bluetooth Attack Can Steal a Tesla Model X in Minute.
45
Yadav A., Bose G., Bhange R., Kapoor K., Iyengar N. C. S. N., Caytiles R. D. (2016), Security, Vulnerability and Protection of Vehicular On-board Diagnostics, International Journal of Security and Its Applications, 10(4), 405-422. 10.14257/ijsia.2016.10.4.36
Information
  • Publisher :Korean Society of Transportation
  • Publisher(Ko) :대한교통학회
  • Journal Title :Journal of Korean Society of Transportation
  • Journal Title(Ko) :대한교통학회지
  • Volume : 39
  • No :4
  • Pages :493-515
  • Received Date : 2021-02-04
  • Revised Date : 2021-02-27
  • Accepted Date : 2021-04-26