語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Cybersecurity and Privacy Issues in Intelligent Transportation Systems.
紀錄類型:
書目-語言資料,手稿 : Monograph/item
正題名/作者:
Cybersecurity and Privacy Issues in Intelligent Transportation Systems./
作者:
Ahn, Haesung.
面頁冊數:
1 online resource (165 pages)
附註:
Source: Dissertations Abstracts International, Volume: 85-08, Section: B.
Contained By:
Dissertations Abstracts International85-08B.
標題:
Transportation. -
電子資源:
click for full text (PQDT)
ISBN:
9798381698565
Cybersecurity and Privacy Issues in Intelligent Transportation Systems.
Ahn, Haesung.
Cybersecurity and Privacy Issues in Intelligent Transportation Systems.
- 1 online resource (165 pages)
Source: Dissertations Abstracts International, Volume: 85-08, Section: B.
Thesis (Ph.D.)--University of Windsor (Canada), 2024.
Includes bibliographical references
This dissertation addresses cybersecurity and privacy risks in ITS, focusing on the escalating cyberattacks on AVs and data breaches in areas like smart cards. We explore novel malware threats to AVs and hacker strategies impacting physical infrastructure, underscoring the need for enhanced security in the evolving AV sector. This dissertation also emphasizes the importance of researching privacy risks, especially with the rise in privacy breaches and extortion attempts involving sensitive personal information. Understanding the implications of publicly shared data is crucial in this context. Chapter 1 raises research questions regarding the two main pillars, cybersecurity and privacy issues in ITS. Based on the questions, Chapters 2, 3 and 4 deal with these questions, presenting key insights this research found. Chapter 2 focuses on a case of vehicle hacking, specifically examining the implications of Stuxnet-style malware. Stuxnet attack methodology provides a critical context for understanding potential threats to AV systems. This chapter introduces a mathematical model to analyze how similar malware could spread both temporally and spatially in the context of AVs. Inspired by epidemiology and ecology, this approach conceptualizes malware as an infectious disease to study its propagation dynamics. This is the first attempt to apply such a model to the spread of Stuxnet-style malware in AV environments, paving the way for future research on the temporal and geographic spread of infectious malware in AV networks.Chapter 3 delves into the privacy risks associated with the public sharing of COVID-19 patients' travel records during the pandemic. This measure, intended for public health safety, inadvertently risked exposing sensitive personal travel details. The chapter examines how combining these records with other open-data sources might allow for the re-identification of individuals' private information. We quantify these re-identification risks, focusing on the volume and accuracy of the shared records, along with the variety of locations that the patients visited. This analysis is crucial for understanding the privacy implications of such data-sharing practices in public health contexts.Chapter 4 introduces a method to quantify privacy risks using information theory, measuring information as entropy units. We use synthetic data to model individual travel patterns, combining these into a unit termed a cube that encapsulates both time and space elements. The study focuses on how adding these cubes affects privacy risk, particularly by assessing the novel information each cube contributes. This allows us to quantify the distinct information within various data sequences, using joint and conditional entropy to understand uncertainty fluctuations as more cubes are added.Lastly, Chapter 5 concludes this dissertation's insights that potential malware attacks can bring about magnificent physical destructions by manipulating infected AVs, privacy risks may emerge with the combination of external observations data, and information theory-based methodologies can quantify the risks in individual pieces of information. These insights can emphasize the necessity of our research.
Electronic reproduction.
Ann Arbor, Mich. :
ProQuest,
2024
Mode of access: World Wide Web
ISBN: 9798381698565Subjects--Topical Terms:
558117
Transportation.
Subjects--Index Terms:
CybersecurityIndex Terms--Genre/Form:
554714
Electronic books.
Cybersecurity and Privacy Issues in Intelligent Transportation Systems.
LDR
:04553ntm a22003857 4500
001
1144026
005
20240531084210.5
006
m o d
007
cr mn ---uuuuu
008
250605s2024 xx obm 000 0 eng d
020
$a
9798381698565
035
$a
(MiAaPQ)AAI30991091
035
$a
AAI30991091
040
$a
MiAaPQ
$b
eng
$c
MiAaPQ
$d
NTU
100
1
$a
Ahn, Haesung.
$3
1468915
245
1 0
$a
Cybersecurity and Privacy Issues in Intelligent Transportation Systems.
264
0
$c
2024
300
$a
1 online resource (165 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
500
$a
Source: Dissertations Abstracts International, Volume: 85-08, Section: B.
500
$a
Advisor: Kim, Y.
502
$a
Thesis (Ph.D.)--University of Windsor (Canada), 2024.
504
$a
Includes bibliographical references
520
$a
This dissertation addresses cybersecurity and privacy risks in ITS, focusing on the escalating cyberattacks on AVs and data breaches in areas like smart cards. We explore novel malware threats to AVs and hacker strategies impacting physical infrastructure, underscoring the need for enhanced security in the evolving AV sector. This dissertation also emphasizes the importance of researching privacy risks, especially with the rise in privacy breaches and extortion attempts involving sensitive personal information. Understanding the implications of publicly shared data is crucial in this context. Chapter 1 raises research questions regarding the two main pillars, cybersecurity and privacy issues in ITS. Based on the questions, Chapters 2, 3 and 4 deal with these questions, presenting key insights this research found. Chapter 2 focuses on a case of vehicle hacking, specifically examining the implications of Stuxnet-style malware. Stuxnet attack methodology provides a critical context for understanding potential threats to AV systems. This chapter introduces a mathematical model to analyze how similar malware could spread both temporally and spatially in the context of AVs. Inspired by epidemiology and ecology, this approach conceptualizes malware as an infectious disease to study its propagation dynamics. This is the first attempt to apply such a model to the spread of Stuxnet-style malware in AV environments, paving the way for future research on the temporal and geographic spread of infectious malware in AV networks.Chapter 3 delves into the privacy risks associated with the public sharing of COVID-19 patients' travel records during the pandemic. This measure, intended for public health safety, inadvertently risked exposing sensitive personal travel details. The chapter examines how combining these records with other open-data sources might allow for the re-identification of individuals' private information. We quantify these re-identification risks, focusing on the volume and accuracy of the shared records, along with the variety of locations that the patients visited. This analysis is crucial for understanding the privacy implications of such data-sharing practices in public health contexts.Chapter 4 introduces a method to quantify privacy risks using information theory, measuring information as entropy units. We use synthetic data to model individual travel patterns, combining these into a unit termed a cube that encapsulates both time and space elements. The study focuses on how adding these cubes affects privacy risk, particularly by assessing the novel information each cube contributes. This allows us to quantify the distinct information within various data sequences, using joint and conditional entropy to understand uncertainty fluctuations as more cubes are added.Lastly, Chapter 5 concludes this dissertation's insights that potential malware attacks can bring about magnificent physical destructions by manipulating infected AVs, privacy risks may emerge with the combination of external observations data, and information theory-based methodologies can quantify the risks in individual pieces of information. These insights can emphasize the necessity of our research.
533
$a
Electronic reproduction.
$b
Ann Arbor, Mich. :
$c
ProQuest,
$d
2024
538
$a
Mode of access: World Wide Web
650
4
$a
Transportation.
$3
558117
650
4
$a
Information technology.
$3
559429
650
4
$a
Environmental engineering.
$3
557376
653
$a
Cybersecurity
653
$a
Information theory
653
$a
Privacy
653
$a
Re-identification
655
7
$a
Electronic books.
$2
local
$3
554714
690
$a
0709
690
$a
0775
690
$a
0489
710
2
$a
ProQuest Information and Learning Co.
$3
1178819
710
2
$a
University of Windsor (Canada).
$b
CIVIL ENGINEERING.
$3
1180349
773
0
$t
Dissertations Abstracts International
$g
85-08B.
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=30991091
$z
click for full text (PQDT)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入
第一次登入時,112年前入學、到職者,密碼請使用身分證號登入;112年後入學、到職者,密碼請使用身分證號"後六碼"登入,請注意帳號密碼有區分大小寫!
帳號(學號)
密碼
請在此電腦上記得個人資料
取消
忘記密碼? (請注意!您必須已在系統登記E-mail信箱方能使用。)