Invited: Waving the Double-Edged Sword: Building Resilient CAVs with Edge and Cloud Computing
The rapid advancement of edge and cloud computing platforms, vehicular ad-hoc networks, and machine learning techniques have brought both opportunities and challenges for next-generation connected and automated vehicles (CAVs). On the one hand, these technologies can enable vehicles to leverage more...
Uloženo v:
| Vydáno v: | 2023 60th ACM/IEEE Design Automation Conference (DAC) s. 1 - 4 |
|---|---|
| Hlavní autoři: | , , , , , , , , , |
| Médium: | Konferenční příspěvek |
| Jazyk: | angličtina |
| Vydáno: |
IEEE
09.07.2023
|
| Témata: | |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | The rapid advancement of edge and cloud computing platforms, vehicular ad-hoc networks, and machine learning techniques have brought both opportunities and challenges for next-generation connected and automated vehicles (CAVs). On the one hand, these technologies can enable vehicles to leverage more computing power from edge and cloud servers and to share information with each other and surrounding infrastructures for better situation awareness and more intelligent decision making. On the other hand, the more distributed computing process and the wireless nature of V2X (vehicle-to-everything) communication expose vulnerabilities to various disturbances and attacks. In this paper, we discuss the security and safety challenges for edge- and cloud-enabled CAVs, particularly when they are under environment interferences, execution errors, and malicious attacks, and we will introduce our recent work and future directions in developing system-driven, end-to-end methodologies and tools to address these challenges and ensure system resiliency under uncertainties. |
|---|---|
| AbstractList | The rapid advancement of edge and cloud computing platforms, vehicular ad-hoc networks, and machine learning techniques have brought both opportunities and challenges for next-generation connected and automated vehicles (CAVs). On the one hand, these technologies can enable vehicles to leverage more computing power from edge and cloud servers and to share information with each other and surrounding infrastructures for better situation awareness and more intelligent decision making. On the other hand, the more distributed computing process and the wireless nature of V2X (vehicle-to-everything) communication expose vulnerabilities to various disturbances and attacks. In this paper, we discuss the security and safety challenges for edge- and cloud-enabled CAVs, particularly when they are under environment interferences, execution errors, and malicious attacks, and we will introduce our recent work and future directions in developing system-driven, end-to-end methodologies and tools to address these challenges and ensure system resiliency under uncertainties. |
| Author | Goeckner, Anthony Luo, Yunpeng Sato, Takami Liu, Xiangguo Chakraborty, Trishna Wang, Yixuan Jiao, Ruochen Wang, Ningfei Chen, Qi Alfred Zhu, Qi |
| Author_xml | – sequence: 1 givenname: Xiangguo surname: Liu fullname: Liu, Xiangguo email: xg.liu@u.northwestern.edu organization: Northwestern University,Department of Electrical and Computer Engineering,USA – sequence: 2 givenname: Yunpeng surname: Luo fullname: Luo, Yunpeng email: yunpel3@uci.edu organization: University of California,Department of Computer Science,Irvine,USA – sequence: 3 givenname: Anthony surname: Goeckner fullname: Goeckner, Anthony email: anthony.goeckner@northwestern.edu organization: Northwestern University,Department of Electrical and Computer Engineering,USA – sequence: 4 givenname: Trishna surname: Chakraborty fullname: Chakraborty, Trishna email: trishnac@uci.edu organization: University of California,Department of Computer Science,Irvine,USA – sequence: 5 givenname: Ruochen surname: Jiao fullname: Jiao, Ruochen email: ruochen.jiao@u.northwestern.edu organization: Northwestern University,Department of Electrical and Computer Engineering,USA – sequence: 6 givenname: Ningfei surname: Wang fullname: Wang, Ningfei email: ningfei.wang@uci.edu organization: University of California,Department of Computer Science,Irvine,USA – sequence: 7 givenname: Yixuan surname: Wang fullname: Wang, Yixuan email: yixuan-wang2024@u.northwestern.edu organization: Northwestern University,Department of Electrical and Computer Engineering,USA – sequence: 8 givenname: Takami surname: Sato fullname: Sato, Takami email: takamis@uci.edu organization: University of California,Department of Computer Science,Irvine,USA – sequence: 9 givenname: Qi Alfred surname: Chen fullname: Chen, Qi Alfred email: alfchen@uci.edu organization: University of California,Department of Computer Science,Irvine,USA – sequence: 10 givenname: Qi surname: Zhu fullname: Zhu, Qi email: qzhu@northwestern.edu organization: Northwestern University,Department of Electrical and Computer Engineering,USA |
| BookMark | eNo10M1Kw0AUBeARFNSaNxCZF0idn2Qy111MqxYKgr8rKTOZm3YgTUoyafHtTVE39yzOx1ncS3LatA0ScsPZlHMGt7O8SBUImAom5JQzkWSawQmJIAMtUyaFTDQ_J1Hfe8sUS3XCVHJBvhbN3gd0d_TT7H2zpmGDdNYOtsZ47tbo6Ouh7cb6fvC1O4IX7H3tsQm0yD96evBhQ4-SmsbRom6H8bbb3RBGfEXOKlP3GP3lhLw_zN-Kp3j5_Lgo8mVsBLAQZ-CcNZAxVIrrtOJC2hJtmloLFSROWcUq5bBUukRu0CjgspSJ04CjF3JCrn93PSKudp3fmu579f8F-QN351UU |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IH CBEJK RIE RIO |
| DOI | 10.1109/DAC56929.2023.10247809 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan (POP) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP) 1998-present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| EISBN | 9798350323481 |
| EndPage | 4 |
| ExternalDocumentID | 10247809 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IH ACM ALMA_UNASSIGNED_HOLDINGS CBEJK RIE RIO |
| ID | FETCH-LOGICAL-a290t-79ddba970e66185f123bceb55bb9f94d6b60f6dec68ce1aea6913c34d89e18523 |
| IEDL.DBID | RIE |
| ISICitedReferencesCount | 0 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001073487300127&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| IngestDate | Wed Aug 27 02:50:59 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | true |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-a290t-79ddba970e66185f123bceb55bb9f94d6b60f6dec68ce1aea6913c34d89e18523 |
| PageCount | 4 |
| ParticipantIDs | ieee_primary_10247809 |
| PublicationCentury | 2000 |
| PublicationDate | 2023-July-9 |
| PublicationDateYYYYMMDD | 2023-07-09 |
| PublicationDate_xml | – month: 07 year: 2023 text: 2023-July-9 day: 09 |
| PublicationDecade | 2020 |
| PublicationTitle | 2023 60th ACM/IEEE Design Automation Conference (DAC) |
| PublicationTitleAbbrev | DAC |
| PublicationYear | 2023 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| SSID | ssib060584064 |
| Score | 2.2525733 |
| Snippet | The rapid advancement of edge and cloud computing platforms, vehicular ad-hoc networks, and machine learning techniques have brought both opportunities and... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 1 |
| SubjectTerms | Ad hoc networks Cloud computing connected and autonomous vehicles edge computing Safety Security Servers Uncertainty V2X Wireless communication |
| Title | Invited: Waving the Double-Edged Sword: Building Resilient CAVs with Edge and Cloud Computing |
| URI | https://ieeexplore.ieee.org/document/10247809 |
| WOSCitedRecordID | wos001073487300127&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1JSwMxFA5aPHhSseJODl5TZ8naWx1b9FKKay9SsryRQplKN_--STpVPHjwEsIjIZCF7-W9fPkQurKCU-cvaURSxgi1mhHFwJBUaO4dBpoYoaPYhOj35XCoBjVZPXJhACA-PoNWqMZcvpvaZQiV-ROeUSEDXW9bCL4ma202T0jveXCiNQs4TdT1badg3MN_K0iEtzadf8moRBTp7f1z_H3U_OHj4cE30hygLagO0dt9tQr-Yhu_6hAVwN6Vw94fNhMgXfcODj9--ptlG9_Uytf4AebjSeA_4qLzMschBItDS6wrh4vJdOnLKPLgGzfRc6_7VNyRWiyB6EwlCyKUc0YrkYBHXMlKj0jGgmHMGFUq6rjhSckdWC4tpBo0V2luc-qkgkCgzo9Qo5pWcIxwGUwcMlpaf8Sd0jmkVoHVuZG0zOwJaoa5GX2s_8MYbabl9A_7GdoNKxAfuapz1FjMlnCBduxqMZ7PLuMqfgECYZ4P |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1JSwMxGA2igp5UrLibg9fUWZLMpLc6trRYS9GqvUjJ8o0UylS6-fdN0qniwYOXEEICIQvv5UteHkLXOuHU2EMaSSljhGrJiGCgSJhIbgkDDVQivdlE0u2mg4HolWJ1r4UBAP_4DKou6-_yzUQvXKjM7vCIJqmT620xSqNgJddaLx93wWfhiZY64DAQN3f1jHFLAKrOJLy6bv7LSMXjSHPvnz3YR5UfRR7ufWPNAdqA4hC9tYulY4w1_CpdXABbMoctI1ZjIA3zDgY_fdqzZQ3flt7X-BFmo7FTQOKs_jLDLgiLXU0sC4Oz8WRhU2_zYCtX0HOz0c9apLRLIDISwZwkwhglRRKAxdyU5RaTlAbFmFIiF9RwxYOcG9A81RBKkFyEsY6pSQU4CXV8hDaLSQHHCOeuiENEc203uREyhlAL0DJWKc0jfYIqbmyGH6sfMYbrYTn9o_wK7bT6D51hp929P0O7bjb8k1dxjjbn0wVcoG29nI9m00s_o19qTaFW |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2023+60th+ACM%2FIEEE+Design+Automation+Conference+%28DAC%29&rft.atitle=Invited%3A+Waving+the+Double-Edged+Sword%3A+Building+Resilient+CAVs+with+Edge+and+Cloud+Computing&rft.au=Liu%2C+Xiangguo&rft.au=Luo%2C+Yunpeng&rft.au=Goeckner%2C+Anthony&rft.au=Chakraborty%2C+Trishna&rft.date=2023-07-09&rft.pub=IEEE&rft.spage=1&rft.epage=4&rft_id=info:doi/10.1109%2FDAC56929.2023.10247809&rft.externalDocID=10247809 |