Invited: Waving the Double-Edged Sword: Building Resilient CAVs with Edge and Cloud Computing

The rapid advancement of edge and cloud computing platforms, vehicular ad-hoc networks, and machine learning techniques have brought both opportunities and challenges for next-generation connected and automated vehicles (CAVs). On the one hand, these technologies can enable vehicles to leverage more...

Full description

Saved in:
Bibliographic Details
Published in:2023 60th ACM/IEEE Design Automation Conference (DAC) pp. 1 - 4
Main Authors: Liu, Xiangguo, Luo, Yunpeng, Goeckner, Anthony, Chakraborty, Trishna, Jiao, Ruochen, Wang, Ningfei, Wang, Yixuan, Sato, Takami, Chen, Qi Alfred, Zhu, Qi
Format: Conference Proceeding
Language:English
Published: IEEE 09.07.2023
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract The rapid advancement of edge and cloud computing platforms, vehicular ad-hoc networks, and machine learning techniques have brought both opportunities and challenges for next-generation connected and automated vehicles (CAVs). On the one hand, these technologies can enable vehicles to leverage more computing power from edge and cloud servers and to share information with each other and surrounding infrastructures for better situation awareness and more intelligent decision making. On the other hand, the more distributed computing process and the wireless nature of V2X (vehicle-to-everything) communication expose vulnerabilities to various disturbances and attacks. In this paper, we discuss the security and safety challenges for edge- and cloud-enabled CAVs, particularly when they are under environment interferences, execution errors, and malicious attacks, and we will introduce our recent work and future directions in developing system-driven, end-to-end methodologies and tools to address these challenges and ensure system resiliency under uncertainties.
AbstractList The rapid advancement of edge and cloud computing platforms, vehicular ad-hoc networks, and machine learning techniques have brought both opportunities and challenges for next-generation connected and automated vehicles (CAVs). On the one hand, these technologies can enable vehicles to leverage more computing power from edge and cloud servers and to share information with each other and surrounding infrastructures for better situation awareness and more intelligent decision making. On the other hand, the more distributed computing process and the wireless nature of V2X (vehicle-to-everything) communication expose vulnerabilities to various disturbances and attacks. In this paper, we discuss the security and safety challenges for edge- and cloud-enabled CAVs, particularly when they are under environment interferences, execution errors, and malicious attacks, and we will introduce our recent work and future directions in developing system-driven, end-to-end methodologies and tools to address these challenges and ensure system resiliency under uncertainties.
Author Goeckner, Anthony
Luo, Yunpeng
Sato, Takami
Liu, Xiangguo
Chakraborty, Trishna
Wang, Yixuan
Jiao, Ruochen
Wang, Ningfei
Chen, Qi Alfred
Zhu, Qi
Author_xml – sequence: 1
  givenname: Xiangguo
  surname: Liu
  fullname: Liu, Xiangguo
  email: xg.liu@u.northwestern.edu
  organization: Northwestern University,Department of Electrical and Computer Engineering,USA
– sequence: 2
  givenname: Yunpeng
  surname: Luo
  fullname: Luo, Yunpeng
  email: yunpel3@uci.edu
  organization: University of California,Department of Computer Science,Irvine,USA
– sequence: 3
  givenname: Anthony
  surname: Goeckner
  fullname: Goeckner, Anthony
  email: anthony.goeckner@northwestern.edu
  organization: Northwestern University,Department of Electrical and Computer Engineering,USA
– sequence: 4
  givenname: Trishna
  surname: Chakraborty
  fullname: Chakraborty, Trishna
  email: trishnac@uci.edu
  organization: University of California,Department of Computer Science,Irvine,USA
– sequence: 5
  givenname: Ruochen
  surname: Jiao
  fullname: Jiao, Ruochen
  email: ruochen.jiao@u.northwestern.edu
  organization: Northwestern University,Department of Electrical and Computer Engineering,USA
– sequence: 6
  givenname: Ningfei
  surname: Wang
  fullname: Wang, Ningfei
  email: ningfei.wang@uci.edu
  organization: University of California,Department of Computer Science,Irvine,USA
– sequence: 7
  givenname: Yixuan
  surname: Wang
  fullname: Wang, Yixuan
  email: yixuan-wang2024@u.northwestern.edu
  organization: Northwestern University,Department of Electrical and Computer Engineering,USA
– sequence: 8
  givenname: Takami
  surname: Sato
  fullname: Sato, Takami
  email: takamis@uci.edu
  organization: University of California,Department of Computer Science,Irvine,USA
– sequence: 9
  givenname: Qi Alfred
  surname: Chen
  fullname: Chen, Qi Alfred
  email: alfchen@uci.edu
  organization: University of California,Department of Computer Science,Irvine,USA
– sequence: 10
  givenname: Qi
  surname: Zhu
  fullname: Zhu, Qi
  email: qzhu@northwestern.edu
  organization: Northwestern University,Department of Electrical and Computer Engineering,USA
BookMark eNo10M1Kw0AUBeARFNSaNxCZF0idn2Qy111MqxYKgr8rKTOZm3YgTUoyafHtTVE39yzOx1ncS3LatA0ScsPZlHMGt7O8SBUImAom5JQzkWSawQmJIAMtUyaFTDQ_J1Hfe8sUS3XCVHJBvhbN3gd0d_TT7H2zpmGDdNYOtsZ47tbo6Ouh7cb6fvC1O4IX7H3tsQm0yD96evBhQ4-SmsbRom6H8bbb3RBGfEXOKlP3GP3lhLw_zN-Kp3j5_Lgo8mVsBLAQZ-CcNZAxVIrrtOJC2hJtmloLFSROWcUq5bBUukRu0CjgspSJ04CjF3JCrn93PSKudp3fmu579f8F-QN351UU
ContentType Conference Proceeding
DBID 6IE
6IH
CBEJK
RIE
RIO
DOI 10.1109/DAC56929.2023.10247809
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan (POP) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE/IET Electronic Library (IEL) (UW System Shared)
IEEE Proceedings Order Plans (POP) 1998-present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE/IET Electronic Library (IEL) (UW System Shared)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9798350323481
EndPage 4
ExternalDocumentID 10247809
Genre orig-research
GroupedDBID 6IE
6IH
ACM
ALMA_UNASSIGNED_HOLDINGS
CBEJK
RIE
RIO
ID FETCH-LOGICAL-a290t-79ddba970e66185f123bceb55bb9f94d6b60f6dec68ce1aea6913c34d89e18523
IEDL.DBID RIE
ISICitedReferencesCount 0
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001073487300127&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
IngestDate Wed Aug 27 02:50:59 EDT 2025
IsPeerReviewed false
IsScholarly true
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-a290t-79ddba970e66185f123bceb55bb9f94d6b60f6dec68ce1aea6913c34d89e18523
PageCount 4
ParticipantIDs ieee_primary_10247809
PublicationCentury 2000
PublicationDate 2023-July-9
PublicationDateYYYYMMDD 2023-07-09
PublicationDate_xml – month: 07
  year: 2023
  text: 2023-July-9
  day: 09
PublicationDecade 2020
PublicationTitle 2023 60th ACM/IEEE Design Automation Conference (DAC)
PublicationTitleAbbrev DAC
PublicationYear 2023
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssib060584064
Score 2.2524738
Snippet The rapid advancement of edge and cloud computing platforms, vehicular ad-hoc networks, and machine learning techniques have brought both opportunities and...
SourceID ieee
SourceType Publisher
StartPage 1
SubjectTerms Ad hoc networks
Cloud computing
connected and autonomous vehicles
edge computing
Safety
Security
Servers
Uncertainty
V2X
Wireless communication
Title Invited: Waving the Double-Edged Sword: Building Resilient CAVs with Edge and Cloud Computing
URI https://ieeexplore.ieee.org/document/10247809
WOSCitedRecordID wos001073487300127&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1JSwMxFA5aPHhSseJODl6nppOZzKS3OrbopRTXXqRkeZFCmZFu_n3z0qniwYOXEEIWeEn4Xl7y5SPkyiWSMcggMtK4CD-Ui6T1jpxluQOWW5SQDmIT2WCQj0ZyWJPVAxcGAMLjM2hhNtzl28osMVTmd3icZDnS9bazTKzJWpvFg9d7HpySmgXcZvL6tlukwsN_CyXCW5vGv2RUAor09_45_j5p_vDx6PAbaQ7IFpSH5O2-XKG_2KGvCqMC1Lty1PvDegpRz76DpY-f_mTZoTe18jV9gPlkivxHWnRf5hRDsBRrUlVaWkyrpU-DyIOv3CTP_d5TcRfVYgmRiiVbRJm0ViuZMfCIm6fOI5I2oNNUa-lkYoUWzAkLRuQG2gqUkG1ueGJzCUig5kekUVYlHBPK_Z70MG-cgDgRjGulfLcxT53jilt1Qppom_HH-j-M8cYsp3-Un5FdnIHwyFWek8ZitoQLsmNWi8l8dhlm8Qvq3J2B
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LTwMhGCRGTfSkxhrfcvC6lS4su_RW1zZtrE2jVXsxDY8P06TZmr78-wJtNR48eCGEsITAkhk-GAaha8sEIZBCpIW2kX9QLhLGETlDMgskM95COphNpJ1O1u-L7kqsHrQwABAun0HZZ8NZvhnruQ-VuRUeszTzcr2thLGYLOVa69_HH_A5eGIrHXCFiJu7Wp5wRwDK3iS8vP78l5FKwJHG3j97sI9KP4o83P3GmgO0AcUhemsVC88Yq_hV-rgAdmQOO0asRhDVzTsY_PTp9pZVfLvyvsaPMB2OvAIS57WXKfZBWOxrYlkYnI_Gc5cGmwdXuYSeG_Ve3oxWdgmRjAWZRakwRkmREnCYmyXWYZLSoJJEKWEFM1xxYrkBzTMNFQmSiwrVlJlMgJdQ0yO0WYwLOEaYulXpgF5bDjHjhCopXbMxTaylkhp5gkp-bAYfyxcxButhOf2j_ArtNHsP7UG71bk_Q7t-NsKVV3GONmeTOVygbb2YDaeTyzCjX0xZoMg
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2023+60th+ACM%2FIEEE+Design+Automation+Conference+%28DAC%29&rft.atitle=Invited%3A+Waving+the+Double-Edged+Sword%3A+Building+Resilient+CAVs+with+Edge+and+Cloud+Computing&rft.au=Liu%2C+Xiangguo&rft.au=Luo%2C+Yunpeng&rft.au=Goeckner%2C+Anthony&rft.au=Chakraborty%2C+Trishna&rft.date=2023-07-09&rft.pub=IEEE&rft.spage=1&rft.epage=4&rft_id=info:doi/10.1109%2FDAC56929.2023.10247809&rft.externalDocID=10247809