{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T17:54:40Z","timestamp":1776880480666,"version":"3.51.2"},"reference-count":52,"publisher":"EDP Sciences","license":[{"start":{"date-parts":[[2023,10,16]],"date-time":"2023-10-16T00:00:00Z","timestamp":1697414400000},"content-version":"vor","delay-in-days":288,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1964201"],"award-info":[{"award-number":["U1964201"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"ShanghaiMunicipal Science and Technology Commission","award":["23ZR1467700"],"award-info":[{"award-number":["23ZR1467700"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Safety"],"accepted":{"date-parts":[[2023,8,17]]},"published-print":{"date-parts":[[2023]]},"abstract":"<jats:p>In this article, a systematic assessment of cyber-physical security is developed for the lane-keeping control (LKC) system of autonomous vehicles (AVs), which has not been attempted before. A novel impact analysis methodology for typical cyber-attacks is proposed with new evaluation metrics from the viewpoint of safety and performance and innovative index-based resilience and security criteria. Specifically, a security criterion is investigated by tracking performance, comfort and vehicle stability to evaluate the safety and security of the vehicle LKC system. Hardware-in-the-Loop (HiL) experimental results show that the proposed evaluation metrics are effective in analyzing the impact of cyber-attacks on the commercial LKC system of Dongfeng Motor comprehensively. Finally, the conclusion provides guidelines for attack detection, diagnosis, and countermeasures for AVs.<\/jats:p>","DOI":"10.1051\/sands\/2023027","type":"journal-article","created":{"date-parts":[[2023,9,4]],"date-time":"2023-09-04T18:59:02Z","timestamp":1693853942000},"page":"2023027","source":"Crossref","is-referenced-by-count":1,"title":["Systematic assessment of cyber-physical security of lane keeping control system for autonomous vehicles"],"prefix":"10.1051","volume":"2","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6746-2953","authenticated-orcid":false,"given":"Yulei","family":"Wang","sequence":"first","affiliation":[]},{"given":"An","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Fan","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Jiazhi","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Ning","family":"Bian","sequence":"additional","affiliation":[]},{"given":"Lulu","family":"Guo","sequence":"additional","affiliation":[]}],"member":"250","published-online":{"date-parts":[[2023,10,16]]},"reference":[{"key":"R1","doi-asserted-by":"crossref","first-page":"1925","DOI":"10.1109\/TITS.2017.2745678","volume":"19","author":"Naufal","year":"2017","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"R2","doi-asserted-by":"crossref","first-page":"107534","DOI":"10.1016\/j.cie.2021.107534","volume":"160","author":"Colabianchi","year":"2021","journal-title":"Comput Ind Eng"},{"key":"R3","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1109\/MCS.2016.2643239","volume":"37","author":"Pajic","year":"2017","journal-title":"IEEE Trans Contr Syst Mag"},{"key":"R4","doi-asserted-by":"crossref","first-page":"4639","DOI":"10.1109\/JESTPE.2020.3045667","volume":"9","author":"Ye","year":"2021","journal-title":"IEEE J Emerg Sel Top Power Electron"},{"key":"R5","doi-asserted-by":"crossref","first-page":"102150","DOI":"10.1016\/j.cose.2020.102150","volume":"103","author":"Kim","year":"2021","journal-title":"Comput Secur"},{"key":"R6","doi-asserted-by":"crossref","unstructured":"Shoukry Y, Martin P and Tabuada P et al. Non-invasive spoofing attacks for anti-lock braking systems. In: International Conference on Cryptographic Hardware and Embedded Systems (CHES 2013), 2013, 55\u201372.","DOI":"10.1007\/978-3-642-40349-1_4"},{"key":"R7","doi-asserted-by":"crossref","unstructured":"Tippenhauer NO, P\u00f6opper C and Rasmussen KB et al. On the requirements for successful GPS spoofing attacks. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011, 75\u201386.","DOI":"10.1145\/2046707.2046719"},{"key":"R8","doi-asserted-by":"crossref","unstructured":"Koscher K, Czeskis A and Roesner F Experimental security analysis of a modern automobile. In: 2010 IEEE Symposium on Security and Privacy. IEEE, 2010, 447\u201362.","DOI":"10.1109\/SP.2010.34"},{"key":"R9","unstructured":"Checkoway S, McCoy D and Kantor B et al. Comprehensive experimental analyses of automotive attack surfaces. In: USENIX Security Symposium 2011, 2021 447\u201362."},{"key":"R10","first-page":"0","volume":"1","author":"Zhang","year":"2014","journal-title":"IEEE Internet Things J"},{"key":"R11","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1080\/01441647.2018.1494640","volume":"39","author":"Taeihagh","year":"2019","journal-title":"Transp Rev"},{"key":"R12","doi-asserted-by":"crossref","unstructured":"Schmittner C, Dobaj J and Macher GA et al. A preliminary view on automotive cyber security management systems. In: 2020 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2020, 1634\u201339.","DOI":"10.23919\/DATE48585.2020.9116406"},{"key":"R13","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1007\/s42154-021-00140-6","volume":"4","author":"Wang","year":"2021","journal-title":"Automot Innovation"},{"key":"R14","doi-asserted-by":"crossref","first-page":"7572","DOI":"10.1109\/JIOT.2021.3130054","volume":"9","author":"Gao","year":"2021","journal-title":"IEEE Internet Things J"},{"key":"R15","doi-asserted-by":"crossref","first-page":"106515","DOI":"10.1016\/j.aap.2021.106515","volume":"165","author":"GKhan","year":"2022","journal-title":"Accid Anal Prev"},{"key":"R16","doi-asserted-by":"crossref","first-page":"6240","DOI":"10.1109\/TITS.2021.3085297","volume":"23","author":"Sun","year":"2021","journal-title":"IEEE Trans Intell Transp. Syst"},{"key":"R17","doi-asserted-by":"crossref","first-page":"4463","DOI":"10.1109\/TPEL.2020.3025718","volume":"36","author":"Guo","year":"2020","journal-title":"IEEE Trans Power Electron"},{"key":"R18","doi-asserted-by":"crossref","unstructured":"Guo L, Yang B and Ye J et al. Attack-resilient lateral stability control for autonomous in-wheel-motor-driven electric vehicles. In: 2021 IEEE Transportation Electrification Conference & Expo (ITEC). IEEE, 2021, 200\u20135.","DOI":"10.1109\/ITEC51675.2021.9490133"},{"key":"R19","doi-asserted-by":"crossref","first-page":"1362","DOI":"10.1109\/TTE.2021.3102134","volume":"8","author":"Guo","year":"2022","journal-title":"IEEE Trans Transp Electrif"},{"key":"R20","unstructured":"Wise D. Vehicle cybersecurity: DOT and industry have efforts under way but DOT needs to define its role in responding to a real-world attack, Gao Reports, 2016. https: \/\/www.gao.gov\/products\/gao-16-350."},{"key":"R21","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1109\/MWC.2019.1800503","volume":"26","author":"Nanda","year":"2019","journal-title":"IEEE Wireless Commun"},{"key":"R22","doi-asserted-by":"crossref","first-page":"7015","DOI":"10.1109\/TITS.2020.3000797","volume":"22","author":"Chattopadhyay","year":"2020","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"R23","doi-asserted-by":"crossref","first-page":"12679","DOI":"10.1109\/TVT.2020.3030251","volume":"69","author":"Alipour-Fanid","year":"2020","journal-title":"IEEE Trans Veh Technol"},{"key":"R24","first-page":"3335","volume":"37","author":"Guo","year":"2020","journal-title":"IEEE Trans Ind Inf"},{"key":"R25","doi-asserted-by":"crossref","first-page":"3821","DOI":"10.1109\/TITS.2019.2934481","volume":"21","author":"Mousavinejad","year":"2019","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"R26","doi-asserted-by":"crossref","unstructured":"Limbasiya T, Teng KZ and Chattopadhyay S et al. A systematic survey of attack detection and prevention in Connected and Autonomous Vehicles. Veh Commun 2022; 100515.","DOI":"10.1016\/j.vehcom.2022.100515"},{"key":"R27","doi-asserted-by":"crossref","first-page":"23559","DOI":"10.1109\/TITS.2022.3197817","volume":"23","author":"Dasgupta","year":"2022","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"R28","doi-asserted-by":"crossref","first-page":"5502","DOI":"10.1109\/TNNLS.2021.3053269","volume":"32","author":"Zhang","year":"2021","journal-title":"IEEE Trans Neural Networks Learn Syst"},{"key":"R29","doi-asserted-by":"crossref","first-page":"1508","DOI":"10.1049\/itr2.12114","volume":"15","author":"Wang","year":"2021","journal-title":"IET Intell Transp Syst"},{"key":"R30","doi-asserted-by":"crossref","first-page":"15655","DOI":"10.1109\/TITS.2022.3144599","volume":"23","author":"Boddupalli","year":"2022","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"R31","unstructured":"Dongfeng Motor. 2 Gold, 1 Silver, and 2 Challenge Awards. Fully demonstrated Dongfeng Fengshen L3-ADAS. http:\/\/www.whkfq.gov.cn\/xwzx\/yw\/kfqyw\/qnxw\/202206\/t202206281995169.html."},{"key":"R32","doi-asserted-by":"crossref","unstructured":"Hoehn A and Zhang P. Detection of covert attacks and zero dynamics attacks in cyber-physical systems. In: 2016 American Control Conference (ACC), 2016, 302\u20137.","DOI":"10.1109\/ACC.2016.7524932"},{"key":"R33","doi-asserted-by":"crossref","unstructured":"Alieyan K, Kadhum M and Anbar M et al. An overview of DDoS attacks based on DNS. In: 2016 International Conference on Information and Communication Technology Convergence (ICTC), 2016, 276\u201380.","DOI":"10.1109\/ICTC.2016.7763485"},{"issue":"6","key":"R34","doi-asserted-by":"crossref","first-page":"701","DOI":"10.1080\/00423110802344636","volume":"47","author":"Peters","year":"2009","journal-title":"Veh Syst Dyn"},{"issue":"12","key":"R35","doi-asserted-by":"crossref","first-page":"7799","DOI":"10.1109\/TSMC.2022.3164024","volume":"52","author":"Jiang","year":"2022","journal-title":"IEEE Trans Syst Man Cybern: Syst"},{"issue":"2","key":"R36","doi-asserted-by":"crossref","first-page":"507","DOI":"10.4271\/2013-01-1415","volume":"6","author":"Ward","year":"2013","journal-title":"SAE Int J Passeng Cars \u2013 Electron Electr Syst"},{"issue":"3","key":"R37","first-page":"290","volume":"5","author":"Othmane","year":"2014","journal-title":"Int J Next-Gener Comput"},{"issue":"2","key":"R38","first-page":"546","volume":"16","author":"Petit","year":"2015","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"R39","first-page":"125","volume":"240","author":"Bayer","year":"2015","journal-title":"Automot Saf Secur"},{"key":"R40","first-page":"1288|94","volume":"83","author":"Georg","year":"2016","journal-title":"Procedia Comput Sci"},{"key":"R41","doi-asserted-by":"crossref","unstructured":"Islam MM, Lautenbach A and Sandberg C et al. A risk assessment framework for automotive embedded systems. In: Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security, 2016, 3\u201314.","DOI":"10.1145\/2899015.2899018"},{"issue":"5","key":"R42","doi-asserted-by":"crossref","first-page":"2452","DOI":"10.1109\/TSG.2017.2669647","volume":"8","author":"Alcaraz","year":"2017","journal-title":"IEEE Trans Smart Grid"},{"key":"R43","doi-asserted-by":"crossref","first-page":"360","DOI":"10.1016\/j.cose.2018.04.008","volume":"77","author":"Cheah","year":"2018","journal-title":"Comput Secur"},{"issue":"2","key":"R44","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1504\/IJATM.2018.092187","volume":"18","author":"Morris","year":"2018","journal-title":"Int J Automot Technol Manage"},{"key":"R45","doi-asserted-by":"crossref","unstructured":"Bolovinou A, Atmaca UI and Sheik AT et al. TARA+: controllability-aware threat analysis and risk assessment for L3 automated driving systems. In: IEEE Intelligent Vehicles Symposium (IV), 2019, 8\u201313.","DOI":"10.1109\/IVS.2019.8813999"},{"key":"R46","doi-asserted-by":"crossref","first-page":"106515","DOI":"10.1016\/j.aap.2021.106515","volume":"165","author":"Khan","year":"2022","journal-title":"Accid Anal Prev"},{"key":"R47","doi-asserted-by":"crossref","unstructured":"Moukahal L, Zulkernine M and Soukup M. AVSDA: Autonomous vehicle security decay assessment. In: Risks and Security of Internet and Systems: 16th International Conference, 2022, 20\u201337.","DOI":"10.1007\/978-3-031-02067-4_2"},{"issue":"9","key":"R48","doi-asserted-by":"crossref","first-page":"2300","DOI":"10.1109\/TIFS.2019.2895957","volume":"14","author":"Ying","year":"2019","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"3","key":"R49","doi-asserted-by":"crossref","first-page":"1264","DOI":"10.1109\/TITS.2019.2906038","volume":"21","author":"VanWyk","year":"2019","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"2","key":"R50","doi-asserted-by":"crossref","first-page":"1484","DOI":"10.1109\/TVT.2019.2961344","volume":"69","author":"Olufowobi","year":"2020","journal-title":"IEEE Trans Veh Technol"},{"issue":"6","key":"R51","doi-asserted-by":"crossref","first-page":"5244","DOI":"10.1109\/TVT.2021.3061746","volume":"70","author":"Xie","year":"2021","journal-title":"IEEE Trans Veh Technol"},{"issue":"5","key":"R52","first-page":"2209","volume":"18","author":"Liu","year":"2021","journal-title":"IEEE Trans Dependable Secure Comput"}],"container-title":["Security and Safety"],"original-title":[],"link":[{"URL":"https:\/\/sands.edpsciences.org\/10.1051\/sands\/2023027\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,16]],"date-time":"2023-10-16T08:10:29Z","timestamp":1697443829000},"score":1,"resource":{"primary":{"URL":"https:\/\/sands.edpsciences.org\/10.1051\/sands\/2023027"}},"subtitle":[],"editor":[{"given":"Jian","family":"Sun","sequence":"first","affiliation":[]},{"given":"Youmin","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Hong","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Mou","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Qinglei","family":"Hu","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":52,"alternative-id":["sands20230005"],"URL":"https:\/\/doi.org\/10.1051\/sands\/2023027","relation":{},"ISSN":["2826-1275"],"issn-type":[{"value":"2826-1275","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}