Books et al.ENGINEERING

American adventure and autonomous cars

See allHide authors and affiliations

Science  12 Jul 2019:
Vol. 365, Issue 6449, pp. 130-131
DOI: 10.1126/science.aax8083

eLetters is an online forum for ongoing peer review. Submission of eLetters are open to all. eLetters are not edited, proofread, or indexed.  Please read our Terms of Service before submitting your own eLetter.

Compose eLetter

Plain text

  • Plain text
    No HTML tags allowed.
  • Web page addresses and e-mail addresses turn into links automatically.
  • Lines and paragraphs break automatically.
Author Information
First or given name, e.g. 'Peter'.
Your last, or family, name, e.g. 'MacMoody'.
Your email address, e.g. higgs-boson@gmail.com
Your role and/or occupation, e.g. 'Orthopedic Surgeon'.
Your organization or institution (if applicable), e.g. 'Royal Free Hospital'.
Statement of Competing Interests
CAPTCHA

This question is for testing whether or not you are a human visitor and to prevent automated spam submissions.

Image CAPTCHA
Enter the characters shown in the image.

Vertical Tabs

  • Autonomous vehicles must overcome spoofing, silencing, jamming attacks…

    Lee Vinsel wrote an article entitled “American adventure and autonomous cars” (1). Autonomous vehicles have key sensors including global positioning system (GPS), millimeter wave radar, light detection and ranging (LiDAR), ultrasonic sensor, and camera sensors. They have been weak and vulnerable against spoofing, silencing, and jamming attacks (2). In order words, we must build robust autonomous vehicles against known and unknown adversarial attacks. Otherwise, the autonomous vehicles, and self-driving cars, will become the next crime frontier. In order to build the robust autonomous vehicles, every sensor must be AI-embedded and smart / intelligent enough to overcome the adversarial attacks. AI will play a key role in overcoming autonomous vehicles vulnerabilities.

    References:
    1. Lee Vinsel, American adventure and autonomous cars, Science 12 Jul 2019: Vol. 365, Issue 6449, pp. 130-131
    2. Y. Takefuji, "Connected Vehicle Security Vulnerabilities [Commentary]," in IEEE Technology and Society Magazine, vol. 37, no. 1, pp. 15-18, March 2018

    Competing Interests: None declared.