Abstracts
2020
IEEE Transactions on Intelligent Vehicles
Shadow detection and removal is an important task for on-road visual perception. However, effectively detecting and removing the shadows on the road to maintain illumination consistency remain challenging. Road shadows blur and change road features, greatly damaging the image quality and making further detection and tracking more difficult to implement. For example, detection could be mistaken due to incorrect identification of shadow boundaries. The adaptability and accuracy can be affected as
more »
... well. To tackle the problems, this paper employs Support Vector Machine (SVM) based on color saliency space and gradient field to detect shadow. Nonlinear SVM classifier analyzes its color saliency space and gradient information, then reconstructs road shadow descriptor to distinguish shadowed regions. To remove the shadow, adaptive variable scale regional compensation operator is adopted. Following experiments verify the detection and removal method are feasible in the real world, and robust to many types of road conditions. The rapidly increasing connectedness of modern vehicles leads to new security challenges for intelligent connected vehicles (ICVs), where some potential attackers can achieve unauthorized access to gain control of the vehicle by injecting malicious information into in-vehicle electronic control units (ECUs). Therefore, in this paper, a secure attributeisolated communication architecture for an ICV, which introduces attributes into the ECUs to achieve authorized access among the ECU nodes is proposed. First, an analysis of the functional attributes of all of the in-vehicle ECUs in an intelligent connected environment and a division of the functional attributes of the ECUs into five classifications are performed. Second, based on the above-classified attributes, a secure attribute-isolated communication architecture is demonstrated. The ECUs have different access rights, allowing only the ECUs with the same functional attributes in the internal network of the vehicle to communicate. Then, it is proven that the proposed architecture can resist forgery and eavesdropping attacks under the random oracle model. Finally, the secure attribute-isolated communication architecture is constructed in a hardware environment and evaluated with an in-vehicle network simulator (IVNS). The evaluation results show that the average memory usage with 120 ECUs and 100 messages is below 40 MB and the bus load can be reduced to 18.96% using the proposed security architecture compared to the bus load of existing architectures. Therefore, the proposed secure attribute-isolated communication architecture solves the problem of the tradeoff between the security threat of unauthorized access and the high bus load of existing in-vehicle architectures.
doi:10.1109/tiv.2020.3010142
fatcat:emuoyu7bdvghpisblhyzgeaxdi