Authenticity of LiDAR Points in Autonomous Vehicle “Certified Control” Architecture

Giulio Capolino, Carolina Ortega Perez, Cynthia Liu,Valerie Richmond

semanticscholar(2020)

引用 0|浏览0
暂无评分
摘要
A typical AV architecture is shown in Figure 1. The sensors send their data to a controller, which does the complex work of perception and control, often using machine learning. The controller then sends its chosen action to the actuators, which physically execute the action. In this setup, each of the three components is in the “trusted base.” This means that, were any single component to be infiltrated, the entire system would be compromised. This is concerning, especially due to the complexity of the controller. The controller may be internet-connected or otherwise particularly susceptible to malicious infiltration, so it is preferable to exclude it from the trusted base. 1The development of the certified control architecture, described here, is in no part ours. We attribute [2] for this concepts in this section.
更多
查看译文
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要