make PPT explaining importance of such cars in present scenario. (Maximum slide 8 to 10) Guidelines 1.Key Physical Components of Autonomous Vehicles. 2 Companies Investing in Autonomous Vehicles 3Advantages 4 A Vision for Safety”- Common Security Vulnerabilities 5 Your view about getting such cars on road 6 Design your own dream car
Answers
1. Key Physical Components of Autonomous Vehicles
• Cameras - Provide real-time obstacle detection to facilitate lane departure and track roadway information (like road signs).
• Radar - Radio waves detect short & long-range depth.
• LIDAR - Measures distance by illuminating target with pulsed laser light and measuring reflected pulses with sensors to create 3-D map of area.
• GPS - Triangulates position of car using satellites. Current GPS technology is limited to a certain distance. Advanced GPS is in development.
• Ultrasonic Sensors - Uses high-frequency sound waves and bounce-back to calculate distance. Best in close range.
• Central Computer - “Brain” of the vehicle. Receives information from various components and helps direct vehicle overall.
• DRSC - Based Receiver – Communications device permitting vehicle to communicate with other vehicles (V2V) using DSRC, a wireless communication standard that enables reliable data transmission in active safety applications. NHTSA has promoted the use of DSRC.
2. Companies Investing in Autonomous Vehicles
Vehicles operating in SAE levels of automation 1-3 are already in commercial use and many companies are investing further in developing highly and fully automated vehicles.
4. Common Security Vulnerabilities
• Software Glitches – Connected vehicles today contain more than 100 million lines of code. More code means more opportunity for bugs and mistakes. Glitches, even when inadvertent, can be exploited.
• No Single Source of Knowledge of or Control Over Source Code – Software for different components of connected vehicles is being written by different developers, installed by different supplies, and no one source has knowledge of or control over the source code.
• Increase Use of Apps Leave Vulnerabilities – Consumers are using an increasing number of smartphone apps to interface with their connected cars and help run certain functions. Researchers have already demonstrated weaknesses in some of these apps. Likely to see spread in use of malware.
• Need for Constant Updates May be Overlooked – With the increased use of connected features comes an increased need for continuous updates to fix glitches and help protect vehicles. There is a risk these updates could be overlooked or that malicious actors could infect routine updates.