Next Article in Journal
Multivariate Hydrological Modeling Based on Long Short-Term Memory Networks for Water Level Forecasting
Previous Article in Journal
Prominent User Segments in Online Consumer Recommendation Communities: Capturing Behavioral and Linguistic Qualities with User Comment Embeddings
Previous Article in Special Issue
Formal Methods and Validation Techniques for Ensuring Automotive Systems Security
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Brief Report

Autonomous Vehicle Safety through the SIFT Method: A Conceptual Analysis

by
Muhammad Anshari
1,*,
Mohammad Nabil Almunawar
1,
Masairol Masri
1,
Norma Latif Fitriyani
2 and
Muhammad Syafrudin
2,*
1
School of Business & Economics, Universiti Brunei Darussalam, Bandar Seri Begawan BE1410, Brunei
2
Department of Artificial Intelligence and Data Science, Sejong University, Seoul 05006, Republic of Korea
*
Authors to whom correspondence should be addressed.
Information 2024, 15(6), 357; https://doi.org/10.3390/info15060357
Submission received: 8 May 2024 / Revised: 8 June 2024 / Accepted: 14 June 2024 / Published: 15 June 2024
(This article belongs to the Special Issue Automotive System Security: Recent Advances and Challenges)

Abstract

:
This study aims to provide a conceptual analysis of the dynamic transformations occurring in an autonomous vehicle (AV), placing a specific emphasis on the safety implications for pedestrians and passengers. AV, also known as self-driving automobiles, are positioned as potential disruptors in the contemporary transportation landscape, offering heightened safety and improved traffic efficiency. Despite these promises, the intricate nature of road scenarios and the looming specter of misinformation pose challenges that can compromise the efficacy of AV decision-making. A crucial aspect of the proposed verification process is the incorporation of the stop, investigate the source, find better coverage, trace claims, quotes, and media to the original context (SIFT) method. The SIFT method, originally designed to combat misinformation, emerges as a valuable mechanism for enhancing AV safety by ensuring the accuracy and reliability of information influencing autonomous decision-making processes.

1. Introduction

The transportation sector is undergoing a radical transformation with the emergence of autonomous vehicles (AV), which offer many benefits, such as reducing accidents, enhancing mobility, and saving lives [1]. However, a major challenge is to ensure the safety and reliability of AVs, which face various difficulties in their operation. AVs must deal with complex and dynamic road situations requiring high-level decision-making and coordination. Furthermore, AVs are exposed to the risk of misinformation attacks that can tamper with their sensors and communication systems. Therefore, it is vital to develop efficient methods to verify the correctness and security of AVs under different conditions and scenarios.
One of the main issues related to AVs is their ability to handle complex road situations, such as crowded urban intersections, unpredictable pedestrian behavior, and harsh weather conditions [2]. These situations require AVs to make quick decisions based on a large amount of sensory data, such as camera images, radar signals, and lidar scans [3]. The complexity of these situations and the possibility of misinterpretations highlight the need for strong verification mechanisms to validate the decision-making processes of AVs [4].
Another important challenge stems from the vulnerability of AVs to misinformation, both deliberate and accidental [5]. Malicious actors could exploit weaknesses in AV systems to manipulate their sensors or inject false data, potentially leading to disastrous accidents. Accidental misinformation could result from errors in data collection or processing, introducing inaccuracies that could jeopardize the safety of AV operations [6]. Addressing these challenges requires a comprehensive approach that includes strong cybersecurity measures, rigorous data validation protocols, and continuous monitoring of AV performance [7].
The manuscript is organized to thoroughly address the evolving landscape of autonomous vehicles (AVs) with a primary focus on safety implications for pedestrians and passengers. The introduction sets the context by emphasizing the transformative potential of AVs and introduces the main concern of safety in the face of complex road scenarios and misinformation threats. The literature review surveys recent developments in AV technology and examines existing studies on safety concerns, establishing the need for a strong verification mechanism. A detailed case study scenario is presented to illustrate the challenges faced by AV, emphasizing the potential impact of misinformation on decision-making.
The conceptual framework section explains the integration of the stop, investigate the source, find better coverage, and trace claims (SIFT) method into AV safety protocols, providing a theoretical basis for its application. Challenges and opportunities in implementing the SIFT method are discussed, highlighting real-time processing challenges and opportunities for refinement. The conclusion synthesizes key findings and underscores the significance of the SIFT method in addressing AV safety concerns, while the future directions section suggests avenues for further research, including ongoing refinement of the SIFT method and collaborative efforts to establish standardized safety protocols for the automotive industry. The manuscript is supported by a solid reference section, grounding the analysis in existing scholarship and research.
This article aims to explore the application of the SIFT method to enhance AV safety protocols. The objective is to investigate how the SIFT method can be leveraged to improve the reliability and trustworthiness of AV systems, particularly in complex traffic scenarios. The scope of this research includes examining the conceptual framework of the SIFT method, its potential benefits in AV safety, and its implications for the development of more robust and secure AV systems.
This paper is organized into seven sections, providing a comprehensive exploration of the role of SIFT in AVs. The introduction sets the stage, followed by a thorough literature review of existing research on AVs in Section 2. A case study is then presented to illustrate the practical implementation of AV safety using SIFT in Section 3. The conceptual framework section, which outlines the key components and mechanisms involved in integrating the SIFT method into AV safety, is described in Section 4. The challenges and limitations of AV are discussed in Section 5, followed by an examination of the promising potentials and future directions of this field in Section 6. Finally, the conclusion summarizes the key findings and implications of the research in Section 7. The list of abbreviations and acronyms used in this study can be found in Appendix A, Table A1.

2. Literature Review

AVs are vehicles that can drive themselves without human intervention, using sensors, cameras, artificial intelligence, and other technologies to sense and navigate the environment. AVs have the potential to enhance road safety, mobility, efficiency, and sustainability, as well as to decrease traffic congestion, fuel consumption, and emissions [8]. However, AVs also encounter many technical, ethical, and social challenges that need to be resolved before they can be widely adopted and trusted by the public. In this study, we will review several of the recent developments in AV technology, discuss the features that contribute to safety and efficiency, and evaluate the existing studies on AV safety concerns, emphasizing the importance of addressing misinformation [9]. One of the major developments in AV technology is the creation of high-performance computing platforms that can process large amounts of data from multiple sensors and cameras, and run complex algorithms and machine-learning models to enable real-time decision-making and control [10].
For example, NVIDIA’s DRIVE (Santa Clara, CA, United States) platform is a scalable and modular system that can support various levels of automation, from driver assistance to fully autonomous driving [11]. The platform integrates hardware, software, and cloud services to provide a comprehensive solution for AV development and deployment. Another important development in AV technology is the improvement of sensor fusion and perception capabilities, which enable AVs to detect and recognize objects, lanes, traffic signs, and signals, and to estimate their position, speed, and orientation [12]. Sensor fusion is the process of combining and integrating data from different sensors, such as cameras, radars, lidars, and ultrasonic sensors, to create a more accurate and robust representation of the surrounding environment. Perception is the process of interpreting and understanding the sensor data and generating a semantic map that can be used for planning and control. For example, Waymo’s AVs use a combination of sensors and deep neural networks to perceive and classify various road agents, such as vehicles, pedestrians, cyclists, and animals, and to predict their future behavior and intentions [13,14].
A third significant development in AV technology is the enhancement of communication and coordination capabilities, which enable AV to exchange information and cooperate with other vehicles, infrastructure, and road users. Communication and coordination can improve the safety, efficiency, and reliability of AVs, as well as their social acceptance and integration (see Figure 1). For example, vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication can enable AVs to share their location, speed, direction, and intention, and to receive traffic and road condition information, such as traffic lights, speed limits, and road hazards [15,16]. Vehicle-to-pedestrian (V2P) and vehicle-to-everything (V2X) communication can enable AVs to interact and negotiate with pedestrians, cyclists, and other road users, and to use external signals, such as sounds, lights, and gestures, to convey their actions and intentions. Despite these developments, AV technology still faces many safety challenges and concerns, such as dealing with complex and dynamic road situations, ensuring the reliability and security of the systems, and addressing the ethical and legal implications of the technology [17,18].
Moreover, AV technology is also vulnerable to misinformation attacks, which are strategic deception campaigns that involve media manipulation and internet manipulation to disseminate misleading information, aiming to confuse, paralyze, and polarize an audience [19]. Misinformation attacks can undermine the trust and confidence in AV technology and pose threats to democratic governance and the integrity of electoral processes. Therefore, it is essential to develop efficient methods to verify the correctness and security of AVs under various conditions and scenarios and combat the misinformation and disinformation campaigns that target AV technology and its stakeholders [20].
The literature review explores recent advancements in AV technology, highlighting their potential benefits, such as enhanced safety and efficiency, while addressing associated challenges. Key developments include high-performance computing platforms, improved sensor fusion and perception capabilities, and enhanced communication and coordination features. Despite progress, safety concerns persist, compounded by the threat of misinformation attacks. We propose a novel conceptual framework and case study scenario to illustrate AV challenges, emphasizing the impact of misinformation on decision-making. Additionally, we advocate for the integration of the SIFT method into AV safety protocols, discussing implementation challenges and opportunities for refinement. This research presents a pioneering effort to address AV safety and misinformation concerns comprehensively.

3. Case Study Scenario

In this scenario, an AV is navigating along a highway, showcasing a common yet critical challenge in the integration of AVs into contemporary transportation systems. As the AV traverses the highway, its infotainment system receives a deceptive fake news alert indicating an impending road closure. AV, designed to prioritize safety, reacts to the misinformation by slowing down and eventually coming to a complete stop. This response is a testament to the vulnerability of AVs to false information, as they inherently trust and act upon the data received from their various sensors and communication systems. Consequently, this decision triggers a ripple effect, causing an unintended traffic jam behind AV. Unaware of the deceptive alert, other human-driven vehicles approach the seemingly unnecessary slowdown, exacerbating congestion and potentially compromising overall traffic flow efficiency. This scenario underscores the critical need for robust information verification mechanisms, such as the SIFT method, to fortify AV decision-making and avert disruptions caused by the propagation of fake news within the autonomous driving ecosystem. The point-by-point case study scenario describes AV navigating along a bustling highway during peak traffic hours. This scenario exemplifies a common yet pivotal challenge in the integration of AVs into contemporary transportation systems.
  • Introduction to the Setting: The highway is characterized by a steady flow of vehicles, with AV seamlessly blending into the stream of traffic. Surrounding it are diverse vehicles, ranging from sedans to large trucks, all moving at varying speeds.
  • Deceptive Alert Reception: As the AV continues its journey, its infotainment system suddenly receives a deceptive fake news alert via an anonymous source, indicating an imminent road closure ahead. The alert appears urgent and authoritative, causing the AV’s system to prioritize safety and react promptly.
  • AV Response: In response to the misleading alert, AV’s sophisticated algorithms analyze the information and decide to take precautionary measures. Understanding the potential risks associated with a road closure, the AV initiates a gradual deceleration, signaling its intent to slow down.
  • Deceleration and Stop: As the AV gradually reduces its speed, it meticulously evaluates the situation, weighing the credibility of the alert against its safety protocols. Eventually, the AV comes to a complete stop, erring on the side of caution to ensure the safety of its passengers and surrounding vehicles.
  • Ripple Effect: The AV’s decision to halt unexpectedly triggers a ripple effect throughout the highway. Vehicles behind the AV, both human-driven and autonomous, respond to the sudden slowdown, causing a chain reaction of braking and congestion.
  • Unintended Traffic Jam: Unbeknownst to the other vehicles, the reason for the slowdown remains unclear, leading to confusion and frustration among drivers. Human-driven vehicles, unable to comprehend the reason for the AV’s deceleration, approach the apparent bottleneck cautiously, exacerbating congestion and compromising overall traffic flow efficiency.
  • Critical Need for Verification Mechanisms: This scenario vividly illustrates the vulnerability of AVs to false information and the subsequent ramifications on traffic dynamics. It underscores the indispensable requirement for robust information verification mechanisms, such as the SIFT method, to fortify AV decision-making and avert disruptions caused by the propagation of fake news within the autonomous driving ecosystem.
Through this detailed scenario, the challenges and consequences of misinformation in AV environments become evident, highlighting the urgency for reliable verification mechanisms to safeguard against such threats.

4. Conceptual Framework: Integrating the SIFT Method into AV Safety Protocols

An AV is navigating along a highway when it receives a fake news alert indicating an impending road closure. The AV, designed to prioritize safety, reacts by slowing down and eventually coming to a complete stop, triggering an unnecessary traffic jam. The SIFT method is a short list of four moves to verify the reliability of a source of information before using it in your research. The SIFT method is a technique that can be integrated into AV safety protocols to prevent misinformation or fake news from affecting the AV’s decision-making and behavior. The following diagram illustrates how the SIFT method can be applied in the scenario of an AV receiving a deceptive fake news alert indicating an impending road closure. To integrate the SIFT method into AV safety protocols to effectively combat misinformation and ensure seamless autonomous driving operations (see Figure 2).
Stop: When AV receives a potentially misleading alert, it should stop any automated actions based on the alert. This temporary pause allows for a more in-depth investigation of the information’s validity. AVs should not immediately react to the information, but pause and check its emotions and biases. The AV should ask itself whether it knows the information source and if it has any information about the claim’s credibility or the website’s reputation. If not, the AV should use the other moves to evaluate the information.
Investigate: The AV should use its network connectivity and access to reputable news sources to verify the origin of the received alert. This involves cross-checking the information with multiple sources and identifying the credibility of the source. The AV should investigate the source of the information and consider the creator’s expertise and agenda. The AV should look at what others have said about the source and compare it with other sources that are known to be reliable and trustworthy. AVs should also check the date and timeliness of the information and see if it is consistent with the current situation and context.
Find Better Coverage: The AV should actively look for alternative sources of information to corroborate or refute the received alert. This may involve accessing real-time traffic updates, consulting official traffic advisories, or engaging with other connected vehicles. AVs should look for better or other coverage of the same claim or topic and see if there is a consensus or a controversy among different sources. The AV should also look for sources that provide evidence, data, and analysis to support or refute the claim and avoid sources that rely on opinions, emotions, and anecdotes. AVs should also be aware of the quality and diversity of the sources and avoid sources that are biased, incomplete, or misleading.
Trace: AVs should analyze the content of the received alert, identifying any suspicious patterns, inconsistencies, or grammatical errors. This can help flag potential misinformation and inform further investigation. AVs should trace the information back to the original source and see the original context and purpose of the information. The AV should also verify the accuracy and validity of the information and see if it has been altered, manipulated, or fabricated. The AV should also consider the implications and consequences of the information and see if it is relevant, useful, and ethical for the AV’s goals and tasks.
A sample scenario for AVs is navigating through a busy city street when it encounters a situation that requires it to make a critical decision. The vehicle’s sensors detect a pedestrian crossing the street outside of a designated crosswalk. The vehicle’s software must quickly assess the situation and determine the appropriate course of action.
Stop: The autonomous vehicle’s system immediately stops the vehicle to avoid a potential collision with the pedestrian. This is a crucial first step in the SIFT process, as it ensures the safety of the situation before proceeding.
Investigate the source: The vehicle’s sensors and cameras begin to gather information about the situation. It checks the status of the pedestrian, the traffic around the area, and any other relevant data to understand the context of the event.
Find better coverage: The vehicle’s system searches for additional sources of information, such as nearby security cameras or crowd-sourced data, to get a more comprehensive understanding of the situation. This helps the vehicle make a more informed decision.
Trace claims, quotes, and media to the original context: The vehicle’s system cross-references the information it has gathered with any available data, such as traffic reports, social media posts, or news articles, to trace the claims and validate the information. This ensures that the vehicle’s decision is based on reliable and accurate data.
Based on the information gathered through the SIFT process, the AV’s software can then make a decision on how to proceed, such as yielding to the pedestrian, adjusting its speed, or even communicating with the pedestrian to coordinate a safe crossing.
This SIFT-based scenario shows how an AV can utilize a structured approach to gather and analyze information, ensuring that its decision-making process is informed, and reliable, and ultimately prioritizes the safety of all road users.
Figure 3 shows the conceptual framework of implementing the SIFT method, consisting of information inflow, SIFT method application, decision modulation, communication protocols, continuous monitoring and learning, and the hybrid human–AV collaboration. The inclusion of the hybrid element is necessary due to the inherent nature of AVs, which are typically designed to make decisions in simple and straightforward scenarios. Therefore, in complex scenarios requiring quick and precise decisions, human input becomes essential to supplement the AV’s decision-making process.
Information inflow: In the proposed conceptual framework, the information inflow component acknowledges the continuous stream of data received by the AV from various sensors, communication systems, and external sources, including the infotainment system. This stage marks the initiation of potential misinformation entry points into the AV system.
SIFT Method Application: As deceptive information is detected, the SIFT method becomes a crucial layer in the AV’s decision-making process. The stop, investigate the source, find better coverage, and trace claims steps are systematically applied. AVs are programmed to halt immediate reactions, initiate an investigation into the source of the information, cross-reference data with multiple reliable sources, and verify the claims against a comprehensive database of accurate road conditions.
Decision Modulation: Following the application of the SIFT method, the decision modulation phase involves adapting the AV’s response based on the verified information. This step ensures that the AV makes decisions aligned with accurate data, mitigating the risk of unwarranted slowdowns or stops caused by misinformation. This adaptive approach safeguards the overall traffic flow and prevents unnecessary disruptions.
Communication Protocols: To further fortify AV safety protocols, effective communication protocols are established. This involves the transmission of verified information not only to the AV itself but also to other vehicles in the vicinity. This proactive sharing of accurate data contributes to collective awareness, preventing the spread of misinformation-induced disruptions throughout the traffic ecosystem.
Continuous Monitoring and Learning: The framework incorporates continuous monitoring and learning mechanisms, allowing AVs to adapt to evolving challenges. The system continuously refines its response strategies based on real-time data, user feedback, and the efficacy of previous decisions. This iterative learning process enhances the resilience of AVs against emerging threats, such as deceptive information.
Human–AV Collaboration: Acknowledging the role of human drivers in mixed traffic scenarios, the human–AV collaboration element fosters communication between AVs and human-driven vehicles. This collaborative approach ensures that human drivers are aware of the AV’s verified information, promoting smooth interaction and preventing the worsening of traffic congestion caused by misinformation-induced reactions.
The AV can avoid being misled by misinformation or fake news and make informed and rational decisions that enhance its safety and performance by leveraging the SIFT method. This methodology equips the AV with robust mechanisms to scrutinize and validate incoming information, discerning reliable sources from potentially deceptive ones. By employing the SIFT method, the AV can effectively sift through a plethora of data points, ensuring that only accurate and pertinent information informs its decision-making process. Consequently, this empowers the AV to navigate complex road scenarios with heightened discernment, minimizing the risk of erroneous actions caused by misleading information.
Moreover, the application of the SIFT method extends beyond individual AVs, fostering a networked environment where vehicles can communicate and coordinate seamlessly. Through the SIFT framework, AVs can exchange verified information with one another, facilitating collaborative decision-making and enhancing overall road safety. Furthermore, the SIFT method enables AVs to interact with human drivers and other road users in a transparent and trustworthy manner. By providing reliable insights and maintaining open lines of communication, AVs can build trust and confidence among stakeholders, fostering acceptance and integration of AV technology into the broader transportation ecosystem.

5. Challenges

Challenges facing the rapid evolution of AVs has triggered a wave of anticipation and excitement, holding the promise of a safer, more efficient, and more accessible transportation system. However, this transformative technology is not without its challenges, particularly in ensuring the robustness and safety of AVs in complex and unpredictable real-world driving environments. Robust verification mechanisms are essential to address the challenges posed by complex road scenarios and the vulnerability of AVs to misinformation.
These mechanisms should encompass a comprehensive approach that includes rigorous testing, validation, and certification procedures. Extensive simulations and real-world testing are essential to evaluate the performance of AVs in a wide range of scenarios, including challenging and unpredictable environments. Additionally, robust cybersecurity measures are necessary to protect AV systems from cyberattacks and misinformation. By employing advanced encryption techniques and access control protocols, AV systems can be safeguarded against unauthorized access and manipulation of critical data. Moreover, educating the public about the limitations and potential risks of AV technology is essential to foster trust and responsible use.
The SIFT method, a valuable technique for verifying the reliability of information sources, introduces challenges within the context of AV safety. One notable challenge is real-time processing, as the method requires the AV to perform multiple steps, such as investigating the source and tracing claims, which may consume time and computational resources. In scenarios demanding quick decision-making, the AV must navigate the trade-off between speed and accuracy, prioritizing the most relevant and urgent information sources. Another challenge involves adapting to dynamic road conditions. The SIFT method requires considering the context and situation of information, but the unpredictable nature of road conditions, including traffic flow and weather, necessitates the AV’s ability to swiftly adapt and update its verification results.
Seamless integration with existing AV systems is a crucial consideration for implementing the SIFT method. Compatibility with perception, decision-making, and communication modules without compromising safety standards poses a significant challenge, requiring a careful balance to avoid disruptions to the AV’s core functions. Additionally, the method must contend with the challenge of processing a high volume of information generated by sensors and communication systems in AVs. Efficient algorithms and optimized processing capabilities are essential to manage this data load while maintaining computational efficiency.
Misinformation comes in diverse forms, including text, images, and multimedia content, posing a challenge for the primarily digitally-focused SIFT method. Adapting to these various misinformation sources and developing algorithms capable of identifying and verifying misinformation in different formats is essential, given the evolving tactics employed by malicious actors. Furthermore, the success of the SIFT method hinges on user understanding and acceptance. Convincing stakeholders within the AV industry and the general public of its effectiveness and fostering trust are crucial steps in ensuring successful implementation. Overcoming skepticism and building confidence in the method’s capabilities are integral to its adoption.
Lastly, ethical and legal considerations emerge with the implementation of the SIFT method. As this method involves the collection and analysis of vast amounts of data, privacy concerns become paramount. It is essential to ensure responsible information use, requiring a meticulous delineation of verification boundaries and strict adherence to data protection regulations. This includes obtaining informed consent from individuals whose data is being utilized and implementing robust security measures to safeguard sensitive information from unauthorized access or misuse. Striking a delicate balance between effectively preventing misinformation and upholding privacy rights is imperative for the ethical deployment of the SIFT method in the context of AV safety. This entails transparent communication with stakeholders about data collection and usage practices, as well as ongoing monitoring and assessment of ethical implications to ensure alignment with societal values and legal frameworks.

6. Potentials of SIFT

Refining the SIFT method for improved AV safety involves strategic considerations across advanced computing, information diversity, and adaptive verification strategies. Firstly, advancements in computing platforms and algorithms offer a pathway for enhancement. Utilizing potent technologies such as cloud computing, edge computing, and big data can significantly elevate the SIFT method’s speed and scalability. Techniques like parallel computing, distributed computing, and federated learning further contribute to reliability and security, while incorporating deep learning, reinforcement learning, or transfer learning holds the promise of optimizing accuracy and adaptability in real-time verification tasks.
Diversifying the information utilized by the SIFT method represents another crucial opportunity. By incorporating a range of data modalities such as image, video, audio, text, and speech, the method can capture a more comprehensive understanding of the information landscape. Additionally, integrating Global Positioning System (GPS), Geographic Information System (GIS), or satellite data contributes to more accurate location and navigation information. The inclusion of social media, online platforms, or crowd-sourced data taps into collective intelligence, providing richer and more reliable information for verification.
Lastly, refining the SIFT method involves embracing adaptive and dynamic verification strategies. Given the changing nature of road conditions, employing flexible techniques like fuzzy logic, probabilistic reasoning, or Bayesian inference becomes essential for handling uncertainty and ambiguity in real-world information. Strategies rooted in game theory, decision theory, or multi-criteria analysis enable the SIFT method to balance trade-offs and conflicts among different information sources and objectives. Incorporating feedback loops, learning mechanisms, or self-improvement processes ensures the SIFT method’s continuous adaptability, allowing it to evolve and respond effectively to evolving scenarios in AV safety.

7. Conclusions

Adopting the SIFT approach to AV safety standards is a significant development in addressing the intricate problems brought about by misinformation and complicated traffic situations. Even with limitations like processing in real time and responding to fast-changing conditions, there is room for development thanks to improved computers, a wider range of information, and adaptable verification techniques that offer encouraging solutions. The accuracy and efficiency of the process are increased by using cutting-edge technologies like big data and combining different kinds. Using adaptive techniques also enables the SIFT approach to effectively manage uncertainty. The automobile business is embracing ethical issues and ongoing learning processes. In this regard, the SIFT approach is not just a verification tool but also a dynamic and developing model that is essential to raising the safety of autonomous cars in a transportation environment that is always evolving.
Key Takeaway: The key takeaway from this work is the significance of incorporating the SIFT method into AV safety protocols. This method, originally developed to combat misinformation, is highlighted as a valuable tool for enhancing AV safety by ensuring the accuracy and reliability of information influencing autonomous decision-making processes. By integrating the SIFT method, AVs can address challenges posed by misinformation and dynamic road conditions, ultimately improving safety for pedestrians and passengers.
Limitation: The limitation of the study is the complexity of real-time processing and adapting to rapidly changing scenarios. While the SIFT method offers a promising solution to enhance AV safety, challenges related to processing information in real time and adapting to dynamic road conditions may pose obstacles to its effective implementation. Addressing these limitations will be crucial for ensuring the practicality and efficiency of the SIFT method in enhancing AV safety.
Future Works: Future research in this area could focus on refining the SIFT method through advanced computing technologies such as Big Data and embracing diverse data modalities. By leveraging these technologies, researchers can enhance the efficiency and accuracy of the SIFT method in verifying information for AV decision-making processes. Additionally, exploring adaptive strategies rooted in fuzzy logic and game theory could further improve the SIFT method’s ability to navigate uncertainties effectively. Continued efforts in integrating continuous learning mechanisms and ethical considerations into AV safety protocols will also be essential for evolving the SIFT method as a dynamic framework integral to enhancing AV safety in an ever-evolving transportation landscape.

Author Contributions

Conceptualization, M.A., M.N.A., M.M., N.L.F. and M.S.; data curation, M.N.A. and M.M.; formal analysis, M.N.A.; investigation, M.A., N.L.F. and M.S.; methodology, M.A. and M.S.; supervision, M.N.A. and M.M.; validation, M.A., N.L.F. and M.S.; visualization, M.A. and N.L.F.; writing—original draft, M.A., M.N.A. and M.M.; writing—review and editing, N.L.F. and M.S. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The original contributions presented in the study are included in the article, further inquiries can be directed to the corresponding authors.

Conflicts of Interest

The authors declare no conflicts of interest.

Appendix A

Table A1. List of abbreviations and acronyms used in the study.
Table A1. List of abbreviations and acronyms used in the study.
Abbreviation/AcronymDescription
AVautonomous vehicle
SIFTstop, investigate, find, trace
V2Vvehicle-to-vehicle
V2Ivehicle-to-infrastructure
V2PVehicle-to-pedestrian
V2Xvehicle-to-everything
GPSGlobal Positioning System
GISGeographic Information System

References

  1. Bagloee, S.A.; Tavana, M.; Asadi, M.; Oliver, T. Autonomous Vehicles: Challenges, Opportunities, and Future Implications for Transportation Policies. J. Mod. Transp. 2016, 24, 284–303. [Google Scholar] [CrossRef]
  2. Predhumeau, M.; Spalanzani, A.; Dugdale, J. Pedestrian Behavior in Shared Spaces With Autonomous Vehicles: An Integrated Framework and Review. IEEE Trans. Intell. Veh. 2023, 8, 438–457. [Google Scholar] [CrossRef]
  3. Reyes-Muñoz, A.; Guerrero-Ibáñez, J. Vulnerable Road Users and Connected Autonomous Vehicles Interaction: A Survey. Sensors 2022, 22, 4614. [Google Scholar] [CrossRef] [PubMed]
  4. Namazi, E.; Li, J.; Lu, C. Intelligent Intersection Management Systems Considering Autonomous Vehicles: A Systematic Literature Review. IEEE Access 2019, 7, 91946–91965. [Google Scholar] [CrossRef]
  5. Nikitas, A.; Parkinson, S.; Vallati, M. The Deceitful Connected and Autonomous Vehicle: Defining the Concept, Contextualising Its Dimensions and Proposing Mitigation Policies. Transp. Policy 2022, 122, 1–10. [Google Scholar] [CrossRef]
  6. Bouchelaghem, S.; Bouabdallah, A.; Omar, M. Autonomous Vehicle Security: Literature Review of Real Attack Experiments. In Risks and Security of Internet and Systems; Garcia-Alfaro, J., Leneutre, J., Cuppens, N., Yaich, R., Eds.; Lecture Notes in Computer Science; Springer International Publishing: Cham, Switzerland, 2021; Volume 12528, pp. 255–272. ISBN 978-3-030-68886-8. [Google Scholar]
  7. Pyrialakou, V.D.; Gkartzonikas, C.; Gatlin, J.D.; Gkritza, K. Perceptions of Safety on a Shared Road: Driving, Cycling, or Walking near an Autonomous Vehicle. J. Saf. Res. 2020, 72, 249–258. [Google Scholar] [CrossRef] [PubMed]
  8. Pammer, K.; Gauld, C.; McKerral, A.; Reeves, C. “They Have to Be Better than Human Drivers!” Motorcyclists’ and Cyclists’ Perceptions of Autonomous Vehicles. Transp. Res. Part F Traffic Psychol. Behav. 2021, 78, 246–258. [Google Scholar] [CrossRef]
  9. Faisal, A.; Yigitcanlar, T.; Kamruzzaman, M.; Currie, G. Understanding Autonomous Vehicles: A Systematic Literature Review on Capability, Impact, Planning and Policy. J. Transp. Land Use 2019, 12, 45–72. [Google Scholar] [CrossRef]
  10. Adnan, N.; Md Nordin, S.; Bin Bahruddin, M.A.; Ali, M. How Trust Can Drive Forward the User Acceptance to the Technology? In-Vehicle Technology for Autonomous Vehicle. Transp. Res. Part A Policy Pract. 2018, 118, 819–836. [Google Scholar] [CrossRef]
  11. Bojarski, M.; Chen, C.; Daw, J.; Değirmenci, A.; Deri, J.; Firner, B.; Flepp, B.; Gogri, S.; Hong, J.; Jackel, L.; et al. The NVIDIA PilotNet Experiments 2020. arXiv 2020, arXiv:2010.08776. [Google Scholar]
  12. Becker, P.H.E.; Arnau, J.M.; Gonzalez, A. Demystifying Power and Performance Bottlenecks in Autonomous Driving Systems. In Proceedings of the 2020 IEEE International Symposium on Workload Characterization (IISWC), Virtual, 27–29 October 2020; IEEE: Beijing, China, 2020; pp. 205–215. [Google Scholar]
  13. Schwall, M.; Daniel, T.; Victor, T.; Favaro, F.; Hohnhold, H. Waymo Public Road Safety Performance Data. arXiv 2020, arXiv:2011.00038. [Google Scholar]
  14. Wang, Y.; Farah, H.; Yu, R.; Qiu, S.; Van Arem, B. Characterizing Behavioral Differences of Autonomous Vehicles and Human-Driven Vehicles at Signalized Intersections Based on Waymo Open Dataset. Transp. Res. Rec. J. Transp. Res. Board 2023, 2677, 324–337. [Google Scholar] [CrossRef]
  15. Andrews, S. Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) Communications and Cooperative Driving. In Handbook of Intelligent Vehicles; Eskandarian, A., Ed.; Springer: London, UK, 2012; pp. 1121–1144. ISBN 978-0-85729-084-7. [Google Scholar]
  16. Dey, K.C.; Rayamajhi, A.; Chowdhury, M.; Bhavsar, P.; Martin, J. Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) Communication in a Heterogeneous Wireless Network—Performance Evaluation. Transp. Res. Part C Emerg. Technol. 2016, 68, 168–184. [Google Scholar] [CrossRef]
  17. Chen, S.; Hu, J.; Shi, Y.; Peng, Y.; Fang, J.; Zhao, R.; Zhao, L. Vehicle-to-Everything (V2x) Services Supported by LTE-Based Systems and 5G. IEEE Commun. Stand. Mag. 2017, 1, 70–76. [Google Scholar] [CrossRef]
  18. Sun, S.; Hu, J.; Peng, Y.; Pan, X.; Zhao, L.; Fang, J. Support for Vehicle-to-Everything Services Based on LTE. IEEE Wirel. Commun. 2016, 23, 4–8. [Google Scholar] [CrossRef]
  19. Caldwell, M.; Andrews, J.T.A.; Tanay, T.; Griffin, L.D. AI-Enabled Future Crime. Crime Sci. 2020, 9, 14. [Google Scholar] [CrossRef]
  20. Yadav, N.; Ansar, S.A.; Chaurasia, P.K. Review of Attacks on Connected and Autonomous Vehicles (CAV) and Their Existing Solutions. In Proceedings of the 2022 10th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), Noida, India, 13–14 October 2022; pp. 1–6. [Google Scholar]
Figure 1. AV Communication.
Figure 1. AV Communication.
Information 15 00357 g001
Figure 2. SIFT method in processing information.
Figure 2. SIFT method in processing information.
Information 15 00357 g002
Figure 3. SIFT conceptual framework and protocol.
Figure 3. SIFT conceptual framework and protocol.
Information 15 00357 g003
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Anshari, M.; Almunawar, M.N.; Masri, M.; Fitriyani, N.L.; Syafrudin, M. Autonomous Vehicle Safety through the SIFT Method: A Conceptual Analysis. Information 2024, 15, 357. https://doi.org/10.3390/info15060357

AMA Style

Anshari M, Almunawar MN, Masri M, Fitriyani NL, Syafrudin M. Autonomous Vehicle Safety through the SIFT Method: A Conceptual Analysis. Information. 2024; 15(6):357. https://doi.org/10.3390/info15060357

Chicago/Turabian Style

Anshari, Muhammad, Mohammad Nabil Almunawar, Masairol Masri, Norma Latif Fitriyani, and Muhammad Syafrudin. 2024. "Autonomous Vehicle Safety through the SIFT Method: A Conceptual Analysis" Information 15, no. 6: 357. https://doi.org/10.3390/info15060357

APA Style

Anshari, M., Almunawar, M. N., Masri, M., Fitriyani, N. L., & Syafrudin, M. (2024). Autonomous Vehicle Safety through the SIFT Method: A Conceptual Analysis. Information, 15(6), 357. https://doi.org/10.3390/info15060357

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop