Advanced Driver Assistance Systems and Autonomous Driving

  • Dietmar P. F. Möller
  • Roland E. Haas
Part of the Computer Communications and Networks book series (CCN)


This chapter discusses advanced driver assistance systems (ADAS) and autonomous driving. ADAS are systems to help the driver in his driving process. When designed with a safe human-machine interface (HMI), they could increase vehicle safety and more in general road safety. Autonomous driving is based on increasing vehicle automation that leads to autonomous or self-driving or semiautonomous vehicles. Self-driving vehicles are one of the major drivers of change in the automotive industry. This has been discussed in Chap.  2, showing how major OEMs reacted to this development, for example, the CASE organization in Daimler, the introduction of CDO positions in BMW and VW, and others. In Sect. 11.1 ADAS are introduced beyond the automotive E/E perspective, which has been described in Chap.  4, focusing on the popular driver assistance functionality parking with the ParkPilot ADAS beside other essential ADAS functionalities. It also refers to sensor applications for different ADAS functions. Section 11.2 gives a quick recap of the main ADAS functions like lane keeping assistant, lane departure warning, and others in more detail. It also refers to the situation of objects moving across, either in front or behind, the vehicle and the most advanced methods for pedestrian and object detection.

References and Further Readings

  1. (Abraham et al. 2016) Abraham, B., Brugger, D., Strehlke, S., Runge, W.: Autonomous Driving – Only a Trojan horse of Digital Companies?, ATZ elektronik, 01/2016Google Scholar
  2. (Alheeti et al. 2015a) Alheeti, K. M. A., Gruebler, A., McDonald-Maier, K. D.: An intrusion detection system against malicious attacks on the communication network of driverless cars. In: 12th Annual IEEE Consumer Communications and Networking Conference (CCNC), Pages 916–921, 2015Google Scholar
  3. (Alheeti et al. 2015b) Alheeti, K. M. A., Gruebler, A., McDonald-Maier, K. D.: An Intrusion Detection System against Black Hole Attacks on the Communication Network of Self-Driving Cars. In: 6th International Conference on Emerging Security Technologies (EST), Pages 86–91, 2015Google Scholar
  4. (Arndt 2015) Arndt, C.: Developments of Automotive Ethernet Technologies - Introduction to the BroadR-Reach Technology and beyond, Continental & VDI Wissensforum, 06/2015Google Scholar
  5. (Astroem and Wittenmark 1996) Astroem, K., Wittenmark, B.: Computer Controlled Systems. Prentice Hall, Information and Systems Series, 1996Google Scholar
  6. (Balani 2015) Balani, N.: Enterprise IoT – A Definite Handbook, self-published, Kindle Edition, 2015Google Scholar
  7. (Balzert 2011) Balzert, H.: Textbook of Software Engineering: Design, Implementation, Deployment and Operation (in German), Springer Spektrum Publ., 2011Google Scholar
  8. (Beck 2016) Beck, T.: Do we need Autonomous Driving? (in German), 01/2016, pp. 48–49. 01/2016Google Scholar
  9. (Becker 2016) Becker, J. Autopilot of Tesla – in a Tesla the risk is a standard feature (in German). Süddeutsche Online. November 17th 2016. Available from:
  10. (Bekey 2005) Bekey, G. A.: Autonomous Robots, Massachusetts Institute of Technology, 2005Google Scholar
  11. (Besenbruch 2014) Besenbruch, D.: Electronic Systems – Protection of manipulation, ATZ elektronik, 2014Google Scholar
  12. (Beynon et al. 2003) Beynon, M., Hook, D., Seibert, M., Peacock, A., Dudgeon, D.: Detecting Abandoned Packages in a Multi-camera Video Surveillance System. IEEE International Conference on Advanced Video and Signal-Based Surveillance, 2003Google Scholar
  13. (Bhattarcharjee 2013) Bhattarcharjee, S.: Efficient Algorithm for Crossing Alert in Camera-based Advanced Driver Assistance Systems, Master of Technology Thesis, International Institute of Information Technology Bengaluru (IIIT-B), 2013Google Scholar
  14. (Bose 2004) Bose, T.: Digital Signal and Image Processing, John Wiley and Sons, 2004Google Scholar
  15. (Bridges 2015) Bridges, R.: Driverless Car Revolution Buy Mobility – Not Metal. Self-published, 2015Google Scholar
  16. (Brisbourne 2014) Brisbourne, A.: Tesla’s Over-the-Air Fix: Best Example Yet of the Internet of Things? Wired online. February 2014. Available from:
  17. (Chucholowski and Lienkamp 2014) Chucholowski, F., Lienkamp, M.: Teleoperated Driving – Secure and Robust Data Connections, ATZ elektronik, 01/2014Google Scholar
  18. (Corke 2011) Corke, P.: Robotics, Vision, and Control, Springer Publ., 2011Google Scholar
  19. (Currie 2015) Currie, R.: Developments in Car Hacking., 2015
  20. (Davies 2012) Davies, E. R.: Computer and Machine Vision: Theory, Algorithms, and Practicalities, Elsevier Publ., 2012Google Scholar
  21. (Dorf and Bishop 2010) Dorf, R.C., Bishop, R.H.: Modern Control Systems, Pearson Education, 2010Google Scholar
  22. (Dudenhöffer 2016) Dudenhöffer, F.: Who will be put in the fast lane (in German). Campus Publ., 2016Google Scholar
  23. (Eckert 2016) Eckert, D.: Robots will destroy millions of jobs. Welt online. 27th August 2016. Available from:⁄4print#,08.2016Google Scholar
  24. (Eckl-Dorna 2016) Eckl-Dorna, W.: Savior instead of aggressor: Fiat Chrysler courts Google (in German). Manager Magazin online, April 29th 2016. Available from:
  25. (Elgammal et al. 2000) Elgammal A., Harwood D., Davis L.: Non-parametric Model for Background Subtraction. In: Proceedings of the 6th European Conf. on CompVision-Part II, Pages 751–767, 2000Google Scholar
  26. (Elgammal et al. 2003) Elgammal A, Duraiswami R, Davis, L.S.: Efficient Kernel Density Estimation Using the Fast Gauss Transform with Applications to Color Modeling and Tracking, In: IEEE Transactions on Pattern Analysis and Machine Intelligence; Vol. 25 No. 11, 1499–1504, 2003Google Scholar
  27. (Ernst 2016) Ernst, R.: Automotive Ethernet – Opportunities and Pitfalls, Institut für Datentechnik und Kommunikationsnetze, ETFA 09/2016, Berlin, 2016Google Scholar
  28. (Fallstrand and Lindstrom 2015) Fallstrand, D., Lindstrom, V.: Automotive IDPS: Applicability analysis of intrusion detection and prevention in automotive systems. Master’ Thesis. Chalmers University of Technology. Available from:
  29. (Form 2015) Form, T.: Autonomous Driving – Quo vadis?, ATZ elektronik, special edition, 07/2015Google Scholar
  30. (Forster 2014) Forster, F.: Development Embedded Systems, ATZ elektronik, Vol 9, 01/2014, Pages14–18, Springer Vieweg, Springer 2014Google Scholar
  31. (Freitag 2016) Freitag, M.: Robotic cars – German manufacturers in pole position (in German). Manager Magazin online. July 26th 2016. Available from:
  32. (Fürst 2016) Fürst, S.: AUTOSAR Adaptive Platform for Connected and Autonomous Vehicles, In: EUROFORUM Elektronik-Systeme im Automobil, 02/2016Google Scholar
  33. (Gaonkar et al. 2011) Gaonkar, P., Nanthini, S., Manoj, S., Mamilla, S.: Lane Departure Warning System, Class Paper, Car IT and Cybersecurity class, IIIT-B, 2011Google Scholar
  34. (Giachetti et al. 1994) Giachetti, A., Campani, M., Torre, V.: The use of optical flow for the autonomous navigation, In: Proc. 4th Euro. Conf. Comput. Vision, 1994Google Scholar
  35. (Grünweg 2016b) Grünweg, T.: Ford strategy – Autonomy for All (in German). Spiegel online. October 11th 2016. Available from:
  36. (Gonzalez et al. 2008) Gonzalez R. C., Woods, R. E., Eddins, S. L.: Digital Image Processing Using MATLAB, Pearson Education, New Delhi, India, 2008Google Scholar
  37. (Gonzalez and Woods 2008) Gonzalez, R. C., Woods, R. E.: Digital Image Processing, 3rd Edition. Pearson/Prentice Hall Publ., 2008Google Scholar
  38. (Haas 2014) Haas, R.: Socio-Economic Impact of Autonomous Driving in Emerging Countries, India as example, European Radar Conference, EuRad, Rome, 2014Google Scholar
  39. (Haas and Möller 2017) Haas, R. E., Möller, D. P. F.: Automotive Connectivity, Cyber Attack Scenarios and Automotive Cyber Security. Proceed. IEEE/EIT 2017, pp. 635-639, ISBN: 978-1-5090-4767-3/17Google Scholar
  40. (Hanselman and Littlefeld 2008) Hanselman, D., Littlefield, B.: Mastering MATLAB 7, Pearson Education, India, 2008Google Scholar
  41. (Haykin 2009) Simon Haykin, Neural Network and Learning Machines, 3rd Ed., Pearson Education, Upper Saddle River, NJ, 2009Google Scholar
  42. (Herold et al. 2016) Herold, N., Posselt, S.-A., Hanka, O., Carle, G.: Anomaly Detection for SOME/IP using Complex Event Processing, Chair of Network Architectures and Services, Technical University Munich (TUM), Department of Computer Science, 2016Google Scholar
  43. (Hoffmann 2008) Hoffmann, D.: Software-Quality, Springer Publ., 2008Google Scholar
  44. (Horn and Schunk 1981) Horn K.P., Schunck, B.G.: Determining Optical Flow, Artificial Intelligence Laboratory, Massachusetts Institute of Technology, Cambridge, MA 02139, U.S.A, Pages 185-203, 1981Google Scholar
  45. (Hertzberg et al. 2012) Hertzberg, J., Lingemann K., Nüchter, A.: Mobile Robotics – An introduction from a computer science perspective (in German), Springer Vieweg Publisher, Berlin Heideberg, 2012Google Scholar
  46. (Hudelmaier and Schmidt 2013) Hudelmaier, P., Schmidt, K.: Chip Solutions For Driver Assistance Systems, ATZ elektronik 03/2013, Pages 48–52Google Scholar
  47. (Hunt et al. 1996) Hunt, K. J., Haas, R., Kalkkuhl, J.: Local Controller Network for autonomous vehicle steering, Control Engineering Practice, 1996Google Scholar
  48. (Jain 2000), Jain, A. K.: Fundamentals of Digital Image Processing, Prentice Hall Publ., 2000Google Scholar
  49. (Javed et al. 2002) Javed, O., Shah, M.: Tracking and object classification for automated surveillance, In: Proc. of ECCV, Pages 343–357, 2002Google Scholar
  50. (Johri 2016) Johri, S.: Attack Surfaces in Connected Cars, Class paper, Car IT and Cybersecurity class, IIIT-B, 2016Google Scholar
  51. (Johanning and Mildner 2015) Johanning, V., Mildner, R.: Car IT Compact, Springer Publ., 2015Google Scholar
  52. (Joshi 2009) Joshi, M. A.: Digital Image Processing - An Algorithmic Approach, PHI Learning, New Delhi, 2009Google Scholar
  53. (Jung and Kalmar 2015) Jung, C., Kalmar, R.: Re-interpret Data Security – the Data Gold and Business Models, ATZ elektronik, 04/2015Google Scholar
  54. (Kaplan 2016) Kaplan, J.: Artificial Intelligence, Oxford University Press, 2016Google Scholar
  55. (Karmann et al.1990) Karmann K.-P., Brandt A.: Moving object Recognition using and adaptive background memory. In: Time-Varying Image Processing and Moving Object Recognition, Pages 289–307. V. Cappellini, Ed: Elsevier Science Publishers, 1990Google Scholar
  56. (Kern 2012) Kern, A.: Ethernet and IP for Automotive E/E-Architectures – Technology Analysis, Migration Concepts and Infrastructure. Ph.D. Thesis, University of Erlangen-Nürnberg, Available from:, Erlangen, 2012
  57. (Kiencke and Nielsen 2005) Kiencke, U., Nielsen, L.: Automotive Control Systems: For Engine, Driveline, and Vehicle. Springer Publ., 2005Google Scholar
  58. (Klauda et al. 2015) Klauda, M., Schaffert, M., Logospiris, A., Piel, G., Kappel, S., Ihle, M., Setting the Course for 2020 – change of paradigms in E/E architecture. ATZ elektronik, Pages 17–22, Springer Vieweg Publ., 02/2015Google Scholar
  59. (Köncke and Buehler 2015) Köncke, F. C., Buehler, B. O.: Cyber Attacks – Underestimated Risk for the German Industry (in German). Wirtschaftswoche online. November 9th 2015. Available from:
  60. (Lang 2015) Lang, M.: High Degree of Integration of ADAS Functions into One Central Platform Controller, ATZ elektronik, Vol 10, 04/2015, Pages 40–43, Springer Vieweg Publ., 2015Google Scholar
  61. (Lamparth and Bähren 2014) Lamparth, O., Bähren, F.: From The Connected To The Autonomous Car. ATZ elektronik, Vol 9, 05/2014, Pages 36–39, Springer Vieweg Publ., 2014Google Scholar
  62. (Lu and Zhang 2007) Lu, S., Zhang, J.: Detecting unattended packages through human activity recognition and object association, PR Vol. 40, No. 8, Pages 2173–2184, 08/2007Google Scholar
  63. (Mahaffey 2015a) Mahaffey, K.: The New Assembly Line: 3 Best Practices for Building (secure) Connected Cars. Lookout Blog. August 6th 2015. Available from:
  64. (Mahaffey 2015b) Mahaffey, K.: Here Is How To Address Car Hacking Threats. TechCrunch. September 13th 2015. Available from:
  65. (Markey 2015) Markey, E.J.: Tracking and Hacking: Security and Privacy Gaps Put American Drivers at Risk. 2015. Available from:
  66. (Markoff 2016) Markoff, J.: Artificial Intelligence Swarms Silicon Valley on Wings and Wheels, The New York Times online. July 17th 2016. Available from:
  67. (Matheus and Königseder 2015), Matheus, K., Königseder, T.: Automotive Ethernet, Cambridge University Press, 2015Google Scholar
  68. (Maurer et al. 2015) Maurer, M., Gerdes, C. J., Lenz, B., Winner, H. (Ed): Autonomous driving, technical, legal and social aspects, Springer Vieweg Publ., 2015Google Scholar
  69. (Menn 2016) Menn, A.: Nvidia founder Huang: Artificial Intelligence triggers next Industrial Revolution (in German). Wirtschaftswoche online. 9.12.2016. Available from:
  70. (Miller and Valasek 2014) Miller C., Valasek C.: A Survey of Remote Automotive Attack Surfaces. IOActive 2014. Available from:
  71. (Miller and Valasek 2015) Miller, C., Valasek, C.: Remote exploitation of an unaltered passenger vehicle. August 10th 2015. Available from:
  72. (Müller and Haas 2014) Müller, M. and Haas, R.: Study on Automotive Electronics, Magility GmbH, 2014Google Scholar
  73. (Nause and Höwing 2016) Nause, M., Höwing, F.: Functional Security as a Model for Software Development in Automotive Security, ATZ elektronik, 03/2014Google Scholar
  74. (Navet and Simonot-Lion 2009) Navet, N., Simonot-Lion, F.: Automotive Embedded Systems Handbook. CRC Press, 2009Google Scholar
  75. (Ogata 2004) Ogata, K.: Discrete-Time Control Systems, Pearson Education, 2004Google Scholar
  76. (Orth et al. 2014) Orth, P., Jentges, M., Sternberg, P., Richenhagen, J.: Software Architecture and Development Tool Chain for the Drive Train, ATZ elektronik, 01/2014Google Scholar
  77. (Paar 2015) Paar, C.: The future lies in a better encryption, Interview with C. Paar, ATZ elektronik, Vol. 3, Pages 22–24, Springer Vieweg Publ., 2015Google Scholar
  78. (Pickhard et al. 2015) Pickhard, F., Emele, M., Burton, S., Wollinger, T.: New thinking for safely networked vehicles (in German). ATZ elektronik, 7/2015Google Scholar
  79. (Pickhard 2016) Pickhard, F.: Measuring everything – Big Data in Automotive Engineering (in German). ATZ elektronik, 02/2016, Volume 11, Issue 1, pp 66–66Google Scholar
  80. (Postinett 2017) AWS server down – employee shut down internet with a typo. Handelsblatt online. 2nd March 2017. Available from:
  81. (Pratap 2006) Pratap, R.: Getting Started With Matlab. 7- A Quick Introduction for Scientists and Engineers. Oxford University Press, 2006Google Scholar
  82. (Proakis and Manolakis 2007) Proakis, J. G., Manolakis, D. G.: Digital Signal Processing, Prentice-Hall, Inc., 2007Google Scholar
  83. (Reif 2014) Reif, K. (Ed.): Driving stabilization systems and driver assistance systems. Springer-Vieweg Publ., 2016Google Scholar
  84. (Rembor et al. 2009) Rembor F., Kopp, T., Herzog, S., Gugenhen, S.: Flexray – a Beginners’ Guideline, ATZ elektronik, Vol 4, 03/2009, Pages 16–21, Springer Vieweg Publ., 2009Google Scholar
  85. (Reuss et al. 2015) Reuss, H.-C., Meyer, G., Meurer, M.: Roadmap 2030 Synergies of Electromobility and Automated Driving, ATZ elektronik, 2015Google Scholar
  86. (Reuter 2015) Reuter, A.: Data security is a must for functional security (in German), ATZ elektronik, 02/2015Google Scholar
  87. (Rich and Knight 1991) Rich, E., Knight, K.: Artificial Intelligence. Mc GrawHill Publ. 1991Google Scholar
  88. (Ridder et al. 1995) Ridder, C., Munkelt, O., Kirchner, H.: Adaptive Background Estimation and Foreground Detection using Kalman-Filtering. In: Process of Int. Conf. on recent Advances in Mechatronics. ICRAM’95, UNESCO Chair on Mechatronics, Pages 193–199, 1995Google Scholar
  89. (Russell and Norvig 2016) Russel, S., Norvig, P.: Artificial Intelligence: A Modern Approach. Pearson Education, 3rd edition, 2016Google Scholar
  90. (Schaal 2012) Schaal H.-W.: IP and Ethernet in Motor Vehicles. Vector Informatik GmBH, Available from:, Pages 1–6, 04/2012
  91. (Schaal and Schwedt 2013) Schaal, H-W, Schwedt, M.: New Perspectives on Remaining Bus Simulation for Networks with SOME/IP.
  92. (Schaal 2017) Schaal, S.: Auto Trends at the CES – Only four Car Manufacturers are capable of developing everything on their own. Wirtschaftswoche online. January 4th 2017. Available from:
  93. (Schäfer 2010) Schäfer, W.: Software Development - Introduction for the Most Demanding (in German). Addison-Wesley Publ., 2010Google Scholar
  94. (Schill and Springer 2012) Schill, A., Springer, T.: Distributed Systems – Fundamentals and core technologies. Springer Publ., 2012Google Scholar
  95. (Seeck 2015) Seeck, A. Don’t expect too much (in German), Discussion at the 1st International ATZ Conference in Frankfurt - From Driver Assistance systems to Autonomous Driving, ATZ elektronik 3/2015Google Scholar
  96. (Serio and Wollschläger 2015) Serio, G., Wollschläger, D.: Networked Automotive Defense Strategies in the Fight against Cyberattacks (in German). ATZ elektronik, 06/2015Google Scholar
  97. (Siciliano et al. 2010) Sciliano, B., Sciavicco, L., Villan, L., Oriolo, G.: Robotics – Modelling, Planning and Control, Springer Publ., 2010Google Scholar
  98. (Siebenpfeiffer 2014) Siebenpfeiffer, W. (Ed.): Networked Automobile – Safety, Car IT, Concepts (in German). Springer Publ., 2014Google Scholar
  99. (Silberschatz et al. 2010) Silberschatz, A., Galvin, P., Gagne, G.: Applied Operating System Concepts, Wiley Publ., 2010Google Scholar
  100. (Singer and Friedman 2014) Singer P.W., Friedman, A.: Cybersecurity and Cyberwar: What Everyone Needs to Know, Oxford University Press, 2014Google Scholar
  101. (Soja 2015) Soja, R.: Security and the Connected Car: Secure Networks for V2X, NXP Community Online. Available from:, 2015
  102. (Solon 2015) Solon, O.: From Car-Jacking to Car-Hacking: How Vehicles Became Targets For Cybercriminals. Bloomberg online. August 4th 2015. Available from:
  103. (Sorge 2017) Sorge, N.-V.: Top Engineer from Apple should put Tesla’s AutoPilot on track. Manager Magazin online. 11th January 2017. Available from:
  104. (Steinmüller 2008) Steinmüller, J: Image analysis – From image processing to spatial interpretation of images, Springer Publ., 2008Google Scholar
  105. (Streichert and Traub 2012) Streichert, T., Traub, M.: Electric/Electronics Architectures in Automobiles (in German). Springer, Publ., 2012 Google Scholar
  106. (Sushravya 2016) Sushravya, G.M.: Cybersecurity risks in Advanced Driver Assistance Systems, Class paper, Car IT and Cybersecurity class, IIIT-B, 2016Google Scholar
  107. (Thiele et al. 2013) Thiele, D., Ernst, R., Diemer, J., Richter, K.: Cooperating On Real-Time Capable Ethernet Architecture. In: Vehicles, ATZ elektronik 05/2013, Pages 40–44, Springer Publ., 2013Google Scholar
  108. (Tanenbaum and Bos 2015) Tanenbaum, A. S., Bos, H.: Modern Operating Systems. 4th edition, Pearson Publ., 2015Google Scholar
  109. (Tanenbaum and Van Steen 2017) Tanenbaum, A. S., Van Steen, M.: Distributed Systems Principles and Paradigms. 3rd edition, Pearson Publ., 2017Google Scholar
  110. (Vahid and Givargis 2001) Vahid, F., Givargis, T.: Embedded System Design, A Unified Hardware/Software Introduction, Wiley and Sons Publ., 2003Google Scholar
  111. (Vembo 2016) Vembo, D.: Connected Cars – Architecture, Challenges and Way Forward. Whitepaper Sasken Communication Technologies Pvt. Ltd. 2016. Available from:
  112. (Vivekanandan et al. 2013) Vivekanandan, B., Bavishi, H., Paranjpe, K.: Preventing malfunctions. In: E/E systems, ATZ extra, Pages 72–74, 10/2013Google Scholar
  113. (Weber 2013) Weber, M.: AUTOSAR learns Ethernet. Vector Informatik GmBH. Available from:
  114. (Weber 2015) Weber, M.: New Communication Paradigms in Automotive Networking. Vector Informatik GmBH. Available from:
  115. (Weiß et al. 2016) Weiß, G., Schleiß, P., Drabek, C.: Fail-operational E/E Architecture for Highly-automated Driving Functions. ATZ elektronik, Vol 11, 03/2016, Pages 16–21, Springer Vieweg Publ., 2016Google Scholar
  116. (Weimerskirch 2016) Weimerskirch, A.: Cybersecurity for Networked and Automated Vehicles (in German). ATZ elektronik, 03/2016Google Scholar
  117. (Winner et al. 2009) Winner, H., Hakuli, S., Lotz, F., Singer, C. (Eds.): Handbook Driver Assistance Systems (in German). Springer Vieweg Publ., 2015Google Scholar
  118. (Wolfsthal and Serio 2015) Wolfsthal, Y., Serio, G.: Made in IBM Labs: Solution for Detecting Cyber Intrusion to Connected Vehicles, Part I. Available from:
  119. (Wolf et al. 2015) Wolf, J., Metzker, E., Happel, A.: Ethernet-Security – example SOME/IP. Vector Informatik GmBH (in German). Available from:, 2015
  120. (Zetter 2015) Zetter, K.: Researchers Hacked A Model S, But Tesla’s Already Released A Patch. Wired online. August 6th 2015. Available from:



    1. (URL1 2014) Me, my car, my life, KPMG Automotive, 2014,



  1. (URL2 2017)
  2. (URL3 2017)
  3. (URL12 2017)
  4. (URL19 2017)

Copyright information

© Springer International Publishing AG, part of Springer Nature 2019

Authors and Affiliations

  • Dietmar P. F. Möller
    • 1
  • Roland E. Haas
    • 2
  1. 1.Clausthal University of TechnologyClausthal-ZellerfeldGermany
  2. 2.QSO TechnologiesBangaloreIndia

Personalised recommendations