Autonomous vehicles: Improving cyber security
List of Authors
  • Kaiss Omar AbouAbdalla , S. B. Goyal

Keyword
  • autonomous vehicles, security, cyber attackers

Abstract
  • The purpose of this paper is to address the knowledge and implementation gap in Cyber Security within the field of autonomous vehicles. As technology progresses, the utilization of autonomous vehicles will become more mainstream. With such potential for a broader use of such technology, it is crucial that security is ensured. Previous research has indicated that there are levels to vehicle autonomy which range from zero to five. Zero indicates a vehicle with no automation, while five indicates a fully automated vehicle. The potential areas which can be targeted by cyber attackers include the network which the vehicles operate within, the sensors which the vehicle uses to detect where it is going and what actions are needed to provide a safe journey, and the vehicle GPS system. The research aims to find out where the greatest weakness is within autonomous vehicles, and what software and hardware is targeted by cyber attackers, as to provide comprehensive and long lasting solutions within the field of autonomous vehicle security. As for unit of analysis, a focus will be placed on both consumers and organizations, with greater emphasis on the organizations which produce autonomous vehicles. A qualitative approach will be utilized as to streamline the process of understanding the problem through previously done research. At the current time this research aims to provide hypothetical solutions due to lack of field testing potential at this moment, however it is hoped that research and development of greater security protocols will continue to be done to evolve and provide greater security in autonomous vehicles.

Reference
  • 1. Parkinson, S., Ward, P., Wilson, K., & Miller, J. (2017). Cyber Threats Facing Autonomous and Connected Vehicles: Future Challenges. IEEE Transactions on Intelligent Transportation Systems, 18(11). https://doi.org/10.1109/tits.2017.2665968

    2. Ahmed, S. S., Pantangi, S. S., Eker, U., Fountas, G., Still, S. E., & Anastasopoulos, P. C. (2020). Analysis of safety benefits and security concerns from the use of autonomous vehicles: A grouped random parameters bivariate probit approach with heterogeneity in means. Analytic Methods in Accident Research, 28. https://doi.org/10.1016/j.amar.2020.100134

    3. De La Torre, G., Rad, P., & Choo, K. K. R. (2020). Driverless vehicle security: Challenges and future research opportunities. Future Generation Computer Systems, 108. https://doi.org/10.1016/j.future.2017.12.041

    4. He, Q., Meng, X., Qu, R., & Xi, R. (2020). Machine Learning-Based Detection for Cyber Security Attacks on Connected and Autonomous Vehicles. Mathematics, 8(8). https://doi.org/10.3390/math8081311

    5. Khan, F., Kumar, R. L., Kadry, S., Nam, Y., & Meqdad, M. N. (2021). Autonomous vehicles: A study of implementation and security. International Journal of Electrical and Computer Engineering (IJECE), 11(4). https://doi.org/10.11591/ijece.v11i4.pp3013-3021

    6. Raiyn, J. (2018). Data and Cyber Security in Autonomous Vehicle Networks. Transport and Telecommunication Journal, 19(4). https://doi.org/10.2478/ttj-2018-0027

    7. Ren, K., Wang, Q., Wang, C., Qin, Z., & Lin, X. (2020). The Security of Autonomous Driving: Threats, Defenses, and Future Directions. Proceedings of the IEEE, 108(2). https://doi.org/10.1109/jproc.2019.2948775

    8. Arnold, B. J., Hanet, J., & Sivasothy, K. (2020, 18 december). Risks and liability - Cyber security and autonomous vehicles. Gowling WLG. https://gowlingwlg.com/en/insights-resources/articles/2020/cyber-security-and-autonomous-vehicles/

    9. Elezaj, R. (2019, 16 juli). Autonomous Cars: Safety Opportunity or Cybersecurity Threat? Machine Design. https://www.machinedesign.com/mechanical-motion-systems/article/21837958/autonomous-cars-safety-opportunity-or-cybersecurity-threat

    10. Prakash N and S. B. Goyal, "Method architecture for situational method engineering," 2008 Second International Conference on Research Challenges in Information Science, 2008, pp. 325-336, doi: 10.1109/RCIS.2008.4632122.

    11. Sharma, S., Goyal, S.B., Shandliya, R., Samadhiya, D. (2012). Towards XML Interoperability. In: Wyld, D., Zizka, J., Nagamalai, D. (eds) Advances in Computer Science, Engineering & Applications. Advances in Intelligent and Soft Computing, vol 166. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30157-5_102

    12. Help Net Security. (2021, 17 februari). Cybersecurity risks connected to AI in autonomous vehicles. https://www.helpnetsecurity.com/2021/02/17/cybersecurity-autonomous-vehicles/