Impact of Factors Influencing Cyber Threats on Autonomous Vehicles

ABSTRACT Advanced Technologies are transforming the Automotive industry and the pace of innovation is accelerating at a breakneck speed. Autonomous Vehicles (AVs) incorporate many different systems and technologies and their increased computer functionality and connectivity lead to enormous cybersecurity risk. The aim of this research is to explore the significant factors that influence cyber threats on AVs and to examine their level of importance. Partial Least Squares path modeling was preferred for research studies for its flexible modeling and identifying key drivers. The data analysis was carried out using ADANCO 2.0.Tables 1 to develop and evaluate the structural model and the causal relationships between the variables. Correlation of in-vehicular network vulnerabilities with trust and the correlation between the “workload of the driverless system” with cyber-attacks and cyber threats to AVs are two relations but have not been touched upon in previous studies. In this research, a modified framework is proposed based on the Cyber Cycle and integrated model of Diamond Model of Intrusion Analysis with the Active Cyber Defense Cycle.

[1]  A. Bryman,et al.  The Sage Encyclopedia of Social Science Research Methods (three volumes) , 2003 .

[2]  Peter Jones,et al.  Social and behavioural questions associated with automated vehicles: a literature review , 2017 .

[3]  Dorothy J. Glancy Autonomous and Automated and Connected Cars—Oh My! First Generation Autonomous Cars in the Legal Ecosystem , 2015 .

[4]  ChristinDelphine Privacy in mobile participatory sensing , 2016 .

[5]  Barbara Lenz,et al.  Transition pathways to fully automated driving and its implications for the sociotechnical system of automobility , 2015 .

[6]  Sevil Sen,et al.  A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV , 2017, Ad Hoc Networks.

[7]  E. Bullmore,et al.  How Good Is Good Enough in Path Analysis of fMRI Data? , 2000, NeuroImage.

[8]  Milan N. Simic,et al.  Vehicular Ad Hoc Networks , 2013, 2013 11th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services (TELSIKS).

[9]  Edwin Olson,et al.  Multipolicy decision-making for autonomous driving via changepoint-based behavior prediction: Theory and experiment , 2015, Autonomous Robots.

[10]  Milan Simic,et al.  In the Passenger Seat: Investigating Ride Comfort Measures in Autonomous Cars , 2015, IEEE Intelligent Transportation Systems Magazine.

[11]  Ciprian Dobre,et al.  Privacy-preserving data aggregation in Intelligent Transportation Systems , 2017, 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM).

[12]  Pan Zhao,et al.  A Scenario-Adaptive Driving Behavior Prediction Approach to Urban Autonomous Driving , 2017 .

[13]  Andreas Theodorou,et al.  Robot transparency, trust and utility , 2016, Connect. Sci..

[14]  Rong Qu,et al.  Survey on cyber security of CAV , 2017, 2017 Forum on Cooperative Positioning and Service (CPGPS).

[15]  B. Taylor,et al.  A private matter: the implications of privacy regulations for intelligent transportation systems , 2016 .

[16]  Nidhi Kalra,et al.  Liability and Regulation of Autonomous Vehicle Technologies , 2009 .

[17]  Frank W. Geels,et al.  The dynamics of transitions in socio-technical systems: A multi-level analysis of the transition pathway from horse-drawn carriages to automobiles (1860–1930) , 2005, Technol. Anal. Strateg. Manag..

[18]  Jonathan Miller,et al.  Cyber Threats Facing Autonomous and Connected Vehicles: Future Challenges , 2017, IEEE Transactions on Intelligent Transportation Systems.

[19]  Tao Zhang,et al.  Defending Connected Vehicles Against Malware: Challenges and a Solution Framework , 2014, IEEE Internet of Things Journal.

[20]  Iyad Rahwan,et al.  The social dilemma of autonomous vehicles , 2015, Science.

[21]  Elyes Ben Hamida,et al.  Security of Cooperative Intelligent Transport Systems: Standards, Threats Analysis and Cryptographic Countermeasures , 2015 .

[22]  Delphine Christin,et al.  Privacy in mobile participatory sensing , 2016 .

[23]  Dipak Ghosal,et al.  Security vulnerabilities of connected vehicle streams and their impact on cooperative driving , 2015, IEEE Communications Magazine.

[24]  Andrew P. Martin,et al.  Cyber-Threats Information Sharing in Cloud Computing: A Game Theoretic Approach , 2015, 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing.

[25]  Madjid Tavana,et al.  Autonomous vehicles: challenges, opportunities, and future implications for transportation policies , 2016, Journal of Modern Transportation.

[26]  Kathrin Zeeb,et al.  What determines the take-over time? An integrated model approach of driver take-over after automated driving. , 2015, Accident; analysis and prevention.

[27]  Shwetak N. Patel,et al.  Experimental Security Analysis of a Modern Automobile , 2010, 2010 IEEE Symposium on Security and Privacy.

[28]  Steven E. Shladover,et al.  Potential Cyberattacks on Automated Vehicles , 2015, IEEE Transactions on Intelligent Transportation Systems.

[29]  Yili Liu,et al.  Queuing Network Modeling of Driver Workload and Performance , 2006, IEEE Transactions on Intelligent Transportation Systems.

[30]  Robert E. Llaneras,et al.  Distracted Driver Performance to Multiple Alerts in a Multiple-Conflict Scenario , 2014, Hum. Factors.

[31]  Suleyman Uludag,et al.  Intelligent transportation as the key enabler of smart cities , 2016, NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium.

[32]  Daniel A. Crane,et al.  A Survey of Legal Issues Arising from the Deployment of Autonomous and Connected Vehicles , 2016 .

[33]  Kevin D. Carlson,et al.  Understanding the Impact of Convergent Validity on Research Results , 2012 .

[34]  Jessica S. Brodsky Autonomous Vehicle Regulation: How an Uncertain Legal Landscape May Hit The Brakes on Self-Driving Cars , 2016 .

[35]  John D. Villasenor Products Liability and Driverless Cars: Issues and Guiding Principles for Legislation , 2014 .

[36]  Caleb Kennedy New Threats to Vehicle Safety: How Cybersecurity Policy Will Shape the Future of Autonomous Vehicles , 2017 .

[37]  K. Jöreskog,et al.  A General Method of Estimating the Reliability of a Composite , 1978 .

[38]  Ray Hunt,et al.  A taxonomy of network and computer attacks , 2005, Comput. Secur..

[39]  Robert D. McLeod,et al.  Bluetooth in Intelligent Transportation Systems: A Survey , 2015, Int. J. Intell. Transp. Syst. Res..

[40]  A. Shariff,et al.  Psychological roadblocks to the adoption of self-driving vehicles , 2017, Nature Human Behaviour.

[41]  Marko Sarstedt,et al.  PLS-SEM: Indeed a Silver Bullet , 2011 .