Potential Cyberattacks on Automated Vehicles

Vehicle automation has been one of the fundamental applications within the field of intelligent transportation systems (ITS) since the start of ITS research in the mid-1980s. For most of this time, it has been generally viewed as a futuristic concept that is not close to being ready for deployment. However, recent development of “self-driving” cars and the announcement by car manufacturers of their deployment by 2020 show that this is becoming a reality. The ITS industry has already been focusing much of its attention on the concepts of “connected vehicles” (United States) or “cooperative ITS” (Europe). These concepts are based on communication of data among vehicles (V2V) and/or between vehicles and the infrastructure (V2I/I2V) to provide the information needed to implement ITS applications. The separate threads of automated vehicles and cooperative ITS have not yet been thoroughly woven together, but this will be a necessary step in the near future because the cooperative exchange of data will provide vital inputs to improve the performance and safety of the automation systems. Thus, it is important to start thinking about the cybersecurity implications of cooperative automated vehicle systems. In this paper, we investigate the potential cyberattacks specific to automated vehicles, with their special needs and vulnerabilities. We analyze the threats on autonomous automated vehicles and cooperative automated vehicles. This analysis shows the need for considerably more redundancy than many have been expecting. We also raise awareness to generate discussion about these threats at this early stage in the development of vehicle automation systems.

[1]  Paul Newman,et al.  Navigating, Recognizing and Describing Urban Spaces With Vision and Lasers , 2009, Int. J. Robotics Res..

[2]  Zhiyi Fang,et al.  Securing Vehicular Ad Hoc Networks , 2007, 2007 2nd International Conference on Pervasive Computing and Applications.

[3]  Tobias Jeske Floating Car Data from Smartphones : What Google and Waze Know About You and How Hackers Can Control Traffic , 2013 .

[4]  Hiro Onishi,et al.  Paradigm change of vehicle cyber security , 2012, 2012 4th International Conference on Cyber Conflict (CYCON 2012).

[5]  Jana Dittmann,et al.  Security threats to automotive CAN networks - Practical examples and selected short-term countermeasures , 2008, Reliab. Eng. Syst. Saf..

[6]  T. Humphreys,et al.  Assessing the Spoofing Threat: Development of a Portable GPS Civilian Spoofer , 2008 .

[7]  Christian Laugier,et al.  Impact of V2X privacy strategies on Intersection Collision Avoidance systems , 2013, 2013 IEEE Vehicular Networking Conference.

[8]  Henry Leung,et al.  Data fusion in intelligent transportation systems: Progress and challenges - A survey , 2011, Inf. Fusion.

[9]  Andriy Panchenko,et al.  Towards Practical Attacker Classification for Risk Analysis in Anonymous Communication , 2006, Communications and Multimedia Security.

[10]  Takanori Fukao,et al.  Development of Automated Platooning System based on Heavy Duty Trucks , 2010 .

[11]  Sebastian Thrun,et al.  Towards fully autonomous driving: Systems and algorithms , 2011, 2011 IEEE Intelligent Vehicles Symposium (IV).

[12]  Hovav Shacham,et al.  Comprehensive Experimental Analyses of Automotive Attack Surfaces , 2011, USENIX Security Symposium.

[13]  M. Williams PROMETHEUS-The European research programme for optimising the road transport system in Europe , 1988 .

[14]  Sebastian Thrun,et al.  Junior: The Stanford entry in the Urban Challenge , 2008, J. Field Robotics.

[15]  Gabriele Giustiniani,et al.  Demonstration of Advanced Transport Applications in CityMobil Project , 2009 .

[16]  Ellen van Nunen,et al.  Cooperative Competition for Future Mobility , 2012, IEEE Transactions on Intelligent Transportation Systems.

[17]  Gang Lu,et al.  Anti-jamming filtering for DRFM repeat jammer based on stretch processing , 2010, 2010 2nd International Conference on Signal Processing Systems.

[18]  Fakhri Karray,et al.  Multisensor data fusion: A review of the state-of-the-art , 2013, Inf. Fusion.

[19]  Gregory D. Abowd,et al.  Preventing Camera Recording by Designing a Capture-Resistant Environment , 2005, UbiComp.

[20]  Amer Aijaz,et al.  Attacks on Inter Vehicle Communication Systems-an Analysis , 2005 .

[21]  Martin Lauer,et al.  Team AnnieWAY's Entry to the 2011 Grand Cooperative Driving Challenge , 2012, IEEE Transactions on Intelligent Transportation Systems.

[22]  Swarun Kumar,et al.  CarSpeak: a content-centric network for autonomous driving , 2012, SIGCOMM '12.

[23]  Thomas Peyrin,et al.  Security challenges in automotive hardware/software architecture design , 2013, 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[24]  Kpatcha M. Bayarou,et al.  Copra: Conditional pseudonym resolution algorithm in VANETs , 2013, 2013 10th Annual Conference on Wireless On-demand Network Systems and Services (WONS).

[25]  Intelligent Transport Systems (its); Decentralized Congestion Control Mechanisms for Intelligent Transport Systems Operating in the 5 Ghz Range; Access Layer Part , 2022 .

[26]  Nick McKeown,et al.  Automated vehicle control developments in the PATH program , 1991 .

[27]  Matti Valovirta,et al.  Experimental Security Analysis of a Modern Automobile , 2011 .

[28]  Jestin Joy,et al.  Architecture for Secure Tablet Integration in Automotive Network , 2013 .

[29]  Wenyuan Xu,et al.  Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study , 2010, USENIX Security Symposium.

[30]  Keith Mayes,et al.  Secure Smart Embedded Devices, Platforms and Applications , 2013, Springer New York.

[31]  Zehong Yang,et al.  A Real-Time Drivable Road Detection Algorithm in Urban Traffic Environment , 2012, ICCVG.

[32]  Michael Feser,et al.  Advanced Crash Discrimination using Crash Impact Sound Sensing (CISS) , 2006 .

[33]  Ernst Dieter Dickmanns VISION FOR GROUND VEHICLES: HISTORY AND PROSPECTS , 2002 .

[34]  P. Newman,et al.  Navigating , Recognising and Describing Urban Spaces With Vision and Laser , 2009 .

[35]  Gerhard P. Hancke Security of Embedded Location Systems , 2014, Secure Smart Embedded Devices, Platforms and Applications.

[36]  Christof Paar,et al.  Security in Automotive Bus Systems , 2004 .

[37]  R. E. Fenton,et al.  Automated highway studies at the Ohio State University-an overview , 1991 .

[38]  Eureka Aerospace High-Power Compact Microwave Source for Vehicle Immobilization, Final Report , 2006 .