Cyber Threats Facing Autonomous and Connected Vehicles: Future Challenges

Vehicles are currently being developed and sold with increasing levels of connectivity and automation. As with all networked computing devices, increased connectivity often results in a heightened risk of a cyber security attack. Furthermore, increased automation exacerbates any risk by increasing the opportunities for the adversary to implement a successful attack. In this paper, a large volume of publicly accessible literature is reviewed and compartmentalized based on the vulnerabilities identified and mitigation techniques developed. This review highlighted that the majority of studies are reactive and vulnerabilities are often discovered by friendly adversaries (white-hat hackers). Many gaps in the knowledge base were identified. Priority should be given to address these knowledge gaps to minimize future cyber security risks in the connected and autonomous vehicle sector.

[1]  Alastair R. Ruddle,et al.  Cyber Security Risk Analysis for Intelligent Transport Systems and In‐vehicle Networks , 2015 .

[2]  Shuzhi Sam Ge,et al.  Autonomous vehicle positioning with GPS in urban canyon environments , 2001, Proceedings 2001 ICRA. IEEE International Conference on Robotics and Automation (Cat. No.01CH37164).

[3]  Srdjan Capkun,et al.  On the requirements for successful GPS spoofing attacks , 2011, CCS '11.

[4]  Ronnie D. Caytiles,et al.  Security, Vulnerability and Protection of Vehicular On-board Diagnostics , 2016 .

[5]  Visvanathan Ramesh,et al.  A system for traffic sign detection, tracking, and recognition using color, shape, and motion information , 2005, IEEE Proceedings. Intelligent Vehicles Symposium, 2005..

[6]  Hovav Shacham,et al.  Comprehensive Experimental Analyses of Automotive Attack Surfaces , 2011, USENIX Security Symposium.

[7]  Erland Jonsson,et al.  Creating a Secure Infrastructure for Wireless Diagnostics and Software Updates in Vehicles , 2008, SAFECOMP.

[8]  Paolo Grisleri,et al.  The BRAiVE Autonomous Ground Vehicle Platform , 2010 .

[9]  Martial Hebert,et al.  Intelligent Unmanned Ground Vehicles: Autonomous Navigation Research at Carnegie Mellon , 1997 .

[10]  Wenyuan Xu,et al.  Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study , 2010, USENIX Security Symposium.

[11]  T. Humphreys,et al.  Assessing the Spoofing Threat: Development of a Portable GPS Civilian Spoofer , 2008 .

[12]  Josep Domingo-Ferrer,et al.  Balanced Trustworthiness, Safety, and Privacy in Vehicle-to-Vehicle Communications , 2010, IEEE Transactions on Vehicular Technology.

[13]  Halabi Hasbullah,et al.  Denial of Service (DOS) Attack and Its Possible Solutions in VANET , 2010 .

[14]  Martin Lukasiewycz,et al.  Lightweight authentication for secure automotive networks , 2015, 2015 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[15]  D.K. Nilsson,et al.  An approach to specification-based attack detection for in-vehicle networks , 2008, 2008 IEEE Intelligent Vehicles Symposium.

[16]  Tao Zhang,et al.  Defending Connected Vehicles Against Malware: Challenges and a Solution Framework , 2014, IEEE Internet of Things Journal.

[17]  Chou-Lin Chen,et al.  Tire Pressure Maintenance – A Statistical Investigation , 2009 .

[18]  Jun Luo,et al.  A Survey of Inter-Vehicle Communication , 2004 .

[19]  Sherali Zeadally,et al.  Security attacks and solutions for vehicular ad hoc networks , 2010, IET Commun..

[20]  Syed Masud Mahmud,et al.  Security Needs for the Future Intelligent Vehicles , 2006 .

[21]  Alex Wright,et al.  Hacking cars , 2011, Commun. ACM.

[22]  Maria Kihl,et al.  Inter-vehicle communication systems: a survey , 2008, IEEE Communications Surveys & Tutorials.

[23]  Anurag Jain,et al.  IDENTIFICATION OF MALICIOUS VEHICLE IN VANET ENVIRONMENT FROM DDOS ATTACK , 2013 .

[24]  Krysta A. Boccuzzi Investigating the Causes of and Possible Remedies for Sensor Damage in Digital Cameras Used on the OMEGA Laser Systems , 2008 .

[25]  Si Chen,et al.  Feasibility analysis of vehicular dynamic spectrum access via queueing theory model , 2010, 2010 IEEE Vehicular Networking Conference.

[26]  Sohail A Hirani Energy Consumption of Encryption Schemes in Wireless Devices , 2003 .

[27]  Cyber-security risks in the supply chain , 2015 .

[28]  Todd E. Humphreys,et al.  Real‐Time GPS Spoofing Detection via Correlation of Encrypted Signals , 2013 .

[29]  Xinming Huang,et al.  Security of Autonomous Systems Employing Embedded Computing and Sensors , 2013, IEEE Micro.

[30]  J. Minuth FlexRay™ electrical physical layer: Theory, components and examples , 2012, 2012 14th International Conference on Transparent Optical Networks (ICTON).

[31]  Sandip Mahajan,et al.  OBSTACLE DETECTION USING MONO VISION CAMERA AND LASER SCANNER , 2013 .

[32]  Hiro Onishi,et al.  Paradigm change of vehicle cyber security , 2012, 2012 4th International Conference on Cyber Conflict (CYCON 2012).

[33]  Vijay Gadepally,et al.  Estimation of Driver Behavior for Autonomous Vehicle Applications , 2013 .

[34]  Matti Valovirta,et al.  Experimental Security Analysis of a Modern Automobile , 2011 .

[35]  M. Barth,et al.  Lane-level positioning for in-vehicle navigation and automated vehicle location (AVL) systems , 2004, Proceedings. The 7th International IEEE Conference on Intelligent Transportation Systems (IEEE Cat. No.04TH8749).

[36]  Dennis K. Nilsson,et al.  A Defense-in-Depth Approach to Securing the Wireless Vehicle Infrastructure , 2009, J. Networks.

[37]  An-Lin Tao,et al.  Comprehensive Comparisons of Satellite Data, Signals, and Measurements between the BeiDou Navigation Satellite System and the Global Positioning System † , 2016, Sensors.

[38]  Tsung-Ming Chen,et al.  The Performance Analysis of a Real-Time Integrated INS / GPS Vehicle Navigation System with Abnormal GPS Measurement Elimination , 2014 .

[39]  Dorothy J. Glancy Privacy in Autonomous Vehicles , 2012 .

[40]  Erland Jonsson,et al.  A First Simulation of Attacks in the Automotive Network Communications Protocol FlexRay , 2008, CISIS.

[41]  Alexandre M. Bayen,et al.  Enhancing Privacy and Accuracy in Probe Vehicle-Based Traffic Monitoring via Virtual Trip Lines , 2012, IEEE Transactions on Mobile Computing.

[42]  Hsu-Yung Cheng,et al.  Lane Detection With Moving Vehicles in the Traffic Scenes , 2006, IEEE Transactions on Intelligent Transportation Systems.

[43]  M. Warren,et al.  Cyber attacks against supply chain management systems: A short note , 2000 .

[44]  Anurag Jain,et al.  A novel defense scheme against DDOS attack in VANET , 2013, 2013 Tenth International Conference on Wireless and Optical Communications Networks (WOCN).

[45]  Miad Faezipour,et al.  Progress and challenges in intelligent vehicle area networks , 2012, Commun. ACM.

[46]  Keijo Haataja,et al.  Security Threats and Countermeasures in Bluetooth-Enabled Systems , 2009 .

[47]  Ulf E. Larson,et al.  Conducting forensic investigations of cyber attacks on automobile in-vehicle networks , 2008 .

[48]  John M. Dolan,et al.  A behavioral planning framework for autonomous driving , 2014, 2014 IEEE Intelligent Vehicles Symposium Proceedings.

[49]  Sebastian Thrun,et al.  Path Planning for Autonomous Vehicles in Unknown Semi-structured Environments , 2010, Int. J. Robotics Res..

[50]  Thomas B. Sheridan,et al.  Humans and Automation: System Design and Research Issues , 2002 .

[51]  Mara Tanelli,et al.  A Security Layer for Smartphone-to-Vehicle Communication Over Bluetooth , 2013, IEEE Embedded Systems Letters.

[52]  Meiyuan Zhao,et al.  Automotive Security Best Practices Recommendations for security and privacy in the era of the next-generation car , 2015 .

[53]  Azim Eskandarian,et al.  Denial of Service Attacks on Inter-Vehicle Communication Networks , 2008, 2008 11th International IEEE Conference on Intelligent Transportation Systems.

[54]  Johan Lindberg Security Analysis of Vehicle Diagnostics using DoIP , 2011 .

[55]  T. Humphreys STATEMENT ON THE VULNERABILITY OF CIVIL UNMANNED AERIAL VEHICLES AND OTHER SYSTEMS TO CIVIL GPS , 2012 .

[56]  Steven E. Shladover,et al.  Potential Cyberattacks on Automated Vehicles , 2015, IEEE Transactions on Intelligent Transportation Systems.

[57]  E.J. Ohlmeyer,et al.  Analysis of an Ultra-Tightly Coupled GPS/INS System in Jamming , 2006, 2006 IEEE/ION Position, Location, And Navigation Symposium.

[58]  Berk Sunar,et al.  An Emerging Threat: Eve Meets a Robot - (Work-in-Progress) , 2010, INTRUST.

[59]  Flavio D. Garcia,et al.  Dismantling Megamos Crypto: Wirelessly Lockpicking a Vehicle Immobilizer , 2013, USENIX Security Symposium.

[60]  Bas G.B. Stottelaar,et al.  Practical cyber-attacks on autonomous vehicles , 2015 .

[61]  Todd E. Humphreys,et al.  Evaluation of the vulnerability of phasor measurement units to GPS spoofing attacks , 2012, Int. J. Crit. Infrastructure Prot..

[62]  Michael Charitos,et al.  Μοντελοποίηση και ανάπτυξη ετερογενών κινητών δικτύων οχήματος-προς-όχημα (Vehicle-to-Vehicle) και οχήματος-προς-υποδομή (Vehicle-to-Infrastructure) με έμφαση σε δύσκολα περιβάλλοντα μετάδοσης , 2018 .

[63]  Manuel Barbosa,et al.  An overview of controller area network , 1999 .

[64]  Ho Gi Jung,et al.  Enhancing Light Blob Detection for Intelligent Headlight Control Using Lane Detection , 2013, IEEE Transactions on Intelligent Transportation Systems.

[65]  Muhammad Sabir Idrees,et al.  Secure Automotive On-Board Protocols: A Case of Over-the-Air Firmware Updates , 2011, Nets4Cars/Nets4Trains.

[66]  Wang Yong-sheng,et al.  Studies on Novel Anti-jamming Technique of Unmanned Aerial Vehicle Data Link , 2008 .

[67]  Shuzhi Sam Ge,et al.  Autonomous vehicle positioning with GPS in urban canyon environments , 2001, IEEE Trans. Robotics Autom..

[68]  Philip Koopman,et al.  Ride-through for Autonomous Vehicles , 2013, CARS@SAFECOMP.

[69]  Nadine B. Sarter,et al.  How in the World Did We Ever Get into That Mode? Mode Error and Awareness in Supervisory Control , 1995, Hum. Factors.

[70]  Sebastian Thrun,et al.  Towards fully autonomous driving: Systems and algorithms , 2011, 2011 IEEE Intelligent Vehicles Symposium (IV).

[71]  Iftikhar Ahmad,et al.  Classes of attacks in VANET , 2011, 2011 Saudi International Electronics, Communications and Photonics Conference (SIECPC).

[72]  Andrea Bittau,et al.  BlueSniff: Eve Meets Alice and Bluetooth , 2007, WOOT.

[73]  Xuemin Shen,et al.  Connected Vehicles: Solutions and Challenges , 2014, IEEE Internet of Things Journal.