Affiliation:
1. Innovation4Mobility
2. Applied Research Associates Inc.
Abstract
<div class="section abstract"><div class="htmlview paragraph">While weaponizing automated vehicles (AVs) seems unlikely, cybersecurity breaches
may disrupt automated driving systems’ navigation, operation, and
safety—especially with the proliferation of vehicle-to-everything (V2X)
technologies. The design, maintenance, and management of digital infrastructure,
including cloud computing, V2X, and communications, can make the difference in
whether AVs can operate and gain consumer and regulator confidence more broadly.
Effective cybersecurity standards, physical and digital security practices, and
well-thought-out design can provide a layered approach to avoiding and
mitigating cyber breaches for advanced driver assistance systems and AVs alike.
Addressing cybersecurity may be key to unlocking benefits in safety, reduced
emissions, operations, and navigation that rely on external communication with
the vehicle.</div><div class="htmlview paragraph"><b>Automated Vehicles and Infrastructure Enablers: Cybersecurity</b>
focuses on considerations regarding cybersecurity and AVs from the perspective
of V2X infrastructure, including electric charging infrastructure. These issues
are examined in the context of initiatives in the US at all levels of government
and regulatory frameworks in the UK, Europe, and Asia.</div><div class="htmlview paragraph"><a href="https://www.sae.org/publications/edge-research-reports" target="_blank">Click
here to access the full SAE EDGE</a><sup>TM</sup><a href="https://www.sae.org/publications/edge-research-reports" target="_blank">
Research Report portfolio.</a></div></div>
Reference55 articles.
1. Greenburg , A.
2015 https://www.wired.com/2015/07/jeep-hack-chrysler-recalls-1-4m-vehicles-bug-fix/
2. Pipicelli , M. ,
Gimelli , A. ,
Sessa , B. ,
De Nola , F.
et al.
Architecture and Potential of Connected and
Autonomous Vehicles Vehicles 6 1 2024 275 304 https://doi.org/10.3390/vehicles6010012
3. Upstream Security Ltd
2023 https://upstream.auto/reports/global-automotive-cybersecurity-report/
4. Elliott , A.
Automated Mobilities: From Weaponized Drones to
Killer Bots Journal of Sociology 55 1 2019 20 36 https://doi.org/10.1177/1440783318811777
5. Miller , C. ,
Valasek , C.
2019 https://ioactive.com/wp-content/uploads/2018/05/IOActive_Remote_Car_Hacking-1.pdf