Autonomous Vehicles: Sophisticated Attacks, Safety Issues, Challenges, Open Topics, Blockchain, and Future Directions
-
Published:2023-08-05
Issue:3
Volume:3
Page:493-543
-
ISSN:2624-800X
-
Container-title:Journal of Cybersecurity and Privacy
-
language:en
-
Short-container-title:JCP
Author:
Giannaros Anastasios1ORCID, Karras Aristeidis1ORCID, Theodorakopoulos Leonidas2ORCID, Karras Christos1ORCID, Kranias Panagiotis3ORCID, Schizas Nikolaos1ORCID, Kalogeratos Gerasimos2ORCID, Tsolis Dimitrios4ORCID
Affiliation:
1. Computer Engineering and Informatics Department, University of Patras, 26504 Patras, Greece 2. Department of Management Science and Technology, University of Patras, 26334 Patras, Greece 3. School of Electrical and Computer Engineering, National Technical University of Athens, 15773 Athens, Greece 4. Department of History and Archaeology, University of Patras, 26504 Patras, Greece
Abstract
Autonomous vehicles (AVs), defined as vehicles capable of navigation and decision-making independent of human intervention, represent a revolutionary advancement in transportation technology. These vehicles operate by synthesizing an array of sophisticated technologies, including sensors, cameras, GPS, radar, light imaging detection and ranging (LiDAR), and advanced computing systems. These components work in concert to accurately perceive the vehicle’s environment, ensuring the capacity to make optimal decisions in real-time. At the heart of AV functionality lies the ability to facilitate intercommunication between vehicles and with critical road infrastructure—a characteristic that, while central to their efficacy, also renders them susceptible to cyber threats. The potential infiltration of these communication channels poses a severe threat, enabling the possibility of personal information theft or the introduction of malicious software that could compromise vehicle safety. This paper offers a comprehensive exploration of the current state of AV technology, particularly examining the intersection of autonomous vehicles and emotional intelligence. We delve into an extensive analysis of recent research on safety lapses and security vulnerabilities in autonomous vehicles, placing specific emphasis on the different types of cyber attacks to which they are susceptible. We further explore the various security solutions that have been proposed and implemented to address these threats. The discussion not only provides an overview of the existing challenges but also presents a pathway toward future research directions. This includes potential advancements in the AV field, the continued refinement of safety measures, and the development of more robust, resilient security mechanisms. Ultimately, this paper seeks to contribute to a deeper understanding of the safety and security landscape of autonomous vehicles, fostering discourse on the intricate balance between technological advancement and security in this rapidly evolving field.
Subject
General Earth and Planetary Sciences,General Environmental Science
Reference197 articles.
1. Guizzo, E. (2023, July 23). How Google’s Self-Driving Car Works. IEEE Spectrum Online. Available online: https://spectrum.ieee.org/how-google-self-driving-car-works. 2. Stiller, C., and Ziegler, J. (2012, January 20–23). 3D perception and planning for self-driving and cooperative automobiles. Proceedings of the International Multi-Conference on Systems, Signals & Devices, Chemnitz, Germany. 3. Levinson, J., Askeland, J., Becker, J., Dolson, J., Held, D., Kammel, S., Kolter, J.Z., Langer, D., Pink, O., and Pratt, V. (2011, January 5–9). Towards fully autonomous driving: Systems and algorithms. Proceedings of the 2011 IEEE Intelligent Vehicles Symposium (IV), Baden-Baden, Germany. 4. Potential Cyberattacks on Automated Vehicles;Petit;IEEE Trans. Intell. Transp. Syst.,2015 5. An Overview of Inter-Vehicular Communication Systems, Protocols and Middleware;Jawhar;J. Netw.,2013
Cited by
36 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
|
|