Cyber-attacks in the next-generation cars, mitigation techniques, anticipated readiness and future directions

Modern-day Connected and Autonomous Vehicles (CAVs) with more than 100 million code lines, running up-to a hundred Electronic Control Units (ECUs) will create and exchange digital information with other vehicles and intelligent transport networks. Consequently, ubiquitous internal and external communication (controls, commands, and data) within all CAV-related nodes is inevitably the gatekeeper for the smooth operation. Therefore, it is a primary vulnerable area for cyber-attacks that entails stringent and efficient measures in the form of "cybersecurity". There is a lack of systematic and comprehensive review of the literature on cyber-attacks on the CAVs, respective mitigation strategies, anticipated readiness, and research directions for the future. This study aims to analyze, synthesize, and interpret critical areas for the roll-out and progression of CAVs in combating cyber-attacks. Specifically, the authors described in a structured way a holistic view of potentially critical avenues, which lies at the heart of CAV cybersecurity research. The authors synthesize their scope with a particular focus on ensuring effective CAVs deployment and reducing the probability of cyber-attack failures. The authors present the CAVs communication framework in an integrated form, i.e., from In-Vehicle (IV) communication to Vehicle-to-Vehicle (V2X) communication with a visual flowchart to provide a transparent picture of all the interfaces for potential cyber-attacks. The vulnerability of CAVs by proximity (or physical) access to cyber-attacks is outlined with future recommendations. There is a detailed description of why the orthodox cybersecurity approaches in Cyber-Physical System (CPS) are not adequate to counter cyber-attacks on the CAVs. Further, the authors synthesized a table with consolidated details of the cyber-attacks on the CAVs, the respective CAV communication system, its impact, and the corresponding mitigation strategies. It is believed that the literature discussed, and the findings reached in this paper are of great value to CAV researchers, technology developers, and decision-makers in shaping and developing a robust CAV-cybersecurity framework.

Language

  • English

Media Info

Subject/Index Terms

Filing Info

  • Accession Number: 01758620
  • Record Type: Publication
  • Files: TRIS
  • Created Date: Nov 20 2020 11:06AM