Open Access Open Access  Restricted Access Subscription Access

Examining Modern Data Security and Privacy Protocols in Autonomous Vehicles


Affiliations
1 Department of Computer Science, University of Wisconsin, Eau Claire, Eau Claire, United States
 

A fully automated, self-driving car can perceive its environment, determine the optimal route, and drive unaided by human intervention for the entire journey. Connected autonomous vehicles (CAVs) have the potential to drastically reduce accidents, travel time, and the environmental impact of road travel. Such technology includes the use of several sensors, various algorithms, interconnected network connections, and multiple auxiliary systems. CAVs have been subjected to attacks by malicious users to gain/deny control of one or more of its various systems. Data security and data privacy is one such area of CAVs that has been targeted via different types of attacks. The scope of this study is to present a good background knowledge of issues pertaining to different attacks in the context of data security and privacy, as well present a detailed review and analysis of eight very recent studies on the broad topic of security and privacy related attacks. Methodologies including Blockchain, Named Data Networking, Intrusion Detection System, Cognitive Engine, Adversarial Objects, and others have been investigated in the literature and problem- and context-specific models have been proposed by their respective authors.

Keywords

Security & Privacy, Autonomous Vehicles, Blockchain, Connected Autonomous Vehicles.
User
Notifications
Font Size

  • Litman, Todd. Autonomous vehicle implementation predictions. Victoria, Canada: Victoria Transport Policy Institute, 2017.
  • Dey, K. C., Rayamajhi, A., Chowdhury, M., Bhavsar, P., & Martin, J. (2016). Vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication in a heterogeneous wireless network–Performance evaluation. Transportation Research Part C: Emerging Technologies, 68, 168-184.
  • Othmane, L. B., Weffers, H., Mohamad, M. M., & Wolf, M. (2015). A survey of security and privacy in connected vehicles. In Wireless sensor and mobile ad-hoc networks (pp. 217-247). Springer, New York, NY.
  • Kumar, Amara Dinesh, Koti Naga Renu Chebrolu, and Soman KP. "A brief survey on autonomous vehicle possible attacks, exploits and vulnerabilities." arXiv preprint arXiv:1810.04144 (2018).
  • Humphreys, Todd. "Statement on the vulnerability of civil unmanned aerial vehicles and other systems to civil GPS spoofing." University of Texas at Austin (July 18, 2012) (2012): 1-16.
  • Petit, J., Stottelaar, B., Feiri, M., & Kargl, F. Remote attacks on automated vehicles sensors: Experiments on camera and lidar. Black Hat Europe, 2015.
  • Pham, Minh, and Kaiqi Xiong. "A survey on security attacks and defense techniques for connected and autonomous vehicles." arXiv preprint arXiv:2007.08041 (2020)
  • Alheeti, Khattab M. Ali, Anna Gruebler, and Klaus D. McDonald-Maier. "An intrusion detection system against black hole attacks on the communication network of self-driving cars." 2015 sixth international conference on emerging security technologies (EST). IEEE, 2015.
  • Alheeti, Khattab M. Ali, Anna Gruebler, and Klaus D. McDonald-Maier. "An intrusion detection system against malicious attacks on the communication network of driverless cars." 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC). IEEE, 2015.
  • Rathee, G., Sharma, A., Iqbal, R., Aloqaily, M., Jaglan, N., & Kumar, R. (2019). A blockchain framework for securing connected and autonomous vehicles. Sensors, 19(14), 3165.
  • Sharma, Vishal. "An energy-efficient transaction model for the blockchain-enabled internet of vehicles (IoV)." IEEE Communications Letters 23.2 (2018): 246-249.
  • Shin, H., Kim, D., Kwon, Y., & Kim, Y. (2017, September). Illusion and dazzle: Adversarial optical channel exploits against lidars for automotive applications. In International Conference on Cryptographic Hardware and Embedded Systems (pp. 445-467). Springer, Cham.
  • Sun, J., Cao, Y., Chen, Q. A., & Mao, Z. M. (2020). Towards robust lidar-based perception in autonomous driving: General black-box adversarial sensor attack and countermeasures. In 29th {USENIX} Security Symposium ({USENIX} Security 20) (pp. 877-894).
  • Cao, Y., Xiao, C., Yang, D., Fang, J., Yang, R., Liu, M., & Li, B. (2019). Adversarial objects against lidar-based autonomous driving systems. arXiv preprint arXiv:1907.05418.
  • Feng, Y., Huang, S., Chen, Q. A., Liu, H. X., & Mao, Z. M. (2018). Vulnerability of traffic control system under cyberattacks with falsified data. Transportation research record, 2672(1), 1-11.
  • He, Qiyi, Xiaolin Meng, and Rong Qu. "Towards a severity assessment method for potential cyber-attacks to connected and autonomous vehicles." Journal of advanced transportation 2020 (2020)
  • Bloom, C., Tan, J., Ramjohn, J., & Bauer, L. (2017). Self-driving cars and data collection: Privacy perceptions of networked autonomous vehicles. In Thirteenth Symposium on Usable Privacy and Security ({SOUPS} 2017) (pp. 357-375).
  • Dutta, R. G., Yu, F., Zhang, T., Hu, Y., & Jin, Y. Security for safety: a path toward building trusted autonomous vehicles. In Proceedings of the International Conference on Computer-Aided Design, 2018.
  • Plosz, Sandor, and Pal Varga. "Security and safety risk analysis of vision guided autonomous vehicles." 2018 IEEE Industrial Cyber-Physical Systems (ICPS). IEEE, 2018.
  • Chowdhury, Muktadir, Ashlesh Gawande, and Lan Wang. "Secure information sharing among autonomous vehicles in NDN." 2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI). 2017 [21] Amoozadeh, M., Raghuramu, A., Chuah, C. N., Ghosal, D., Zhang, H. M., Rowe, J., & Levitt, K. (2015). Security vulnerabilities of connected vehicle streams and their impact on cooperative driving. IEEE Communications Magazine, 53(6), 126-132.
  • Mahmud, Syed Masud, Shobhit Shanker, and Irina Hossain. "Secure software upload in an intelligent vehicle via wireless communication links." IEEE Proceedings. Intelligent Vehicles Symposium, 2005.
  • Qian, Y., Chen, M., Chen, J., Hossain, M. S., & Alamri, A. (2018). Secure enforcement in cognitive internet of vehicles. IEEE Internet of Things Journal, 5(2), 1242-1250.
  • Huang, C., Lu, R., Lin, X., & Shen, X. Secure automated valet parking: A privacy-preserving reservation scheme for autonomous vehicles. IEEE Transactions on Vehicular Technology, 67(11), 11169-11180.
  • Tokody, D., Albini, A., Ady, L., Rajnai, Z., & Pongrácz, F. (2018). Safety and security through the design of autonomous intelligent vehicle systems and intelligent infrastructure in the smart city. Interdisciplinary Description of Complex Systems: INDECS, 16(3-A), 384-396.
  • Alheeti, Khattab M. Ali, Anna Gruebler, and Klaus D. McDonald-Maier. "On the detection of grey hole and rushing attacks in self-driving vehicular networks." 2015 7th Computer science and electronic engineering conference (CEEC). IEEE, 2015.
  • Cui, Jin, and Giedre Sabaliauskaite. "On the alignment of safety and security for autonomous vehicles." Proc. IARIA CYBER (2017): 1-6.
  • He, Q., Meng, X., Qu, R., & Xi, R. (2020). Machine Learning-Based Detection for Cyber Security Attacks on Connected and Autonomous Vehicles. Mathematics, 8(8), 1311.
  • Changalvala, Raghu, and Hafiz Malik. "LiDAR data integrity verification for autonomous vehicle." IEEE Access 7 (2019): 138018-138031.
  • Veitas, Viktoras Kabir, and Simon Delaere. "In-vehicle data recording, storage and access management in autonomous vehicles." arXiv preprint arXiv:1806.03243 (2018).
  • Kang, Min-Joo, and Je-Won Kang. "Intrusion detection system using deep neural network for in-vehicle network security." PloS one 11.6 (2016): e0155781.
  • Kosmanos, D., Pappas, A., Aparicio-Navarro, F. J., Maglaras, L., Janicke, H., Boiten, E., & Argyriou, A. (2019, September). Intrusion detection system for platooning connected autonomous vehicles. In 2019 4th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM) (pp. 1-9). IEEE.
  • Jameel, F., Chang, Z., Huang, J., & Ristaniemi, T. (2019). Internet of autonomous vehicles: architecture, features, and socio-technological challenges. IEEE Wireless Communications, 26(4), 21-29.
  • Ali Alheeti, Khattab M., and Klaus McDonald-Maier. "Intelligent intrusion detection in external communication systems for autonomous vehicles." Systems Science & Control Engineering, 6(1):48-56.
  • Khalil, A., Al Janaideh, M., Aljanaideh, K. F., & Kundur, D. (2020, July). Fault detection, localization, and mitigation of a network of connected autonomous vehicles using transmissibility identification. In 2020 American Control Conference (ACC) (pp. 386-391). IEEE.
  • Raiyn, Jamal. "Data and cyber security in autonomous vehicle networks." Transport and Telecommunication 19.4 (2018): 325-334.
  • Ferdowsi, A., Ali, S., Saad, W., & Mandayam, N. B. (2019). Cyber-physical security and safety of autonomous connected vehicles: Optimal control meets multi-armed bandit learning. IEEE Transactions on Communications, 67(10), 7228-7244.
  • Sheehan, B., Murphy, F., Mullins, M., & Ryan, C. (2019). Connected and autonomous vehicles: A cyber-risk classification framework. Transportation research part A: policy and practice, 124, 523-536.
  • Ansari, S., Ahmad, J., Aziz Shah, S., Kashif Bashir, A., Boutaleb, T., & Sinanovic, S. (2020). Chaos‐based privacy preserving vehicle safety protocol for 5G Connected Autonomous Vehicle networks. Transactions on Emerging Telecommunications Technologies, 31(5), e3966.
  • Dedinsky, R., Khayatian, M., Mehrabian, M., & Shrivastava, A. (2019). A dependable detection mechanism for intersection management of connected autonomous vehicles (interactive presentation). In Workshop on Autonomous Systems Design (ASD 2019). Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik.
  • Narbayeva, S., Bakibayev, T., Abeshev, K., Makarova, I., Shubenkova, K., & Pashkevich, A. (2020). Blockchain technology on the way of autonomous vehicles development. Transportation Research Procedia, 44, 168-175.
  • Baza, M., Nabil, M., Lasla, N., Fidan, K., Mahmoud, M., & Abdallah, M. (2019, April). Blockchain-based firmware update scheme tailored for autonomous vehicles. In 2019 IEEE Wireless Communications and Networking Conference (WCNC) (pp. 1-7). IEEE.
  • Lim, Bing Shun, Sye Loong Keoh, and Vrizlynn LL Thing. "Autonomous vehicle ultrasonic sensor vulnerability and impact assessment." 2018 IEEE 4th World Forum on Internet of Things (WF-IoT).
  • Sharma, Prinkle, David Austin, and Hong Liu. "Attacks on machine learning: Adversarial examples in connected and autonomous vehicles." 2019 IEEE International Symposium on Technologies for Homeland Security (HST). IEEE, 2019.
  • Jin, X., Haddad, W. M., Jiang, Z. P., Kanellopoulos, A., & Vamvoudakis, K. G. (2019). An adaptive learning and control architecture for mitigating sensor and actuator attacks in connected autonomous vehicle platoons. International Journal of Adaptive Control and Signal Processing, 33(12), 1788-1802.
  • Khadka, A., Karypidis, P., Lytos, A., & Efstathopoulos, G. (2021). A benchmarking framework for cyber-attacks on autonomous vehicles. Transportation research procedia, 52, 323-330.
  • Dave, R., Sowells Boone, E. R., and Roy, K., “Efficient Data Privacy and Security in Autonomous Cars.” Journal of Computer Sciences and Applications, vol. 7, no. 1 (2019): 31-36.doi: 10.12691/jcsa-7-1-5.
  • Patel, M., Dave, R., Rushit Dave, and Sowells Boone, E. R., "Autonomous Vehicles: Ethical Dilemmas", International Journal of Advanced Research and Publications (IJARP), http://www.ijarp.org/online-papers-publishing/August2019.html, Volume 3 - Issue 8, August 2019 Edition, #ijarporg.

Abstract Views: 415

PDF Views: 235




  • Examining Modern Data Security and Privacy Protocols in Autonomous Vehicles

Abstract Views: 415  |  PDF Views: 235

Authors

Mingfu Huang
Department of Computer Science, University of Wisconsin, Eau Claire, Eau Claire, United States
Rushit Dave
Department of Computer Science, University of Wisconsin, Eau Claire, Eau Claire, United States
Nyle Siddiqui
Department of Computer Science, University of Wisconsin, Eau Claire, Eau Claire, United States
Naeem Seliya
Department of Computer Science, University of Wisconsin, Eau Claire, Eau Claire, United States

Abstract


A fully automated, self-driving car can perceive its environment, determine the optimal route, and drive unaided by human intervention for the entire journey. Connected autonomous vehicles (CAVs) have the potential to drastically reduce accidents, travel time, and the environmental impact of road travel. Such technology includes the use of several sensors, various algorithms, interconnected network connections, and multiple auxiliary systems. CAVs have been subjected to attacks by malicious users to gain/deny control of one or more of its various systems. Data security and data privacy is one such area of CAVs that has been targeted via different types of attacks. The scope of this study is to present a good background knowledge of issues pertaining to different attacks in the context of data security and privacy, as well present a detailed review and analysis of eight very recent studies on the broad topic of security and privacy related attacks. Methodologies including Blockchain, Named Data Networking, Intrusion Detection System, Cognitive Engine, Adversarial Objects, and others have been investigated in the literature and problem- and context-specific models have been proposed by their respective authors.

Keywords


Security & Privacy, Autonomous Vehicles, Blockchain, Connected Autonomous Vehicles.

References