Skip to main content

The Security Concerns and Countermeasures Towards V2V and Autonomous Cars

  • Conference paper
  • First Online:
Proceedings of Sixth International Congress on Information and Communication Technology

Abstract

Autonomous vehicles (AVs) refer to ones that are capable of perceiving the surrounding environment and directing without human assistance. With the boom of this technology, these driverless vehicles can detect the traffic, environment and pedestrians in the street, and then they make decisions about a safe and efficient way to get to the destination. Though this technology brings advantages, the security problems of such vehicles should be taken into consideration. This paper, therefore, presents an overview of several security concerns towards vehicle-to-vehicle communication and autonomous vehicles. Moreover, this paper also provides insights into some countermeasures against cyber threats for V2V and autonomous cars.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Arbib J, Seba T (2017) Rethinking transportation 2020–2030, p 70. https://static1.squarespace.com/static/585c3439be65942f022bbf9b/t/591a2e4be6f2e1c13df930c5/1494888038959/RethinkX+Report_051517.pdf

  2. Neil M, Pedersen J, Spring S (2011) Security and critical infrastructure protection progress 275

    Google Scholar 

  3. Kim S, Lee I (2014) A secure and efficient vehicle to vehicle communication scheme using bloom filter in VANETs 8(2):9–24

    Google Scholar 

  4. Watson T, Maple C (2017) Cyber security standards and issues in V2X communications 1 Ivan Ivanov, 2 Sang-Woo 9:2–7. http://www.worldresearchlibrary.org/up_proc/pdf/722-14918904992-7.pdf

  5. Nguyen HPD, Zoltán R (2018) The current security challenges of vehicle communication in the future transportation system. In: SISY 2018 - IEEE 16th International Symposium on Intelligent System and Informatics, Proceedings, pp 161–165. https://doi.org/10.1109/SISY.2018.8524773

  6. NHTSA (2014) What are the advantages of V2V?, pp 1–4

    Google Scholar 

  7. Yeomans G (2014) Autonomous vehicles - handing over control: opportunities and risks for insurance, Lloyd’s, pp 1–27

    Google Scholar 

  8. Litman T (2014) Autonomous vehicle implementation predictions: implications for transport planning. Transp Res Board Annu Meet 2014:36–42. https://doi.org/10.1613/jair.301

    Article  Google Scholar 

  9. Anderson J, Kalra N, Stanley K, Sorensen P, Samaras C, Oluwatola O (2016) Autonomous vehicle technology: a guide for policymakers

    Google Scholar 

  10. Corrigan S (2016) Introduction to the Controller Area Network (CAN). In: Texas instruments, August 2002, pp 1–17

    Google Scholar 

  11. Hoppe T, Kiltz S, Dittmann J (2011) Security threats to automotive CAN networks—practical examples and selected short-term countermeasures. Reliab Eng Syst Saf 96(1):11–25. https://doi.org/10.1016/j.ress.2010.06.026

    Article  Google Scholar 

  12. Van Herrewege A, Singelee D, Verbauwhede I (2011) CANAuth - a simple, backward compatible broadcast authentication protocol for CAN bus. In: ECRYPT workshop on lightweight cryptography, November 2011, pp 299–235. http://www.uclouvain.be/crypto/ecrypt_lc11/static/post_proceedings.pdf

  13. Dai NHP, Zoltán R (2012) The obstacles of autonomous cars before taking the wheel in the future 91(5)

    Google Scholar 

  14. Rouf I et al (2010) Security and privacy vulnerabilities of in-car wireless networks: a tire pressure monitoring system case study. Proc. USENIX Secur. Symp. 39(4):11–13. https://doi.org/10.1177/004057368303900411

    Article  Google Scholar 

  15. Seifert S, Obermaisser R (2014) Secure automotive gateway - secure communication for future cars. In: Proc. - 2014 12th IEEE international conference on industrial informatics, INDIN 2014, pp 213–220. https://doi.org/10.1109/INDIN.2014.6945510

  16. Mastakar G (2012) Experimental security analysis of a modern automobile. In: IEEE symposium on security and privacy, pp 1–16. https://doi.org/10.1109/SP.2010.34

  17. Wolf M, Gendrullis T (2012) Design, implementation, and evaluation of a vehicular hardware security module. In: Lecture notes in computer science (including Subseries Lecture notes in artificial intelligence and Lecture notes in bioinformatics). LNCS, vol 7259, pp 302–318. https://doi.org/10.1007/978-3-642-31912-9_20

  18. Adaptive cruise control system. https://en.wikipedia.org/wiki/Autonomous_cruise_control_system

  19. Amoozadeh M et al (2015) Security vulnerabilities of connected vehicle streams and their impact on cooperative driving. IEEE Commun Mag 53(6):126–132. https://doi.org/10.1109/MCOM.2015.7120028

    Article  Google Scholar 

  20. Rao A, Sangwan A, Kherani AA, Varghese A, Bellur B, Shorey R (2007) Secure V2V communication with certificate revocations. In: 2007 mobile networking for vehicular environments movE, pp 127–132. https://doi.org/10.1109/MOVE.2007.4300817

  21. Hasbullah H, Soomro IA, Ab Manan JL (2010) Denial of service (DOS) attack and its possible solutions in VANET. World Acad Sci Eng Technol 65(5):411–415. https://doi.org/10.5281/zenodo.1085740

  22. Lin X, Member S, Sun X, Ho P, Shen XS, Member S, GSIS : a secure and privacy preserving protocol for vehicular communications XX(Xx):1–14

    Google Scholar 

  23. Lipiński B, Mazurczyk W, Szczypiorski K, Śmietanka P (2015) Towards effective security framework for vehicular ad-hoc networks. J Adv Comput Netw 3(2):134–140. https://doi.org/10.7763/JACN.2015.V3.155

    Article  Google Scholar 

  24. Garip MT, Gursoy ME, Reiher P, Gerla M (2015) Congestion attacks to autonomous cars using vehicular botnets. In: NDSS Symposium 2015, pp 1–9. https://doi.org/10.14722/sent.2015.23001

  25. Onishi H (2012) Paradigm change of vehicle cyber security. In: 2012 4th International conference on cyber conflict (CYCON), pp 1–11

    Google Scholar 

  26. Hackers hitch cars. http://www.latimes.com/business/autos/la-fi-hy-car-hacking-20150914-story.html

  27. Bécsi T, Aradi S, Gáspár P (2015) Security issues and vulnerabilities in connected car systems. In: 2015 international conference on models and technologies for intelligent transportation system MT-ITS 2015, April 2016, pp 477–482. https://doi.org/10.1109/MTITS.2015.7223297

  28. Douceur JR (2002) The Sybil attack, pp 251–260. https://doi.org/10.1007/3-540-45748-8_24

  29. Guette G, Bryce C (2008) Using TPMs to secure Vehicular Ad-Hoc Networks (VANETs). In: Lecture notes in computer science (including Subseries Lecture notes in artificial intelligence and Lecture notes in bioinformatics). LNCS, vol 5019, pp 106–116. https://doi.org/10.1007/978-3-540-79966-5_8

  30. Halabi Hasbullah JAM, Soomro A (2010) Denial of Service (DOS) attack and its possible solution in VANET 4(5):813–817

    Google Scholar 

  31. Raghuwanshi V, Jain S (2015) Denial of service attack in VANET: a survey. Int J Eng Trends Technol 28(1):15–20. http://www.ijettjournal.org

  32. Blum J, Eskandarian A (2004) The threat of intelligent collisions. IT Prof 6(1):24–29. https://doi.org/10.1109/MITP.2004.1265539

    Article  Google Scholar 

  33. Rawat A, Sharma S, Sushil R (2014) Vanet: security attacks and its possible solutions. J Inf Oper Manag 3(1):301–304. https://doi.org/10.1007/s13398-014-0173-7.2

    Article  Google Scholar 

  34. Petit J, Stottelaar B, Feiri M, Kargl F (2015) Remote attacks on automated vehicles sensors: experiments on camera and LiDAR, pp 1–13, pp. 1–13. Blackhat.com. https://www.blackhat.com/docs/eu-15/materials/eu-15-Petit-Self-Driving-And-Connected-Cars-Fooling-Sensors-And-Tracking-Drivers-wp1.pdf.

  35. Bai L, Wang Y (2010) A sensor fusion framework using multiple particle filters for video-based navigation. IEEE Trans Intell Transp Syst 11(2):348–358. https://doi.org/10.1109/TITS.2010.2043431

    Article  Google Scholar 

  36. Kong H, Akakin HC, Sarma SE (2013) A generalized laplacian of gaussian filter for blob detection and its applications. IEEE Trans. Cybern. 43(6):1719–1733. https://doi.org/10.1109/TSMCB.2012.2228639

    Article  Google Scholar 

  37. Keller CG, Enzweiler M, Rohrbach M, Llorca DF, Schnörr C, Gavrila DM (2011) The benefits of dense stereo for pedestrian detection. IEEE Trans Intell Transp Syst 12(4):1096–1106

    Article  Google Scholar 

  38. Leinmuller T, Schoch E, Maihofer C (2007) Security requirements and solution concepts in vehicular ad hoc networks. In: 2007 fourth annual conference on wireless demand network systems and services, pp 84–91. https://doi.org/10.1109/WONS.2007.340489

  39. Raya M, Raya M, Hubaux J, Hubaux J (2007) Securing vehicular ad hoc networks. J Comput Secur 15:39–68. https://doi.org/10.1111/j.1523-1755.2002.kid554.x

    Article  MATH  Google Scholar 

  40. Raya M, Hubaux JP (2005) Security aspects of inter-vehicle communications. Swiss Transp. Res. Conf. http://en.scientificcommons.org/22427989

  41. Ziari M, Steier WH, Ranon PM, Trivedi S, Klein MB (1992) Photorefractivity in vanadium-doped ZnTe. Appl Phys Lett 60(9):1052–1054. https://doi.org/10.1063/1.106441

    Article  Google Scholar 

Download references

Acknowledgements

The research presented in this paper was carried out as part of the EFOP-3.6.2-16-2017-00016 project in the framework of the New Széchenyi Plan. The completion of this project was funded by the European Union and co-financed by the European Social Fund.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Huu Phuoc Dai Nguyen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Nguyen, H., Zoltán, R. (2022). The Security Concerns and Countermeasures Towards V2V and Autonomous Cars. In: Yang, XS., Sherratt, S., Dey, N., Joshi, A. (eds) Proceedings of Sixth International Congress on Information and Communication Technology. Lecture Notes in Networks and Systems, vol 216. Springer, Singapore. https://doi.org/10.1007/978-981-16-1781-2_48

Download citation

Publish with us

Policies and ethics