Abstract
Autonomous vehicles (AVs) refer to ones that are capable of perceiving the surrounding environment and directing without human assistance. With the boom of this technology, these driverless vehicles can detect the traffic, environment and pedestrians in the street, and then they make decisions about a safe and efficient way to get to the destination. Though this technology brings advantages, the security problems of such vehicles should be taken into consideration. This paper, therefore, presents an overview of several security concerns towards vehicle-to-vehicle communication and autonomous vehicles. Moreover, this paper also provides insights into some countermeasures against cyber threats for V2V and autonomous cars.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Arbib J, Seba T (2017) Rethinking transportation 2020–2030, p 70. https://static1.squarespace.com/static/585c3439be65942f022bbf9b/t/591a2e4be6f2e1c13df930c5/1494888038959/RethinkX+Report_051517.pdf
Neil M, Pedersen J, Spring S (2011) Security and critical infrastructure protection progress 275
Kim S, Lee I (2014) A secure and efficient vehicle to vehicle communication scheme using bloom filter in VANETs 8(2):9–24
Watson T, Maple C (2017) Cyber security standards and issues in V2X communications 1 Ivan Ivanov, 2 Sang-Woo 9:2–7. http://www.worldresearchlibrary.org/up_proc/pdf/722-14918904992-7.pdf
Nguyen HPD, Zoltán R (2018) The current security challenges of vehicle communication in the future transportation system. In: SISY 2018 - IEEE 16th International Symposium on Intelligent System and Informatics, Proceedings, pp 161–165. https://doi.org/10.1109/SISY.2018.8524773
NHTSA (2014) What are the advantages of V2V?, pp 1–4
Yeomans G (2014) Autonomous vehicles - handing over control: opportunities and risks for insurance, Lloyd’s, pp 1–27
Litman T (2014) Autonomous vehicle implementation predictions: implications for transport planning. Transp Res Board Annu Meet 2014:36–42. https://doi.org/10.1613/jair.301
Anderson J, Kalra N, Stanley K, Sorensen P, Samaras C, Oluwatola O (2016) Autonomous vehicle technology: a guide for policymakers
Corrigan S (2016) Introduction to the Controller Area Network (CAN). In: Texas instruments, August 2002, pp 1–17
Hoppe T, Kiltz S, Dittmann J (2011) Security threats to automotive CAN networks—practical examples and selected short-term countermeasures. Reliab Eng Syst Saf 96(1):11–25. https://doi.org/10.1016/j.ress.2010.06.026
Van Herrewege A, Singelee D, Verbauwhede I (2011) CANAuth - a simple, backward compatible broadcast authentication protocol for CAN bus. In: ECRYPT workshop on lightweight cryptography, November 2011, pp 299–235. http://www.uclouvain.be/crypto/ecrypt_lc11/static/post_proceedings.pdf
Dai NHP, Zoltán R (2012) The obstacles of autonomous cars before taking the wheel in the future 91(5)
Rouf I et al (2010) Security and privacy vulnerabilities of in-car wireless networks: a tire pressure monitoring system case study. Proc. USENIX Secur. Symp. 39(4):11–13. https://doi.org/10.1177/004057368303900411
Seifert S, Obermaisser R (2014) Secure automotive gateway - secure communication for future cars. In: Proc. - 2014 12th IEEE international conference on industrial informatics, INDIN 2014, pp 213–220. https://doi.org/10.1109/INDIN.2014.6945510
Mastakar G (2012) Experimental security analysis of a modern automobile. In: IEEE symposium on security and privacy, pp 1–16. https://doi.org/10.1109/SP.2010.34
Wolf M, Gendrullis T (2012) Design, implementation, and evaluation of a vehicular hardware security module. In: Lecture notes in computer science (including Subseries Lecture notes in artificial intelligence and Lecture notes in bioinformatics). LNCS, vol 7259, pp 302–318. https://doi.org/10.1007/978-3-642-31912-9_20
Adaptive cruise control system. https://en.wikipedia.org/wiki/Autonomous_cruise_control_system
Amoozadeh M et al (2015) Security vulnerabilities of connected vehicle streams and their impact on cooperative driving. IEEE Commun Mag 53(6):126–132. https://doi.org/10.1109/MCOM.2015.7120028
Rao A, Sangwan A, Kherani AA, Varghese A, Bellur B, Shorey R (2007) Secure V2V communication with certificate revocations. In: 2007 mobile networking for vehicular environments movE, pp 127–132. https://doi.org/10.1109/MOVE.2007.4300817
Hasbullah H, Soomro IA, Ab Manan JL (2010) Denial of service (DOS) attack and its possible solutions in VANET. World Acad Sci Eng Technol 65(5):411–415. https://doi.org/10.5281/zenodo.1085740
Lin X, Member S, Sun X, Ho P, Shen XS, Member S, GSIS : a secure and privacy preserving protocol for vehicular communications XX(Xx):1–14
Lipiński B, Mazurczyk W, Szczypiorski K, Śmietanka P (2015) Towards effective security framework for vehicular ad-hoc networks. J Adv Comput Netw 3(2):134–140. https://doi.org/10.7763/JACN.2015.V3.155
Garip MT, Gursoy ME, Reiher P, Gerla M (2015) Congestion attacks to autonomous cars using vehicular botnets. In: NDSS Symposium 2015, pp 1–9. https://doi.org/10.14722/sent.2015.23001
Onishi H (2012) Paradigm change of vehicle cyber security. In: 2012 4th International conference on cyber conflict (CYCON), pp 1–11
Hackers hitch cars. http://www.latimes.com/business/autos/la-fi-hy-car-hacking-20150914-story.html
Bécsi T, Aradi S, Gáspár P (2015) Security issues and vulnerabilities in connected car systems. In: 2015 international conference on models and technologies for intelligent transportation system MT-ITS 2015, April 2016, pp 477–482. https://doi.org/10.1109/MTITS.2015.7223297
Douceur JR (2002) The Sybil attack, pp 251–260. https://doi.org/10.1007/3-540-45748-8_24
Guette G, Bryce C (2008) Using TPMs to secure Vehicular Ad-Hoc Networks (VANETs). In: Lecture notes in computer science (including Subseries Lecture notes in artificial intelligence and Lecture notes in bioinformatics). LNCS, vol 5019, pp 106–116. https://doi.org/10.1007/978-3-540-79966-5_8
Halabi Hasbullah JAM, Soomro A (2010) Denial of Service (DOS) attack and its possible solution in VANET 4(5):813–817
Raghuwanshi V, Jain S (2015) Denial of service attack in VANET: a survey. Int J Eng Trends Technol 28(1):15–20. http://www.ijettjournal.org
Blum J, Eskandarian A (2004) The threat of intelligent collisions. IT Prof 6(1):24–29. https://doi.org/10.1109/MITP.2004.1265539
Rawat A, Sharma S, Sushil R (2014) Vanet: security attacks and its possible solutions. J Inf Oper Manag 3(1):301–304. https://doi.org/10.1007/s13398-014-0173-7.2
Petit J, Stottelaar B, Feiri M, Kargl F (2015) Remote attacks on automated vehicles sensors: experiments on camera and LiDAR, pp 1–13, pp. 1–13. Blackhat.com. https://www.blackhat.com/docs/eu-15/materials/eu-15-Petit-Self-Driving-And-Connected-Cars-Fooling-Sensors-And-Tracking-Drivers-wp1.pdf.
Bai L, Wang Y (2010) A sensor fusion framework using multiple particle filters for video-based navigation. IEEE Trans Intell Transp Syst 11(2):348–358. https://doi.org/10.1109/TITS.2010.2043431
Kong H, Akakin HC, Sarma SE (2013) A generalized laplacian of gaussian filter for blob detection and its applications. IEEE Trans. Cybern. 43(6):1719–1733. https://doi.org/10.1109/TSMCB.2012.2228639
Keller CG, Enzweiler M, Rohrbach M, Llorca DF, Schnörr C, Gavrila DM (2011) The benefits of dense stereo for pedestrian detection. IEEE Trans Intell Transp Syst 12(4):1096–1106
Leinmuller T, Schoch E, Maihofer C (2007) Security requirements and solution concepts in vehicular ad hoc networks. In: 2007 fourth annual conference on wireless demand network systems and services, pp 84–91. https://doi.org/10.1109/WONS.2007.340489
Raya M, Raya M, Hubaux J, Hubaux J (2007) Securing vehicular ad hoc networks. J Comput Secur 15:39–68. https://doi.org/10.1111/j.1523-1755.2002.kid554.x
Raya M, Hubaux JP (2005) Security aspects of inter-vehicle communications. Swiss Transp. Res. Conf. http://en.scientificcommons.org/22427989
Ziari M, Steier WH, Ranon PM, Trivedi S, Klein MB (1992) Photorefractivity in vanadium-doped ZnTe. Appl Phys Lett 60(9):1052–1054. https://doi.org/10.1063/1.106441
Acknowledgements
The research presented in this paper was carried out as part of the EFOP-3.6.2-16-2017-00016 project in the framework of the New Széchenyi Plan. The completion of this project was funded by the European Union and co-financed by the European Social Fund.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Nguyen, H., Zoltán, R. (2022). The Security Concerns and Countermeasures Towards V2V and Autonomous Cars. In: Yang, XS., Sherratt, S., Dey, N., Joshi, A. (eds) Proceedings of Sixth International Congress on Information and Communication Technology. Lecture Notes in Networks and Systems, vol 216. Springer, Singapore. https://doi.org/10.1007/978-981-16-1781-2_48
Download citation
DOI: https://doi.org/10.1007/978-981-16-1781-2_48
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-1780-5
Online ISBN: 978-981-16-1781-2
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)