Cyber Security and Risk Analysis on Connected Autonomous Vehicles

Authors

  • Jonnalagadda. Surya Kiran, Pranay Reddy Jakkala

Abstract

The terms connectivity and automation have gained a lot of attention in the modern world, one among the applications for these terms is the concept of connected vehicles. Indulging the terms of connectivity, computation and sensing, generating rich data, dynamic changes in the area of transportation, vehicle human dynamics, improvement in the environment and economy is quite very possible by using connected vehicles as the platforms. The mechanisms and the technology that is being used in connected vehicles is to increase the safety and also the efficiency of travel and additionally with some emerging technologies for generating, sharing, and also to processes and act accordingly for the data that a vehicle receives. Though the demand for the connected vehicles had kept on increasing by time, there are many challenges from scalability to security and privacy that are to be answered before deploying a fully potential vehicle into the real world. Humans were being allowed to connect the external devices and infrastructure to the vehicles information system with the additional functionality of internet, thus making the attacking area larger than ever. Thus, security is the major area to concentrate in the field of connected vehicles. Malwares are being created by the attackers to attack on the vehicles which will in-turn result in life threat. Therefore, making sure the connected vehicles software security and also the network is much needed for building confidence in the consumer’s mind. This paper gives a summary on new era of development in the area of the connected vehicles security and privacy and deep down gives an insight about the identified knowledge gaps [5] that are to be addressed to reduce the security attacks on the autonomous vehicles, by reviewing the publicly accessible literature and experimental analysis. I believe that this work will be useful for the automobile makers to protect their systems from malware and also gives a guideline for the future research work.

Published

2020-11-01

Issue

Section

Articles