Autonomous Vehicles: The Cybersecurity Vulnerabilities and Countermeasures for Big Data Communication

被引:8
|
作者
Algarni, Abdullah [1 ]
Thayananthan, Vijey [1 ]
机构
[1] King Abdulaziz Univ, Comp Sci Dept, Jeddah 21589, Saudi Arabia
来源
SYMMETRY-BASEL | 2022年 / 14卷 / 12期
关键词
cybersecurity vulnerabilities; autonomous vehicles; vehicular communications; security solutions; CYBER-SECURITY; ATTACK;
D O I
10.3390/sym14122494
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
The possible applications of communication based on big data have steadily increased in several industries, such as the autonomous vehicle industry, with a corresponding increase in security challenges, including cybersecurity vulnerabilities (CVs). The cybersecurity-related symmetry of big data communication systems used in autonomous vehicles may raise more vulnerabilities in the data communication process between these vehicles and IoT devices. The data involved in the CVs may be encrypted using an asymmetric and symmetric algorithm. Autonomous vehicles with proactive cybersecurity solutions, power-based cyberattacks, and dynamic countermeasures are the modern issues/developments with emerging technology and evolving attacks. Research on big data has been primarily focused on mitigating CVs and minimizing big data breaches using appropriate countermeasures known as security solutions. In the future, CVs in data communication between autonomous vehicles (DCAV), the weaknesses of autonomous vehicular networks (AVN), and cyber threats to network functions form the primary security issues in big data communication, AVN, and DCAV. Therefore, efficient countermeasure models and security algorithms are required to minimize CVs and data breaches. As a technique, policies and rules of CVs with proxy and demilitarized zone (DMZ) servers were combined to enhance the efficiency of the countermeasure. In this study, we propose an information security approach that depends on the increasing energy levels of attacks and CVs by identifying the energy levels of each attack. To show the results of the performance of our proposed countermeasure, CV and energy consumption are compared with different attacks. Thus, the countermeasures can secure big data communication and DCAV using security algorithms related to cybersecurity and effectively prevent CVs and big data breaches during data communication.
引用
收藏
页数:19
相关论文
共 50 条
  • [1] Cybersecurity Oriented Architecture to Ensure the Autonomous Vehicles Communication
    Sersemis, Athanasios
    Papadopoulos, Alexandros
    Spanos, Georgios
    Lalas, Antonios
    Votis, Konstantinos
    Tzovaras, Dimitrios
    2023 31ST MEDITERRANEAN CONFERENCE ON CONTROL AND AUTOMATION, MED, 2023, : 119 - 124
  • [2] A Review of Cybersecurity Challenges and Solutions for Autonomous Vehicles
    Coulibaly, Lasseni
    Hanyurwimfura, Damien
    Twahirwa, Evariste
    Diwani, Abubakar
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2025, 16 (02) : 850 - 866
  • [3] Roadmap for Cybersecurity in Autonomous Vehicles
    Kukkala, Vipin Kumar
    Thiruloga, Sooryaa Vignesh
    Pasricha, Sudeep
    IEEE CONSUMER ELECTRONICS MAGAZINE, 2022, 11 (06) : 13 - 22
  • [4] Cybersecurity Simulator for Connected and Autonomous Vehicles
    Folan, Sean
    Wang, Yunsheng
    PROCEEDINGS OF THE 2023 INTERNATIONAL SYMPOSIUM ON THEORY, ALGORITHMIC FOUNDATIONS, AND PROTOCOL DESIGN FOR MOBILE NETWORKS AND MOBILE COMPUTING, MOBIHOC 2023, 2023, : 430 - 435
  • [5] Dynamic Watermarking for Cybersecurity of Autonomous Vehicles
    Shangguan, Lantian
    Chour, Kenny
    Ko, Woo Hyun
    Kim, Jaewon
    Kamath, Gopal Krishna
    Satchidanandan, Bharadwaj
    Gopalswamy, Swaminathan
    Kumar, P. R.
    IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2023, 70 (11) : 11735 - 11743
  • [6] Human Factors in the Cybersecurity of Autonomous Vehicles: Trends in Current Research
    Linkov, Vaclav
    Zamecnik, Petr
    Havlickova, Darina
    Pai, Chih-Wei
    FRONTIERS IN PSYCHOLOGY, 2019, 10
  • [7] Cybersecurity Digital Labels for Connected and Autonomous Vehicles
    Khan, Wazir Zada
    Khan, Muhammad Khurram
    Arshad, Qurat-ul-Ain
    IEEE CONSUMER ELECTRONICS MAGAZINE, 2023, 12 (01) : 87 - 93
  • [8] Proposal of big data route selection methods for autonomous vehicles
    Reddig, Klaudia
    Dikunow, Blazej
    Krzykowska, Karolina
    INTERNET TECHNOLOGY LETTERS, 2018, 1 (05):
  • [9] Cybersecurity in Autonomous Vehicles-Are We Ready for the Challenge?
    Durlik, Irmina
    Miller, Tymoteusz
    Kostecka, Ewelina
    Zwierzewicz, Zenon
    Lobodzinska, Adrianna
    ELECTRONICS, 2024, 13 (13)
  • [10] A Review of Cybersecurity in Grid-Connected Power Electronics Converters: Vulnerabilities, Countermeasures, and Testbeds
    Fu, Ruiyun
    Lichtenwalner, Mary E.
    Johnson, Thomas J.
    IEEE ACCESS, 2023, 11 : 113543 - 113559