Potential cyberattacks on automated vehicles
J Petit, SE Shladover - IEEE Transactions on Intelligent …, 2014 - ieeexplore.ieee.org
J Petit, SE Shladover
IEEE Transactions on Intelligent transportation systems, 2014•ieeexplore.ieee.orgVehicle automation has been one of the fundamental applications within the field of
intelligent transportation systems (ITS) since the start of ITS research in the mid-1980s. For
most of this time, it has been generally viewed as a futuristic concept that is not close to
being ready for deployment. However, recent development of “self-driving” cars and the
announcement by car manufacturers of their deployment by 2020 show that this is becoming
a reality. The ITS industry has already been focusing much of its attention on the concepts of …
intelligent transportation systems (ITS) since the start of ITS research in the mid-1980s. For
most of this time, it has been generally viewed as a futuristic concept that is not close to
being ready for deployment. However, recent development of “self-driving” cars and the
announcement by car manufacturers of their deployment by 2020 show that this is becoming
a reality. The ITS industry has already been focusing much of its attention on the concepts of …
Vehicle automation has been one of the fundamental applications within the field of intelligent transportation systems (ITS) since the start of ITS research in the mid-1980s. For most of this time, it has been generally viewed as a futuristic concept that is not close to being ready for deployment. However, recent development of “self-driving” cars and the announcement by car manufacturers of their deployment by 2020 show that this is becoming a reality. The ITS industry has already been focusing much of its attention on the concepts of “connected vehicles” (United States) or “cooperative ITS” (Europe). These concepts are based on communication of data among vehicles (V2V) and/or between vehicles and the infrastructure (V2I/I2V) to provide the information needed to implement ITS applications. The separate threads of automated vehicles and cooperative ITS have not yet been thoroughly woven together, but this will be a necessary step in the near future because the cooperative exchange of data will provide vital inputs to improve the performance and safety of the automation systems. Thus, it is important to start thinking about the cybersecurity implications of cooperative automated vehicle systems. In this paper, we investigate the potential cyberattacks specific to automated vehicles, with their special needs and vulnerabilities. We analyze the threats on autonomous automated vehicles and cooperative automated vehicles. This analysis shows the need for considerably more redundancy than many have been expecting. We also raise awareness to generate discussion about these threats at this early stage in the development of vehicle automation systems.
ieeexplore.ieee.org