Skip to main content

Security and Privacy in Intelligent Autonomous Vehicles

Abstract

In this chapter, we mostly focus on cybersecurity and privacy in intelligent and autonomous vehicles (IAV). This chapter starts with the basics of cryptography and then proceeds to different types of advanced security and encryption schemes that can be used in autonomous vehicles. The cyber security in intelligent and autonomous vehicles can be a combination of physical security, information security, security elements, policies, standards, legislation, and risk mitigation strategies. We introduced the updated cybersecurity framework that provides a specific categorization and structural framework for institutions to describe their current cybersecurity position, state for cybersecurity, identify and prioritize security improvements, assess security progress, and plan concerning cybersecurity risks. Then, we discuss about the five key technological cybersecurities to protect any company, organization, and IAV against a cyber-attacks. A threat modeling method (TMM) is also required to investigate the potential threats so that the IAV system is fully secured from unknown attacks. The TMM is used to defend the cyber-physical system from attackers and detect the threats before they create severe damage. Some of the examples of TMM are STRIDE, PASTA, VAST, etc. The vulnerability is the weak point in the scheme that is misused by the malicious attacker in the form of attacks for their own advantages. We discuss some of the taxonomy that can be found in vehicular system such as autonomous vehicle vulnerability taxonomy, defense taxonomy, and privacy taxonomy.

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   159.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. M.P. Babitha, K.R.R. Babu, Secure cloud storage using AES encryption, in 2016 International Conference on Automatic Control and Dynamic Optimization Techniques (ICACDOT) (2016), pp. 859–864

    Google Scholar 

  2. L. Batina, J. Lano, N. Mentens, S.B. Ors, B. Preneel, I. Verbauwhede, Energy, performance, area versus security trade-offs for stream ciphers, in The State of the Art of Stream Ciphers: Workshop Record, Brugge (2004), pp. 302–310

    Google Scholar 

  3. M. Bafandehkar, S.M. Yasin, R. Mahmod, Z.M. Hanapi, Comparison of ECC and RSA algorithm in resource constrained devices, in 2013 International Conference on IT Convergence and Security (ICITCS) (2013), pp. 1–3

    Google Scholar 

  4. C. Gentry, A Fully Homomorphic Encryption Scheme (Stanford University, 2009)

    Google Scholar 

  5. A. Acar, H. Aksu, A.S. Uluagac, M. Conti, A Survey on homomorphic encryption schemes. ACM Comput. Surv. 51(4), 1–35 (2018)

    CrossRef  Google Scholar 

  6. G. De La Torre, P. Rad, K.K.R. Choo, Driverless vehicle security: Challenges and future research opportunities. Future Gener. Comput. Syst. (2018)

    Google Scholar 

  7. NIST, Framework for Improving Critical Infrastructure Cybersecurity V1.1 (2016)

    Google Scholar 

  8. P. Bedi, V. Gandotra, A. Singhal, H. Narang, S. Sharma, Threat-oriented security framework in risk management using multiagent system. Softw. Pract. Exp. 43(9), 1013–1038 (2013)

    CrossRef  Google Scholar 

  9. N. Shevchenko, B.R. Frye, C. Woody, Threat Modeling for Cyber-Physical System-of-Systems: Methods Evaluation (September, 2018)

    Google Scholar 

  10. Microsoft, Threat Modeling for Drivers. [Online]. Available: https://docs.microsoft.com/en-us/windows-hardware/drivers/driversecurity/threat-modeling-for-drivers [Accessed: 10-Mar-2020] (2018)

  11. A. Karahasanovic, P. Kleberger, M. Almgren, Chalmers Publication Library Adapting Threat Modeling Methods for the Automotive Industry Adapting Threat Modeling Methods for the Automotive Industry (2017), pp. 1–10

    Google Scholar 

  12. W. Xiong, F. Krantz, R. Lagerström, Threat modeling and attack simulations of connected vehicles: A research outlook,” ICISSP 2019 Proc. 5th Int. Conf. Inf. Syst. Secur. Priv. 479–486 (2019)

    Google Scholar 

  13. D.P.F. Möller, R.E. Haas, Guide to Automotive Connectivity and Cybersecurity (2019)

    Google Scholar 

  14. C. Ebert, E. Metzker, Functional safety and cyber-security—experiences and trends. Funct. Saf. Symp. 1–25 (2018)

    Google Scholar 

  15. A. Greenberg, Hackers remotely kill a jeep on the highway—with me in it. Wired [Online]. Available: https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/. [Accessed: 23-Aug-2019] (2015)

  16. V.L.L. Thing, J. Wu, Autonomous vehicle security: A taxonomy of attacks and defences, in 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData) (2016), pp. 164–170

    Google Scholar 

  17. S. Jadhav, D. Kshirsagar, A survey on security in automotive networks, in 2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA) (2018), pp. 1–6

    Google Scholar 

  18. K. Mawonde, B. Isong, F. Lugayizi, and A. M. Abu-Mahfouz, “A Survey on Vehicle Security Systems: Approaches and Technologies,” in IECON 201844th Annual Conference of the IEEE Industrial Electronics Society (2018), pp. 4633–4638

    Google Scholar 

  19. M.R. Moore, R.A. Bridges, F.L. Combs, M.S. Starr, S.J. Prowell, Modeling inter-signal arrival times for accurate detection of CAN bus signal injection attacks: A data-driven approach to in-vehicle intrusion detection, in Proceedings of the 12th Annual Conference on Cyber and Information Security Research (CISRC ’17) (2017), pp. 1–4

    Google Scholar 

  20. C. Sun, J. Liu, X. Xu, J. Ma, A privacy-preserving mutual authentication resisting DoS attacks in VANETs. IEEE Access 5, 24012–24022 (2017)

    CrossRef  Google Scholar 

  21. U. Rajput, F. Abbas, H. Eun, R. Hussain, H. Oh, A two level privacy preserving pseudonymous authentication protocol for VANET, in 2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob) (2015), pp. 643–650

    Google Scholar 

  22. C. Zhang, P.-H. Ho, J. Tapolcai, On batch verification with group testing for vehicular communications. Wirel. Netw. 17(8), 1851–1865 (2011)

    CrossRef  Google Scholar 

  23. M. Raya, J. Hubaux, Securing Vehicular Ad Hoc Networks, vol. 15 (2007), pp. 39–68

    Google Scholar 

  24. J. Guo, J.P. Baugh, S. Wang, J. Guo, J.P. Baugh, S. Wang, A Group Signature Based Secure and Privacy- Preserving Vehicular Communication Framework, (May, 2007)

    Google Scholar 

  25. X. Lin, X. Sun, X. Wang, C. Zhang, P. Ho, X. Shen, TSVC: Timed efficient and secure vehicular communications with privacy preserving. IEEE Trans. Wirel. Commun. 7(12), 4987–4998 (2008)

    CrossRef  Google Scholar 

  26. X. Lin, S. Member, X. Sun, P. Ho, GSIS : A Secure and Privacy-Preserving Protocol for Vehicular Communications, vol. 56, no. 6 (2007), pp. 3442–3456

    Google Scholar 

  27. R. Shrestha, S.Y. Nam, Trustworthy event-information dissemination in vehicular Ad Hoc networks, Mob. Inf. Syst. vol. 2017 (2017)

    Google Scholar 

  28. M. Raya, P. Papadimitratos, V.D. Gligor, J. Hubaux, On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks (2007)

    Google Scholar 

  29. M. Raya, A. Aziz, J. Hubaux, Efficient Secure Aggregation in VANETs (2006), pp. 67–75

    Google Scholar 

  30. Z. Liu, J. Ma, Z. Jiang, H. Zhu, Y. Miao, LSOT: A lightweight self-organized trust model in VANETs. Mob. Inf. Syst. 2016, 18–22 (2016)

    Google Scholar 

  31. D. Florian, L. Fischer, P. Magiera, VARS : A Vehicle Ad-Hoc Network Reputation System (2005), pp. 0–2

    Google Scholar 

  32. D. Communications, A New-Type of Blockchain for Secure Message Exchange in VANET

    Google Scholar 

  33. Y. Park, C. Sur, K.-H. Rhee, A secure incentive scheme for vehicular delay tolerant networks using cryptocurrency. Secur. Commun. Netw. 2018, 5932183 (2018)

    Google Scholar 

  34. B. Leiding, P. Memarmoshrefi, D. Hogrefe, Self-managed and blockchain-based vehicular ad-hoc networks, Proc. 2016 ACM Int. Jt. Conf. Pervasive Ubiquitous Comput. Adjun.—UbiComp ’16, no. January (2016), pp. 137–140

    Google Scholar 

  35. S. Rowan, M. Clear, M. Gerla, M. Huggard, C. Mc Goldrick, Securing vehicle to vehicle communications using blockchain through visible light and acoustic side-channels, eprint arXiv:1704.02553

  36. A. Tesei, L. Di Mauro, M. Falcitelli, S. Noto, P. Pagano, IOTA-VPKI: A DLT-based and resource efficient vehicular public key infrastructure, in 2018 IEEE 88th Vehicular Technology Conference (VTC-Fall) (2018), pp. 1–6

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shiho Kim .

Rights and permissions

Reprints and Permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Kim, S., Shrestha, R. (2020). Security and Privacy in Intelligent Autonomous Vehicles . In: Automotive Cyber Security. Springer, Singapore. https://doi.org/10.1007/978-981-15-8053-6_3

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-8053-6_3

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-8052-9

  • Online ISBN: 978-981-15-8053-6

  • eBook Packages: EngineeringEngineering (R0)