A Holistic Approach to Cybersecurity Integration in Autonomous Vehicles

Chandana R M
{"title":"A Holistic Approach to Cybersecurity Integration in Autonomous Vehicles","authors":"Chandana R M","doi":"10.55041/ijsrem34426","DOIUrl":null,"url":null,"abstract":"The breakthrough of the self-driving car technology is a double-edged sword that gives us incredible opportunities and at the same time, it is the source of huge cybersecurity challenges. This paper champions the creation of a complete legal system and worldwide standards, like the ISO 26262, to regulate different parts of the autonomous vehicle (AV) operations, such as safety testing, liability, data privacy, and cybersecurity. By highlighting the significance of cybersecurity from the very start, the stakeholders and the automakers have to incorporate the practices like secure programming, routine updates, intrusion detection systems and encryption methods which will be the effective shield against the unauthorized access and data breaches. People should be informed and educated about the cybersecurity risks of AVs so that they can take the steps to protect themselves. Nevertheless, the integration of AVs with the Internet of Things (IoT) and other devices makes the cybersecurity landscape even more complicated, which means that there is a constant need for research and development to deal with problems like adversarial attacks. Presently, the deep learning-driven AV systems do not have the explainability which complicates the safety-critical applications, hence the need to increase the resilience training and deepen the deep learning models against attacks. The paper goes through all the literature on AV cybersecurity which stresses the need for functional safety standards and cybersecurity engineering guidelines. Collaboration between the governments, the industry, and the researchers is a must to set the legal foundations and the technical details for the AV cybersecurity across all levels of automation. Finally, solid cybersecurity is the key to the success of the autonomous vehicle revolution, hence the road to transformative safety, efficiency, and sustainability is paved. INDEX TERMS: Autonomous vehicles, Cybersecurity, ISO 26262, Encryption methods, ISO 21434, EU regulations, Security and Privacy.","PeriodicalId":13661,"journal":{"name":"INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT","volume":"49 4","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.55041/ijsrem34426","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The breakthrough of the self-driving car technology is a double-edged sword that gives us incredible opportunities and at the same time, it is the source of huge cybersecurity challenges. This paper champions the creation of a complete legal system and worldwide standards, like the ISO 26262, to regulate different parts of the autonomous vehicle (AV) operations, such as safety testing, liability, data privacy, and cybersecurity. By highlighting the significance of cybersecurity from the very start, the stakeholders and the automakers have to incorporate the practices like secure programming, routine updates, intrusion detection systems and encryption methods which will be the effective shield against the unauthorized access and data breaches. People should be informed and educated about the cybersecurity risks of AVs so that they can take the steps to protect themselves. Nevertheless, the integration of AVs with the Internet of Things (IoT) and other devices makes the cybersecurity landscape even more complicated, which means that there is a constant need for research and development to deal with problems like adversarial attacks. Presently, the deep learning-driven AV systems do not have the explainability which complicates the safety-critical applications, hence the need to increase the resilience training and deepen the deep learning models against attacks. The paper goes through all the literature on AV cybersecurity which stresses the need for functional safety standards and cybersecurity engineering guidelines. Collaboration between the governments, the industry, and the researchers is a must to set the legal foundations and the technical details for the AV cybersecurity across all levels of automation. Finally, solid cybersecurity is the key to the success of the autonomous vehicle revolution, hence the road to transformative safety, efficiency, and sustainability is paved. INDEX TERMS: Autonomous vehicles, Cybersecurity, ISO 26262, Encryption methods, ISO 21434, EU regulations, Security and Privacy.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
自动驾驶汽车网络安全集成的整体方法
自动驾驶汽车技术的突破是一把双刃剑,在给我们带来巨大机遇的同时,也带来了巨大的网络安全挑战。本文倡导建立完整的法律体系和世界性标准,如 ISO 26262,以规范自动驾驶汽车(AV)运营的各个环节,如安全测试、责任、数据隐私和网络安全。通过从一开始就强调网络安全的重要性,利益相关者和汽车制造商必须将安全编程、例行更新、入侵检测系统和加密方法等做法纳入其中,从而有效防止未经授权的访问和数据泄露。人们应该了解和认识到自动驾驶汽车的网络安全风险,以便采取措施保护自己。然而,自动驾驶汽车与物联网(IoT)和其他设备的整合使网络安全形势变得更加复杂,这意味着需要不断研发以应对对抗性攻击等问题。目前,深度学习驱动的视听系统不具备可解释性,这使得安全关键型应用变得更加复杂,因此有必要增加复原力训练,深化深度学习模型以应对攻击。本文详述了有关视听网络安全的所有文献,强调了功能安全标准和网络安全工程指南的必要性。政府、行业和研究人员之间必须开展合作,为各级自动化的视听网络安全制定法律基础和技术细节。最后,坚实的网络安全是自动驾驶汽车革命取得成功的关键,从而为实现安全、高效和可持续的变革铺平道路。索引词条:自动驾驶汽车、网络安全、ISO 26262、加密方法、ISO 21434、欧盟法规、安全与隐私。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Exploring Vulnerabilities and Threats in Large Language Models: Safeguarding Against Exploitation and Misuse Experimental Investigation of Leachate Treatment Using Low-Cost Adsorbents Exploring Vulnerabilities and Threats in Large Language Models: Safeguarding Against Exploitation and Misuse BANK TRANSACTION USING IRIS AND BIOMETRIC Experimental Investigation of Leachate Treatment Using Low-Cost Adsorbents
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1