Cybersecurity for autonomous vehicles: Review of attacks and defense

Kyounggon Kim, Jun Seok Kim, Seonghoon Jeong, Jo Hee Park, Huy Kang Kim

    Research output: Contribution to journalReview articlepeer-review

    304 Citations (Scopus)

    Abstract

    As technology has evolved, cities have become increasingly smart. Smart mobility is a crucial element in smart cities, and autonomous vehicles are an essential part of smart mobility. However, vulnerabilities in autonomous vehicles can be damaging to quality of life and human safety. For this reason, many security researchers have studied attacks and defenses for autonomous vehicles. However, there has not been systematic research on attacks and defenses for autonomous vehicles. In this survey, we analyzed previously conducted attack and defense studies described in 151 papers from 2008 to 2019 for a systematic and comprehensive investigation of autonomous vehicles. We classified autonomous attacks into the three categories of autonomous control system, autonomous driving systems components, and vehicle-to-everything communications. Defense against such attacks was classified into security architecture, intrusion detection, and anomaly detection. Due to the development of big data and communication technologies, techniques for detecting abnormalities using artificial intelligence and machine learning are gradually being developed. Lastly, we provide implications based on our systemic survey that future research on autonomous attacks and defenses is strongly combined with artificial intelligence and major component of smart cities.

    Original languageEnglish
    Article number102150
    JournalComputers and Security
    Volume103
    DOIs
    Publication statusPublished - 2021 Apr

    Bibliographical note

    Publisher Copyright:
    © 2021

    Keywords

    • Autonomous vehicle artificial intelligence security survey
    • Smart city
    • Smart mobility

    ASJC Scopus subject areas

    • General Computer Science
    • Law

    Fingerprint

    Dive into the research topics of 'Cybersecurity for autonomous vehicles: Review of attacks and defense'. Together they form a unique fingerprint.

    Cite this