Cybersecurity for autonomous vehicles: Review of attacks and defense

Kyounggon Kim, Jun Seok Kim, Seonghoon Jeong, Jo Hee Park, Huy Kang Kim

Research output: Contribution to journalReview articlepeer-review

198 Citations (Scopus)


As technology has evolved, cities have become increasingly smart. Smart mobility is a crucial element in smart cities, and autonomous vehicles are an essential part of smart mobility. However, vulnerabilities in autonomous vehicles can be damaging to quality of life and human safety. For this reason, many security researchers have studied attacks and defenses for autonomous vehicles. However, there has not been systematic research on attacks and defenses for autonomous vehicles. In this survey, we analyzed previously conducted attack and defense studies described in 151 papers from 2008 to 2019 for a systematic and comprehensive investigation of autonomous vehicles. We classified autonomous attacks into the three categories of autonomous control system, autonomous driving systems components, and vehicle-to-everything communications. Defense against such attacks was classified into security architecture, intrusion detection, and anomaly detection. Due to the development of big data and communication technologies, techniques for detecting abnormalities using artificial intelligence and machine learning are gradually being developed. Lastly, we provide implications based on our systemic survey that future research on autonomous attacks and defenses is strongly combined with artificial intelligence and major component of smart cities.

Original languageEnglish
Article number102150
JournalComputers and Security
Publication statusPublished - 2021 Apr

Bibliographical note

Publisher Copyright:
© 2021


  • Autonomous vehicle artificial intelligence security survey
  • Smart city
  • Smart mobility

ASJC Scopus subject areas

  • General Computer Science
  • Law


Dive into the research topics of 'Cybersecurity for autonomous vehicles: Review of attacks and defense'. Together they form a unique fingerprint.

Cite this