Cybersecurity in Autonomous Vehicles: A Comprehensive Review Study of Cyber-Attacks and AI-Based Solutions

Cybersecurity in Autonomous Vehicles: A Comprehensive Review Study of Cyber-Attacks and AI-Based Solutions

  IJETT-book-cover           
  
© 2024 by IJETT Journal
Volume-72 Issue-1
Year of Publication : 2024
Author : Guirrou Hamza, Youssef Taher, Mohamed Zeriab Es-sadek, Amal Tmiri
DOI : 10.14445/22315381/IJETT-V72I1P111

How to Cite?

Guirrou Hamza, Youssef Taher, Mohamed Zeriab Es-sadek, Amal Tmiri, "Cybersecurity in Autonomous Vehicles: A Comprehensive Review Study of Cyber-Attacks and AI-Based Solutions," International Journal of Engineering Trends and Technology, vol. 72, no. 1, pp. 101-116, 2023. Crossref, https://doi.org/10.14445/22315381/IJETT-V72I1P111

Abstract
Cyber-attacks on autonomous vehicles (AVs) are becoming increasingly sophisticated and pose serious risks, including loss of control of the vehicle or compromise of personal data. Preventing intrusion into AV systems requires protecting against various cyberattacks by adopting appropriate countermeasures. One of these advanced countermeasures is using artificial intelligence (AI) technologies as an efficient and effective solution for AV security. Thanks to the increasing prevalence of AI, AV systems can detect, prevent, and mitigate attacks more efficiently than traditional software-driven approaches. In this context, the goal of this paper is to present a summary of recent developments in AI-based cybersecurity for AVs in order to identify knowledge gaps and provide recommendations for future studies. We discuss the relevant standards and regulations related to cybersecurity in AVs. We examine the high-risk AV components that are vulnerable to cybersecurity attacks. Furthermore, we review the most critical cyber-attacks that may affect these critical systems and their possible AI-based cybersecurity solutions.

Keywords
Cybersecurity, Artificial Intelligence, Autonomous vehicles.

References
[1] Teodora Mecheva, and Nikolay Kakanakov, “Cybersecurity in Intelligent Transportation Systems,” Computers, vol. 9, no. 4, pp. 1-12, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Prinkle Sharma, and James Gillanders, “Cybersecurity and Forensics in Connected Autonomous Vehicles: A Review of the State-ofthe-Art,” IEEE Access, vol. 10, pp. 108979-108996, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Mansi Girdhar, Junho Hong, and John Moore, “Cybersecurity of Autonomous Vehicles: A Systematic Literature Review of Adversarial Attacks and Defense Models,” IEEE Open Journal of Vehicular Technology, vol. 4, pp. 417-437, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Gueltoum Bendiab et al., “Autonomous Vehicles Security: Challenges and Solutions Using Blockchain and Artificial Intelligence,” IEEE Transactions on Intelligent Transportation Systems, vol. 24, no. 4, pp. 3614-3637, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Bhavesh Raju Mudhivarth, Prabhat Thakur, and Ghanshyam Singh, “Aspects of Cyber Security in Autonomous and Connected Vehicles,” Computers, vol. 13, no. 5, pp. 1-20, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Shah Khalid Khan et al., “Cyber-Attacks in the Next-Generation Cars, Mitigation Techniques, Anticipated Readiness and Future Directions,” Accident Analysis & Prevention, vol. 148, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Tian Guan et al., “An Overview of Vehicular Cybersecurity for Intelligent Connected Vehicles,” Sustainability, vol. 14, no. 9, pp. 1- 17, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Zhendong Wang et al., “Security Issues and Solutions for Connected and Autonomous Vehicles in a Sustainable City: A Survey,” Sustainability, vol. 14, no. 19, pp. 1-29, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Mahdi Dibaei et al., “An Overview of Attacks and Defences on Intelligent Connected Vehicles,” arXiv, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[10] McCarthy Charlie et al., “Assessment of the Information Sharing and Analysis Center Model,” (Report No. DOT HS 812 076) Washington, DC: National Highway Traffic Safety Administration, 2014.
[Google Scholar] [Publisher Link]
[11] Wilson Joe, H.R.701 - 115th Congress (2017-2018): SPY Car Study Act of 2017, 2019. [Online]. Available: https://www.congress.gov/bill/115th-congress/house-bill/701/all-info?s=1&r=84
[12] Sasan Jafarnejad et al., “A Car Hacking Experiment: When Connectivity Meets Vulnerability,” IEEE Globecom Workshops (GC Wkshps), San Diego, CA, USA, pp. 1-6, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Subir Halder, Amrita Ghosal, and Mauro Conti, “Secure OTA Software Updates in Connected Vehicles: A Survey,” arXiv Preprint, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Mikhail Buinevich, and Andrei Vladyko, “Forecasting Issues of Wireless Communication Networks’ Cyber Resilience for an Intelligent Transportation System: An Overview of Cyber Attacks,” Information, vol. 10, no. 1, pp. 1-22, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Muhammad Sameer Sheikh, Jun Liang, and Wensong Wang, “Security and Privacy in Vehicular Ad Hoc Network and Vehicle Cloud Computing: A Survey,” Wireless Communications and Mobile Computing, vol. 2020, pp. 1-25, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Boris Svilicic et al., “A Study on Cyber Security Threats in a Shipboard Integrated Navigational System,” Journal of Marine Science and Engineering, vol. 7, no. 10, pp. 1-11, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[17] A. Rustamov, K. Sharipov, and T. Pulatov, “Vulnerability Analysis of Emergency Response System Based on Navigational Units in Case of Vehicle Accidents,” Technical Science and Innovation, vol. 2020, no. 2, pp. 14-18, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Géza Dévényi, “Functional Safety of Road Vehicle Infotainment Systems,” Safety and Security Sciences Review, vol. 2, no. 1, pp. 39- 48, 2020.
[Google Scholar] [Publisher Link]
[19] Emad Aliwa et al., “Cyberattacks and Countermeasures for In-Vehicle Networks,” ACM Computing Surveys, vol. 54, no. 1, pp. 1-37, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Narayan Khatri, Rakesh Shrestha, and Seung Yeob Nam, “Security Issues with In-Vehicle Networks, and Enhanced Countermeasures Based on Blockchain,” Electronics, vol. 10, no. 8, pp. 1-33, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Zeinab El-Rewini et al., “Cybersecurity Attacks in Vehicular Sensors,” IEEE Sensors Journal, vol. 20, no. 22, pp. 13752-13767, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[22] L. Erhan et al., “Smart Anomaly Detection in Sensor Systems: A Multi-Perspective Review,” Information Fusion, vol. 67, pp. 64-79, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[23] Kyounggon Kim et al., “Cybersecurity for Autonomous Vehicles: Review of Attacks and Defense,” Computers & Security, vol. 103, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[24] Beniel Dennyson, and C. Jothikumar, “A Review on Controller Area Network and Electronic Control Unit in Automotive Environment,” Journal of Positive School Psychology, vol. 6, no. 4, pp. 269-277, 2022.
[Google Scholar] [Publisher Link]
[25] Hamza Khemissa, and Pascal Urien, “Centralized Architecture for ECU Security Management in Connected and Autonomous Vehicles,” 13th International Conference on Information and Communication Technology Convergence (ICTC), Jeju Island, Korea, Republic of, pp. 1409-1414, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[26] Jianan Lyu, Zalay Abdul Aziz, and Nor Syazwani Binti Mat Salleh, “A Study of Trends on Human-Machine Interface Design in Modern Vehicles,” Scientific Programming, vol. 2022, pp. 1-9, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[27] Kang Wang, “Human-Computer Interaction Design of Intelligent Vehicle-Mounted Products Based on the Internet of Things,” Mobile Information Systems, vol. 2021, pp. 1-12, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[28] Muhammad Umar Javed et al., “Blockchain-Based Secure Data Storage for Distributed Vehicular Networks,” Applied Sciences, vol. 10, no. 6, pp. 1-22, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[29] Shahid Mahmood et al., “A Model-Based Security Testing Approach for Automotive Over-The-Air Updates,” IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW), Porto, Portugal, pp. 6-13, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[30] James Howden, Leandros Maglaras, and Mohamed Amine Ferrag, “The Security Aspects of Automotive Over-the-Air Updates,” International Journal of Cyber Warfare and Terrorism, vol. 10, no. 2, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[31] Zouhair Elamrani Abou Elassad et al., “The Application of Machine Learning Techniques for Driving Behavior Analysis: A Conceptual Framework and A Systematic Literature Review,” Engineering Applications of Artificial Intelligence, vol. 87, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[32] Road Vehicles — Cybersecurity Engineering, ISO/SAE 21434, 2021. [Online]. Available: https://www.iso.org/standard/70918.html
[33] Cybersecurity Guidebook for Cyber-Physical Vehicle Systems - J3061_201601, 2016. [Online]. Available: https://www.sae.org/standards/content/j3061_201601/
[34] Joint Task Force, “NIST SP 800-53 Rev. 5, Security and Privacy Controls for Information Systems and Organizations,” Computer Security Resource Center, 2017.
[Google Scholar] [Publisher Link]
[35] UN Regulation No. 155 - Uniform Provisions Concerning the Approval of Vehicles with Regards to Cyber Security and Cyber Security Management System, 2021. [Online]. Available: https://op.europa.eu/en/publication-detail/-/publication/a5081378-8079-11eb-9ac9- 01aa75ed71a1
[36] International Electrotechnical Commission, Security for Industrial Automation and Control Systems – Part 4-2: Technical Security Requirements for IACS Components, IEC 62443-4-2, 2019. [Online]. Available: https://webstore.iec.ch/cart&d=Fri%20Dec%2015%202023%2015:45:47%20GMT+0530%20(India%20Standard%20Time)
[37] UL 4600: Standard for Safety for the Evaluation of Autonomous Products, 2020. [Online]. Available: https://users.ece.cmu.edu/~koopman/ul4600/index.html#:~:text=of%20Autonomous%20Products- ,UL%204600%3A%20Standard%20for%20Safety%20for%20the%20Evaluation%20of%20Autonomous,second%20edition%20issue d%20March%202022.
[38] Markus Zoppelt, and Ramin Tavakoli Kolagari, “UnCle SAM: Modeling Cloud Attacks with the Automotive Security Abstraction Model,” The Tenth International Conference on Cloud Computing, GRIDs, and Virtualization, Cloud Computing, 2019.
[Google Scholar] [Publisher Link]
[39] Sekar Kulandaivel et al., “Cannon: Reliable and Stealthy Remote Shutdown Attacks via Unaltered Automotive Microcontrollers,” IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, pp. 195-210, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[40] Rony Komissarov, and Avishai Wool, “Spoofing Attacks Against Vehicular FMCW Radar,” Proceedings of the 5th Workshop on Attacks and Solutions in Hardware Security, pp. 91-97, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[41] Rohith Reddy Vennam et al., “mmSpoof: Resilient Spoofing of Automotive Millimeter-wave Radars using Reflect Array,” IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, pp. 1807-1821, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[42] Nataša Trkulja, David Starobinski, and Randall A. Berry, “Denial-of-Service Attacks on C-V2X Networks,” arXiv, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[43] Yulei Wang et al., “Resilient Path-Following Control of Autonomous Vehicles Subject to Intermittent Denial-of-Service Attacks,” IET Intelligent Transport Systems, vol. 15, no. 12, pp. 1508-1521, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[44] Aiman Al-Sabaawi et al., “Addressing Malware Attacks on Connected and Autonomous Vehicles: Recent Techniques and Challenges,” Malware Analysis Using Artificial Intelligence and Deep Learning, Springer Link, pp. 97–119, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[45] Sana Aurangzeb et al., “CyberSecurity for Autonomous Vehicles Against Malware Attacks in Smart-Cities,” Cluster Computing, pp. 1-16, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[46] Zhi Sun et al., “Who is in Control? Practical Physical Layer Attack and Defense for mmWave based Sensing in Autonomous Vehicles,” IEEE Transactions on Information Forensics and Security, vol. 16, pp. 3199-3214, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[47] Yulong Cao et al., “Invisible for both Camera and LiDAR: Security of Multi-Sensor Fusion based Perception in Autonomous Driving under Physical-World Attacks,” IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, pp. 176-194, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[48] Ali Krayani et al., “Integrated Sensing and Communication for Joint GPS Spoofing and Jamming Detection in Vehicular V2X Networks,” 2023 IEEE Wireless Communications and Networking Conference (WCNC), Glasgow, United Kingdom, pp. 1-7, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[49] Mohsin Kamal et al., “GPS Location Spoofing Attack Detection for Enhancing the Security of Autonomous Vehicles,” IEEE 94th Vehicular Technology Conference (VTC2021-Fall), Norman, OK, USA, pp. 1-7, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[50] Syed Ghazanfar Abbas et al., “Identifying and Mitigating Phishing Attack Threats in IoT Use Cases Using a Threat Modelling Approach,” Sensors, vol. 21, no. 14, pp. 1-25, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[51] Pranshu Bajpai, Richard Enbody, and Betty H.C. Cheng, “Ransomware Targeting Automobiles,” Proceedings of the Second ACM Workshop on Automotive and Aerial Vehicle Security, pp. 23-29, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[52] Manuela Horduna, Simona-Maria L˘az˘arescu, and Emil Simion, “A Note on Machine Learning Applied in Ransomware Detection,” Cryptology ePrint Archive, 2023.
[Google Scholar] [Publisher Link]
[53] Felix Klement, Henrich C. Pöhls, and Stefan Katzenbeisser, “Man-in-the-OBD: A Modular, Protocol Agnostic Firewall for Automotive Dongles to Enhance Privacy and Security,” International Workshop on Attacks and Defenses for Internet-of-Things, pp. 143-164, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[54] Seong-Kyu Kim, and Eun-Sill Jang, “The Intelligent Blockchain for the Protection of Smart Automobile Hacking,” Journal of Multimedia Information System, vol. 9, no. 1, pp. 33-42, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[55] András Gazdaga, Csongor Ferenczib, and Levente Buttyán, “Development of a Man-in-the-Middle Attack Device for the CAN Bus,” 1 st Conference on Information Technology and Data Science, 2020.
[Google Scholar] [Publisher Link]
[56] Matthias Bergler et al., “Social Engineering Exploits in Automotive Software Security: Modeling Human-targeted Attacks with SAM,” Proceedings of the 31st European Safety and Reliability Conference, pp. 2502-2509, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[57] Joachim Draeger, “Safety, Security, and Social Engineering — Thoughts, Challenges and A Concept of Quantitative Risk Assessment,” Nova Science Publishers, pp. 141-175, 2020.
[Google Scholar]
[58] Mikhail Buinevich, and Andrei Vladyko, “Forecasting Issues of Wireless Communication Networks’ Cyber Resilience for an Intelligent Transportation System: An Overview of Cyber Attacks,” Information, vol. 10, no. 1, pp. 1-22, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[59] Liqun Yang et al., “Real-Time Intrusion Detection in Wireless Network: A Deep Learning-Based Intelligent Mechanism,” IEEE Access, vol. 8, pp. 170128-170139, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[60] Stephen Kahara Wanjau, Geoffrey Mariga Wambugu, and Gabriel Ndung’u Kamau, “SSH-Brute Force Attack Detection Model based on Deep Learning,” International Journal of Computer Applications Technology and Research, vol. 10, no. 1, pp. 42-50, 2021.
[Google Scholar] [Publisher Link]
[61] Shipra Pandey et al., “Cyber Security Risks in Globalized Supply Chains: Conceptual Framework,” Journal of Global Operations and Strategic Sourcing, vol. 13, no. 1, pp. 103-128, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[62] Nikhil Gupta et al., “Additive Manufacturing Cyber-Physical System: Supply Chain Cybersecurity and Risks,” IEEE Access, vol. 8, pp. 47322-47333, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[63] Azeem Hafeez et al., “Machine Learning based ECU Detection for Automotive Security,” 17th International Computer Engineering Conference (ICENCO), Cairo, Egypt, pp. 73-81, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[64] John Heneghan et al., “Enabling Security Checking of Automotive ECUs with Formal CSP Models,” 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W), Portland, OR, USA, pp. 90-97, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[65] Amit Garg, and Nima Karimia, “Leveraging Deep CNN and Transfer Learning for Side-Channel Attack,” 22nd International Symposium on Quality Electronic Design (ISQED), Santa Clara, pp. 91-96, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[66] Anuj Dubey et al., “Guarding Machine Learning Hardware Against Physical Side-Channel Attacks,” ACM Journal on Emerging Technologies in Computing Systems, vol. 18, no. 3, pp. 1-31, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[67] Sampath Rajapaksha et al., “AI-Based Intrusion Detection Systems for In-Vehicle Networks: A Survey,” ACM Computing Surveys, vol. 55, no. 11, pp. 1-40, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[68] Md Delwar Hossain et al., “LSTM-Based Intrusion Detection System for In-Vehicle Can Bus Communications,” IEEE Access, vol. 8, pp. 185489-185502, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[69] Pengzhou Cheng et al., “TCAN-IDS: Intrusion Detection System for Internet of Vehicle Using Temporal Convolutional Attention Network,” Symmetry, vol. 14, no. 2, pp. 1-15, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[70] Jun Zhao et al., “TIMiner: Automatically Extracting and Analyzing Categorized Cyber Threat Intelligence from Social Data,” Computers & Security, vol. 95, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[71] Thomas D. Wagner et al., “Cyber Threat Intelligence Sharing: Survey and Research Directions,” Computers & Security, vol. 87, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[72] Yang Xing et al., “Toward Safe and Smart Mobility: Energy-Aware Deep Learning for Driving Behavior Analysis and Prediction of Connected Vehicles,” IEEE Transactions on Intelligent Transportation Systems, vol. 22, no. 7, pp. 4267-4280, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[73] Abdul Rehman Javed et al., “Anomaly Detection in Automated Vehicles Using Multistage Attention-based Convolutional Neural Network,” IEEE Transactions on Intelligent Transportation Systems, vol. 22, no. 7, pp. 4291-4300, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[74] Yiyang Wang, Neda Masoud, and Anahita Khojandi, “Real-Time Sensor Anomaly Detection and Recovery in Connected Automated Vehicle Sensors,” IEEE Transactions on Intelligent Transportation Systems, vol. 22, no. 3, pp. 1411-1421, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[75] Aiguo Zhou, Zhenyu Li, and Yong Shen, “Anomaly Detection of CAN Bus Messages Using a Deep Neural Network for Autonomous Vehicles,” Applied Sciences, vol. 9, no. 15, pp. 1-12, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[76] Elmustafa Sayed Ali et al., “Machine Learning Technologies for Secure Vehicular Communication in Internet of Vehicles: Recent Advances and Applications,” Security and Communication Networks, vol. 2021, pp. 1-23, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[77] Ikram Ali et al., “An Efficient and Provably Secure ECC-Based Conditional Privacy-Preserving Authentication for Vehicle-to-Vehicle Communication in Vanets,” IEEE Transactions on Vehicular Technology, vol. 70, no. 2, pp. 1278-1291, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[78] Chen Wang et al., “B-TSCA: Blockchain Assisted Trustworthiness Scalable Computation for V2I Authentication in Vanets,” IEEE Transactions on Emerging Topics in Computing, vol. 9, no. 3, pp. 1386-1396, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[79] Aleksandr Ometov et al., “Challenges of Multi-Factor Authentication for Securing Advanced IoT (A-IoT) Applications,” IEEE Network, vol. 33, no. 2, pp. 82-88, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[80] Andreas Theissler et al., “Predictive Maintenance Enabled by Machine Learning: Use Cases and Challenges in the Automotive Industry,” Reliability Engineering & System Safety, vol. 215, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[81] Battula Bhavya et al., “Prediction of Vehicle Safety System Using Internet of Things,” Journal of Green Engineering (JGE), vol. 10, no. 4, pp. 1786-1798, 2020.
[Google Scholar] [Publisher Link]
[82] Atif Ahmad et al., “How Integration of Cyber Security Management and Incident Response Enables Organizational Learning,” Journal of the Association for Information Science and Technology, vol. 71, no. 8, pp. 939-953, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[83] Chia-Nan Wang et al., “Wireless Communications for Data Security: Efficiency Assessment of Cybersecurity Industry—A Promising Application for UAVs,” Drones, vol. 6, no. 11, pp. 1-21, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[84] Wenjun Xiong et al., “Cyber Security Threat Modeling based on the MITRE Enterprise ATT&CK Matrix,” Software and Systems Modeling, vol. 21, no. 1, pp. 157-177, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[85] Xiong Wenjun, and Robert Lagerström, “Threat Modeling – A Systematic Literature Review,” Computers & Security, vol. 84, pp. 53- 69, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[86] Nijat Rajabli et al., “Software Verification and Validation of Safe Autonomous Cars: A Systematic Literature Review,” IEEE Access, vol. 9, pp. 4797-4819, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[87] Imanol Mugarza, Jose Luis Flores, and Jose Luis Montero, “Security Issues and Software Updates Management in the Industrial Internet of Things (IIoT) Era,” Sensors, vol. 20, no. 24, pp. 1-22, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[88] Jaewan Seo, Jiwon Kwak, and Seungjoo Kim, “Formally Verified Software Update Management System in Automotive,” Symposium on Vehicles Security and Privacy, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[89] Ryan Elder, Courtney Westrick, and Peter Moldenhauer, “Cyberattack Detection and Bus Segmentation in Ground Vehicles,” Proceedings of the Ground Vehicle Systems Engineering and Technology Symposium, 2020.
[Google Scholar] [Publisher Link]
[90] Carson Labrado, and Himanshu Thapliyal, “Hardware Security Primitives for Vehicles,” IEEE Consumer Electronics Magazine, vol. 8, no. 6, pp. 99-103, 2019.
[CrossRef] [Google Scholar] [Publisher Link]