Cybersecurity and Forensics in Connected Autonomous Vehicles: A Review of the State-of-the-Art
Connected Autonomous Vehicles (CAVs) are transformational technologies that have demonstrated significant potential for shaping the future of transportation systems. CAV research has been conducted extensively, both in academic and industrial pursuits. The intention was to put CAVs on the road, but...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2022-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/9916257/ |
_version_ | 1828323614451040256 |
---|---|
author | Prinkle Sharma James Gillanders |
author_facet | Prinkle Sharma James Gillanders |
author_sort | Prinkle Sharma |
collection | DOAJ |
description | Connected Autonomous Vehicles (CAVs) are transformational technologies that have demonstrated significant potential for shaping the future of transportation systems. CAV research has been conducted extensively, both in academic and industrial pursuits. The intention was to put CAVs on the road, but the safety and efficiency of CAVs must be prioritized for this purpose to come to fruition. This technology is built upon sensors, and network communications have the potential to improve automotive infrastructure, reduce traffic and accidents, and facilitate a unified transportation system. Although the auspiciousness of these vehicles is clear, persistent threats exist in terms of cybersecurity attacks, which jeopardize the safety and effectiveness of CAVs. Our study provides a comprehensive dissection of cyberattacks and digital forensics on CAVs. We begin by discussing each element of a standard CAV network and then illustrate the current security. The three main components of CAVs– <italic>sensors, communication networks, and actuators</italic> -were analyzed in detail. The expansion of cybersecurity and forensic issues is presented with additional investigations into traditional and artificial intelligence-based cyber-defense techniques. Our work concludes by discussing the open challenges and potential research areas for developing robust cybersecurity and forensic solutions exclusively for CAVs. |
first_indexed | 2024-04-13T18:54:58Z |
format | Article |
id | doaj.art-e174e70d9e0c488a94778ceed16daa6d |
institution | Directory Open Access Journal |
issn | 2169-3536 |
language | English |
last_indexed | 2024-04-13T18:54:58Z |
publishDate | 2022-01-01 |
publisher | IEEE |
record_format | Article |
series | IEEE Access |
spelling | doaj.art-e174e70d9e0c488a94778ceed16daa6d2022-12-22T02:34:18ZengIEEEIEEE Access2169-35362022-01-011010897910899610.1109/ACCESS.2022.32138439916257Cybersecurity and Forensics in Connected Autonomous Vehicles: A Review of the State-of-the-ArtPrinkle Sharma0https://orcid.org/0000-0003-4316-6556James Gillanders1Department of Information Security and Digital Forensics, University at Albany-State University of New York, Albany, NY, USADepartment of Informatics, University at Albany-State University of New York, Albany, NY, USAConnected Autonomous Vehicles (CAVs) are transformational technologies that have demonstrated significant potential for shaping the future of transportation systems. CAV research has been conducted extensively, both in academic and industrial pursuits. The intention was to put CAVs on the road, but the safety and efficiency of CAVs must be prioritized for this purpose to come to fruition. This technology is built upon sensors, and network communications have the potential to improve automotive infrastructure, reduce traffic and accidents, and facilitate a unified transportation system. Although the auspiciousness of these vehicles is clear, persistent threats exist in terms of cybersecurity attacks, which jeopardize the safety and effectiveness of CAVs. Our study provides a comprehensive dissection of cyberattacks and digital forensics on CAVs. We begin by discussing each element of a standard CAV network and then illustrate the current security. The three main components of CAVs– <italic>sensors, communication networks, and actuators</italic> -were analyzed in detail. The expansion of cybersecurity and forensic issues is presented with additional investigations into traditional and artificial intelligence-based cyber-defense techniques. Our work concludes by discussing the open challenges and potential research areas for developing robust cybersecurity and forensic solutions exclusively for CAVs.https://ieeexplore.ieee.org/document/9916257/Connected autonomous vehiclescyber attacksand forensicscyber-physical systemsintelligent transportation system |
spellingShingle | Prinkle Sharma James Gillanders Cybersecurity and Forensics in Connected Autonomous Vehicles: A Review of the State-of-the-Art IEEE Access Connected autonomous vehicles cyber attacks and forensics cyber-physical systems intelligent transportation system |
title | Cybersecurity and Forensics in Connected Autonomous Vehicles: A Review of the State-of-the-Art |
title_full | Cybersecurity and Forensics in Connected Autonomous Vehicles: A Review of the State-of-the-Art |
title_fullStr | Cybersecurity and Forensics in Connected Autonomous Vehicles: A Review of the State-of-the-Art |
title_full_unstemmed | Cybersecurity and Forensics in Connected Autonomous Vehicles: A Review of the State-of-the-Art |
title_short | Cybersecurity and Forensics in Connected Autonomous Vehicles: A Review of the State-of-the-Art |
title_sort | cybersecurity and forensics in connected autonomous vehicles a review of the state of the art |
topic | Connected autonomous vehicles cyber attacks and forensics cyber-physical systems intelligent transportation system |
url | https://ieeexplore.ieee.org/document/9916257/ |
work_keys_str_mv | AT prinklesharma cybersecurityandforensicsinconnectedautonomousvehiclesareviewofthestateoftheart AT jamesgillanders cybersecurityandforensicsinconnectedautonomousvehiclesareviewofthestateoftheart |