Autonomous Vehicles: The Cybersecurity Vulnerabilities and Countermeasures for Big Data Communication

被引:6
|
作者
Algarni, Abdullah [1 ]
Thayananthan, Vijey [1 ]
机构
[1] King Abdulaziz Univ, Comp Sci Dept, Jeddah 21589, Saudi Arabia
来源
SYMMETRY-BASEL | 2022年 / 14卷 / 12期
关键词
cybersecurity vulnerabilities; autonomous vehicles; vehicular communications; security solutions; CYBER-SECURITY; ATTACK;
D O I
10.3390/sym14122494
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
The possible applications of communication based on big data have steadily increased in several industries, such as the autonomous vehicle industry, with a corresponding increase in security challenges, including cybersecurity vulnerabilities (CVs). The cybersecurity-related symmetry of big data communication systems used in autonomous vehicles may raise more vulnerabilities in the data communication process between these vehicles and IoT devices. The data involved in the CVs may be encrypted using an asymmetric and symmetric algorithm. Autonomous vehicles with proactive cybersecurity solutions, power-based cyberattacks, and dynamic countermeasures are the modern issues/developments with emerging technology and evolving attacks. Research on big data has been primarily focused on mitigating CVs and minimizing big data breaches using appropriate countermeasures known as security solutions. In the future, CVs in data communication between autonomous vehicles (DCAV), the weaknesses of autonomous vehicular networks (AVN), and cyber threats to network functions form the primary security issues in big data communication, AVN, and DCAV. Therefore, efficient countermeasure models and security algorithms are required to minimize CVs and data breaches. As a technique, policies and rules of CVs with proxy and demilitarized zone (DMZ) servers were combined to enhance the efficiency of the countermeasure. In this study, we propose an information security approach that depends on the increasing energy levels of attacks and CVs by identifying the energy levels of each attack. To show the results of the performance of our proposed countermeasure, CV and energy consumption are compared with different attacks. Thus, the countermeasures can secure big data communication and DCAV using security algorithms related to cybersecurity and effectively prevent CVs and big data breaches during data communication.
引用
收藏
页数:19
相关论文
共 50 条
  • [1] Cybersecurity Oriented Architecture to Ensure the Autonomous Vehicles Communication
    Sersemis, Athanasios
    Papadopoulos, Alexandros
    Spanos, Georgios
    Lalas, Antonios
    Votis, Konstantinos
    Tzovaras, Dimitrios
    [J]. 2023 31ST MEDITERRANEAN CONFERENCE ON CONTROL AND AUTOMATION, MED, 2023, : 119 - 124
  • [2] A survey on blockchain cybersecurity vulnerabilities and possible countermeasures
    Hasanova, Huru
    Baek, Ui-jun
    Shin, Mu-gon
    Cho, Kyunghee
    Kim, Myung-Sup
    [J]. INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2019, 29 (02)
  • [3] Breaking the Blockage for Big Data Transmission: Gigabit Road Communication in Autonomous Vehicles
    Zhang, Chaofeng
    Ota, Kaoru
    Jia, Juncheng
    Dong, Mianxiong
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2018, 56 (06) : 152 - 157
  • [4] Classification of Cybersecurity Threats, Vulnerabilities and Countermeasures in Database Systems
    Almaiah, Mohammed Amin
    Saqr, Leen Mohammad
    Al-Rawwash, Leen Ahmad
    Altellawi, Layan Ahmed
    Al-Ali, Romel
    Almomani, Omar
    [J]. Computers, Materials and Continua, 2024, 81 (02): : 3189 - 3220
  • [5] Surveying cybersecurity vulnerabilities and countermeasures for enhancing UAV security
    Kumar, Naveen
    Chaudhary, Ankit
    [J]. COMPUTER NETWORKS, 2024, 252
  • [6] Roadmap for Cybersecurity in Autonomous Vehicles
    Kukkala, Vipin Kumar
    Thiruloga, Sooryaa Vignesh
    Pasricha, Sudeep
    [J]. IEEE CONSUMER ELECTRONICS MAGAZINE, 2022, 11 (06) : 13 - 22
  • [7] A Review on Cybersecurity Vulnerabilities for Unmanned Aerial Vehicles
    Krishna, Leela C. G.
    Murphy, Robin R.
    [J]. 2017 IEEE INTERNATIONAL SYMPOSIUM ON SAFETY, SECURITY AND RESCUE ROBOTICS (SSRR), 2017, : 194 - 199
  • [8] Dynamic Watermarking for Cybersecurity of Autonomous Vehicles
    Shangguan, Lantian
    Chour, Kenny
    Ko, Woo Hyun
    Kim, Jaewon
    Kamath, Gopal Krishna
    Satchidanandan, Bharadwaj
    Gopalswamy, Swaminathan
    Kumar, P. R.
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2023, 70 (11) : 11735 - 11743
  • [9] Cybersecurity Simulator for Connected and Autonomous Vehicles
    Folan, Sean
    Wang, Yunsheng
    [J]. PROCEEDINGS OF THE 2023 INTERNATIONAL SYMPOSIUM ON THEORY, ALGORITHMIC FOUNDATIONS, AND PROTOCOL DESIGN FOR MOBILE NETWORKS AND MOBILE COMPUTING, MOBIHOC 2023, 2023, : 430 - 435
  • [10] An opportunistic data dissemination for autonomous vehicles communication
    Asad Abbas
    Moez Krichen
    Roobaea Alroobaea
    Sharaf Malebary
    Usman Tariq
    Md. Jalil Piran
    [J]. Soft Computing, 2021, 25 : 11899 - 11912