Autonomous Vehicles: The Cybersecurity Vulnerabilities and Countermeasures for Big Data Communication

被引:8
|
作者
Algarni, Abdullah [1 ]
Thayananthan, Vijey [1 ]
机构
[1] King Abdulaziz Univ, Comp Sci Dept, Jeddah 21589, Saudi Arabia
来源
SYMMETRY-BASEL | 2022年 / 14卷 / 12期
关键词
cybersecurity vulnerabilities; autonomous vehicles; vehicular communications; security solutions; CYBER-SECURITY; ATTACK;
D O I
10.3390/sym14122494
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
The possible applications of communication based on big data have steadily increased in several industries, such as the autonomous vehicle industry, with a corresponding increase in security challenges, including cybersecurity vulnerabilities (CVs). The cybersecurity-related symmetry of big data communication systems used in autonomous vehicles may raise more vulnerabilities in the data communication process between these vehicles and IoT devices. The data involved in the CVs may be encrypted using an asymmetric and symmetric algorithm. Autonomous vehicles with proactive cybersecurity solutions, power-based cyberattacks, and dynamic countermeasures are the modern issues/developments with emerging technology and evolving attacks. Research on big data has been primarily focused on mitigating CVs and minimizing big data breaches using appropriate countermeasures known as security solutions. In the future, CVs in data communication between autonomous vehicles (DCAV), the weaknesses of autonomous vehicular networks (AVN), and cyber threats to network functions form the primary security issues in big data communication, AVN, and DCAV. Therefore, efficient countermeasure models and security algorithms are required to minimize CVs and data breaches. As a technique, policies and rules of CVs with proxy and demilitarized zone (DMZ) servers were combined to enhance the efficiency of the countermeasure. In this study, we propose an information security approach that depends on the increasing energy levels of attacks and CVs by identifying the energy levels of each attack. To show the results of the performance of our proposed countermeasure, CV and energy consumption are compared with different attacks. Thus, the countermeasures can secure big data communication and DCAV using security algorithms related to cybersecurity and effectively prevent CVs and big data breaches during data communication.
引用
收藏
页数:19
相关论文
共 50 条
  • [1] Cybersecurity Oriented Architecture to Ensure the Autonomous Vehicles Communication
    Sersemis, Athanasios
    Papadopoulos, Alexandros
    Spanos, Georgios
    Lalas, Antonios
    Votis, Konstantinos
    Tzovaras, Dimitrios
    2023 31ST MEDITERRANEAN CONFERENCE ON CONTROL AND AUTOMATION, MED, 2023, : 119 - 124
  • [2] A survey on blockchain cybersecurity vulnerabilities and possible countermeasures
    Hasanova, Huru
    Baek, Ui-jun
    Shin, Mu-gon
    Cho, Kyunghee
    Kim, Myung-Sup
    INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2019, 29 (02)
  • [3] Breaking the Blockage for Big Data Transmission: Gigabit Road Communication in Autonomous Vehicles
    Zhang, Chaofeng
    Ota, Kaoru
    Jia, Juncheng
    Dong, Mianxiong
    IEEE COMMUNICATIONS MAGAZINE, 2018, 56 (06) : 152 - 157
  • [4] Classification of Cybersecurity Threats, Vulnerabilities and Countermeasures in Database Systems
    Almaiah, Mohammed Amin
    Saqr, Leen Mohammad
    Al-Rawwash, Leen Ahmad
    Altellawi, Layan Ahmed
    Al-Ali, Romel
    Almomani, Omar
    CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 81 (02): : 3189 - 3220
  • [5] Surveying cybersecurity vulnerabilities and countermeasures for enhancing UAV security
    Kumar, Naveen
    Chaudhary, Ankit
    COMPUTER NETWORKS, 2024, 252
  • [6] Roadmap for Cybersecurity in Autonomous Vehicles
    Kukkala, Vipin Kumar
    Thiruloga, Sooryaa Vignesh
    Pasricha, Sudeep
    IEEE CONSUMER ELECTRONICS MAGAZINE, 2022, 11 (06) : 13 - 22
  • [7] A Review on Cybersecurity Vulnerabilities for Unmanned Aerial Vehicles
    Krishna, Leela C. G.
    Murphy, Robin R.
    2017 IEEE INTERNATIONAL SYMPOSIUM ON SAFETY, SECURITY AND RESCUE ROBOTICS (SSRR), 2017, : 194 - 199
  • [8] Dynamic Watermarking for Cybersecurity of Autonomous Vehicles
    Shangguan, Lantian
    Chour, Kenny
    Ko, Woo Hyun
    Kim, Jaewon
    Kamath, Gopal Krishna
    Satchidanandan, Bharadwaj
    Gopalswamy, Swaminathan
    Kumar, P. R.
    IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2023, 70 (11) : 11735 - 11743
  • [9] Cybersecurity Simulator for Connected and Autonomous Vehicles
    Folan, Sean
    Wang, Yunsheng
    PROCEEDINGS OF THE 2023 INTERNATIONAL SYMPOSIUM ON THEORY, ALGORITHMIC FOUNDATIONS, AND PROTOCOL DESIGN FOR MOBILE NETWORKS AND MOBILE COMPUTING, MOBIHOC 2023, 2023, : 430 - 435
  • [10] An opportunistic data dissemination for autonomous vehicles communication
    Abbas, Asad
    Krichen, Moez
    Alroobaea, Roobaea
    Malebary, Sharaf
    Tariq, Usman
    Jalil Piran, Md.
    SOFT COMPUTING, 2021, 25 (18) : 11899 - 11912