International Research Journal of Engineering and Technology (IRJET)
e-ISSN: 2395-0056
Volume: 11 Issue: 03 | Mar 2024
p-ISSN: 2395-0072
www.irjet.net
Cyber threats to autonomous vehicles: The risks of hacking, Ransomware, and other Cyber-Attacks Mohammad sufiyan Rajapatel1, Mangesh A Deshmukh2 2Design Engineer, Tata Technologies Ltd, Pune 2Manager, Tata Technologies Ltd, Pune ---------------------------------------------------------------------***--------------------------------------------------------------------parking systems, Auto pilot. As the industry started to pack Abstract - The emergence of autonomous vehicles promises
new features into vehicles with the help of different types of sensors, cameras, navigation units, etc., It gave the rise to new sort of vehicles such as self-driving Vehicles. As the vehicle depend on the different sort of sensor which communicates with each other and provide feedback to control system and start to run on its own. It has an abundant amount of potential to change the whole transportation system. Such vehicles will reduce human dependency and can be operated by disabled and elderly men. Also, they can be used in dangerous war zones where the chances of human life loss are higher. Instead of these, self-driving vehicles can reduce the issues created by the misuse of vehicles, such as traffic issues, fuel consumption, optimal use of roads, reduction in accidents, etc. These vehicles have various technologies packed into them, like radar, sensors, GPS, and on-board cameras, which help the vehicle understand its surroundings. The data of the surroundings, which were sensed by using these technologies, was fed into the advanced control system present in the vehicle. This system processes the data and makes relevant decisions regarding navigation and any obstacles that may be present on the way. Also, translate traffic signals and signage that allow the vehicle to reach its destination with incident while considering other cars on the surrounding road. Even though autonomous vehicles have many advantages, there are still challenges with them. As technology is in the early stages of the era It raises many issues, such as cyber-attacks, data breaches, privacy concerns about one’s personal data, etc.
to revolutionize transportation, but it also presents new cybersecurity threats. The growing sophistication of hacking, ransomware, and other cyber-attacks could lead to disastrous consequences for passengers and other road users. Therefore, strong cybersecurity protocols are crucial in mitigating the dangers of cyber threats to autonomous vehicles. These protocols include encryption, multi-factor authentication, and intrusion detection systems. Data privacy policies are also important to safeguard personal information collected by autonomous vehicles. To fix vulnerabilities, businesses must become aware of them and locate weak points in their hardware and software systems, applying security updates and patches. Employee education is necessary to teach them the risks of cyber threats and how to spot and react to them. Collaboration among technology companies, automakers, regulators, and other stakeholders is also necessary to establish best practices and guidelines for autonomous vehicle cybersecurity. Incident response planning is essential to ensure that protocols are in place to react quickly and effectively to cyber-attacks. Advanced sensor and perception systems are critical to identifying cyber threats and taking appropriate action. Companies must develop systems that can detect anomalies and potential threats in real-time and respond quickly. In conclusion, managing the risks of cyber threats to autonomous vehicles is crucial for the safe and effective operation of these vehicles. By implementing robust cybersecurity protocols, data privacy policies, risk assessment, employee training, partnerships, incident response planning, and advanced sensor and perception systems, companies can ensure the safety and security of autonomous vehicle operations and maintain the public's trust in this emerging technology.
The technology isn’t mature enough to completely rely on it. Many companies race around and try to capture the most of the market while trying to introduce a new sort of vehicle. This paper will look at the market penetration of the self-driving vehicle and the security issues involved in it..
Key Words: RADAR, LiDAR, V2V Communication, Autonomous Vehicle, Self-driving vehicle.
2. HOW SELF-DRIVING (AUTONOMOUS) VEHICLE WORKS?
1.INTRODUCTION As the world moves towards IoT-based devices, where all the devices are communicating with each other to improve lifestyles and provide ease of operation. The automobile industry has also grown and is submerged in the pond of new technology, which opens a new era. Now the automobile industry has grown so much that it is reducing human dependencies through technologies such as adaptive cruise control, departure warning systems, automatic
© 2024, IRJET
|
Impact Factor value: 8.226
of "Sense, Understand & Act". In the sense phase, the vehicle observes the surroundings and generates data. In the understanding phase, the data generated in the trailing phase is processed and transmitted to the algorithms. Then algorithms decide what else needs to be done.
|
ISO 9001:2008 Certified Journal
|
Page 91