The Role of Technological Approaches in Cyber Security of Autonomous Vehicles
PDF File

Keywords

Autonomous vehicles
Cybersecurity threats
Autonomous vehicle security
Artificial intelligence

How to Cite

The Role of Technological Approaches in Cyber Security of Autonomous Vehicles. (2025). ADBA Computer Science, 2(1), 1-6. https://doi.org/10.69882/adba.cs.2025011

Abstract

Autonomous vehicles play a significant role in future transportation systems by enabling driverless travel. These vehicles offer advantages such as reducing accidents, improving travel times, and conserving energy. However, ensuring the independent operation of these technologies requires robust cybersecurity measures. Protecting autonomous vehicles against security threats they may face within their internal systems or during communication with other vehicles and infrastructure is crucial. This study examines the security measures used in autonomous vehicles. Encryption and data protection techniques safeguard information from unauthorized access during in-vehicle and inter-vehicle communication. Additionally, intrusion detection and prevention systems (IDS/IPS) detect abnormal activities to protect against potential threats. Machine learning-based anomaly detection methods analyze data from sensors and network traffic to identify emerging threats. Regular software updates help mitigate vulnerabilities, while network segmentation isolates different systems to protect critical components. Multi-layered security solutions ensure the safe operation of autonomous vehicles. These approaches contribute to the development of future security standards.

PDF File

References

Abouabdalla, K. O. and S. B. Goyal, 2022 Autonomous vehicles: Improving cyber security. International Journal of Advanced Research in Technology and Innovation 4: 118–126.

Ahmed, M., A. Naser Mahmood, and J. Hu, 2016 A survey of network anomaly detection techniques. J. Netw. Comput. Appl. 60: 19–31.

Amini, S. and C. Qian, 2017 A survey on network security monitoring in high-speed networks. IEEE Communications Surveys & Tutorials 20: 3271–3290.

Avaroğlu, E., 2022 Bilgi güvenliğinin temel yapı taşı: Kriptoloji. Düşünce Dünyasında Türkiz 8: 53–65.

Ayata, F. and E. Seyyarer, 2022 The Most Important Defense System of the Technology Age: Cyber Security. Yenilenebilir Kaynaklardan Elde Edilen Malzemeler ve Uygulamaları. Artikel Akademi, İstanbul.

Aydogan, M., 2022 Saldırı tespit sistemleri (IDS) & İzinsiz giriş önleme sistemleri (IPS). Erişim tarihi: 25 Ocak 2025.

Bace, R. G., P. Mell, et al., 2001 Intrusion detection systems.

Bosch, R. et al., 1991 Can specification version 2.0. Rober Bosch GmbH, Postfach 300240: 72.

Çakal, K., İ. Kara, and M. Aydos, 2021 Cyber security of connected autonomous vehicles. Avrupa Bilim ve Teknoloji Dergisi pp. 1121–1128.

Chandola, V., A. Banerjee, and V. Kumar, 2009 Anomaly detection. ACM Comput. Surv. 41: 1–58.

Checkoway, S., D. Mccoy, B. Kantor, D. Anderson, H. Shacham, et al., 2011 Comprehensive experimental analyses of automotive attack surfaces. In Proceedings of the USENIX Security Symposium, pp. 77–92.

Durlik, I., T. Miller, E. Kostecka, Z. Zwierzewicz, and A. Łobodzińska, 2024 Cybersecurity in Autonomous Vehicles-Are We Ready for the Challenge?, volume 13. Electronics.

Goodfellow, I., 2016 Deep learning.

Groll, A. and M. Rumez, 2019 Security aspects of automotive over-the-air updates. In IEEE International Conference on Vehicular Electronics and Safety, pp. 1–6.

Hodge, V. J. and J. Austin, 2004 A survey of outlier detection methodologies. Artificial Intelligence Review 22: 85–126.

Hossain, M. M., M. Fotouhi, and R. Hasan, 2015 Towards an analysis of security issues, challenges, and open problems in the internet of things. IEEE World Congress on Services pp. 21–28.

Koscher, K., A. Czeskis, F. Roesner, S. Patel, T. Kohno, et al., 2010 Experimental security analysis of a modern automobile. In IEEE Symposium on Security and Privacy, pp. 447–462.

Macher, G., H. Sporer, E. Armengaud, and C. Kreiner, 2017 OTA updates in automotive systems: Why and how to ensure safety and security. Journal of Automotive Software Engineering 3: 45–58.

Medvedev, K. and E. Vybornova, 2018 Over-the-air update protocol for internet of things. In IEEE Conference Proceedings.

Mirkovic, J. and P. Reiher, 2004 A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Computer Communication Review 34: 39–53.

Modi, C., D. Patel, B. Borisaniya, A. Patel, and M. Rajarajan, 2013 A survey of intrusion detection techniques in cloud. Journal of Network and Computer Applications 36: 42–57.

Nguyen, T. K., T. T. Hoang, and T. Q. Ha, 2020 Securing over-the-air software updates for IoT and autonomous vehicles. International Journal of Security and Networks 15: 1–12.

Northcutt, S. and J. Novak, 2002 Network intrusion detection. Sams Publishing.

Özarpa, C., İ. Avcı, and S. A. Kara, 2021 Otonom araçlar için siber güvenlik risklerinin araştırılması ve savunma metotları. Avrupa Bilim ve Teknoloji Dergisi pp. 242–255.

Roesch, M., 1999 Snort - lightweight intrusion detection for networks. In Proceedings of the 13th USENIX Conference on System Administration, pp. 229–238.

Saeed, Z., M. Masood, and M. U. Khan, 2023 A review: Cybersecurity challenges and their solutions in connected and autonomous vehicles (CAVs). JAREE (Journal on Advanced Research in Electrical Engineering) 7.

Scarfone, K. and P. Mell, 2007 Guide to intrusion detection and prevention systems (IDPS). NIST Special Publication.

Schneier, B., 2007 Applied cryptography: protocols, algorithms, and source code in C. John Wiley & Sons.

Seyyarer, E. and F. Ayata, 2023 Siber güvenlikte makine öğrenimi dönemi.

Sommer, R. and V. Paxson, 2010 Outside the closed world: On using machine learning for network intrusion detection. In 2010 IEEE Symposium on Security and Privacy, IEEE.

Stallings, W., 2016 Cryptography and network security: Principles and practice. Pearson.

Van Eck, W., B. Kuijper, and L. Wagemans, 2017 Physical tamper detection in electronic devices: Technologies and application. Journal of Electronic Protection and Security 12: 132–145.

Wolf, M. and D. Serpanos, 2017 Embedded systems security: Foundations and applications. Morgan Kaufmann.

Özkan, H., 2020 Simetrik ve asimetrik anahtarlı şifreleme algoritmaları. Erişim tarihi: 25 Ocak 2025.

Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.