2. Outline
• Introduction
• The Components Of Autonomous Vehicles
• Autonomous Vehicles Mode
• Challenges For Autonomous Car
• Security Issues
• Research scope :-
• Why Autonomous Vehicle Security ?
3. Definition:
Autonomous car or a self driving car is a vehicle that is
capable of sensing its environment and navigating without
human inputs.
Introduction
4. • Still under development, but several partial-automation technologies
are in vehicles on the roads right now
The components of autonomous vehicles
• Several sensors used by Av’s:-
• LiDAR:- Measures distance by illuminating target with pulsed
laser light and measuring reflected pulses with sensors to create 3-
D map of area.
• RADAR:- Radio waves detect short & long-range depth.
• GPS:- Triangulates position of car using satellites. Current GPS
technology is limited to a certain distance. Advanced GPS is in
development.
• more technologies = more attack vectors
• Vehicle Communications have to type :-
1- Vehicle To Vehicle (V2V)
2- Vehicle To Infrastructure (V2I)
6. 1. Autonomous Driving: Navigating a vehicle without
human input from passengers using sensory (LIDAR),
control, and navigation equipment that responds to the
environment when traveling.
2. Driver Assistance: Enhances vehicle systems for safety
and improved driving when the driver is in control.
Technology includes blind-spot detection, pedestrian
detection, lane-departure warnings, intelligent braking,
traffic-sign recognition, automatic braking, and adaptive
cruise control.
Autonomous Vehicles Mode
8. Challenges for autonomous car
1- Social: problems associated with the use of autonomous car
such as consumer approval or not to the moral behind using it.
2- policy :- A variety of opportunities are available, but with
new policy provided by governments as traffic laws, standards,
and driving responsibility.
3- Non-Technical :- Challenges must also be addressed before
autonomous cars commercialized such as cost, robustness.
4- Technical :- Discuss autonomous cars’ technical challenges.
These challenges include validation and testing, trust, software
quality, computational resources, safety, reliability, privacy and
security. The present research falls into finding solutions for such
challenges especially security.
9. One of the most important challenges in
autonomous vehicles is security
11. Authentication is one the excellent techniques for securing the
vehicle messages since they sign each of the messages before
passing them to the acceptor side. It uses a Public key
Infrastructure(PKI) to provide security due to huge number of
individuals in the network. Each of the vehicle in the network
will be before it is transferred and includes Certification
Authority(CA).
What is the Authentication ?
12. Attacks on Authentication
No Asset Vulnerability Target Attack Solution weakness
1 Vehicle/
Vehicle User
Software flaw
(Weak
message
propagation
algorithm)
Privacy
leakage of
sensitive
information
Malware
Integration
Updating
antivirus,
Sandbox
approach
the difficulty in defining
an appropriate policy for
each target program
2 Vehicle Vehicular
hardware
Flaws
Disclosure
of
sensitive
information
Sensor
Impersonation
SPECS SPECS is vulnerable to
impersonation attack
3 Vehicle OBU
vulnerabilities
,
Sensors
malfunctions
Network
flooding
with
wrong
information
Bogus
Information
ECDSA derive the signer’s private
key in case he uses the
same random number for
to generate two
signatures for two
different messages.
SPECS=Standard Performance Evaluation Corporation service
ECDSA=The Elliptic Curve Digital Signature Algorithm
13. Availability implies that information is available to the authorized
parties whenever required. Unavailability to data and systems can
have serious consequences.
It is essential to have plans and procedures in place to prevent or
mitigate data loss as a result of a disaster. A disaster recovery plan
must include unpredictable events such as natural disasters and fire.
What is the Availability ?
14. Attacks on Availability
No Asset Target Threat Attack Solution weakness
1 Vehicle/
Vehicule User
Software flaw
(Weak
message
propagation
algorithm)
Privacy
leakage of
sensitive
information
Malware
Integration
Updating antivirus,
Sandbox approach
the difficulty in
defining an appropriate
policy for each target
program
2 Vehicle OBU
vulnerability
Unauthorized
manipulation
of routing table
Jamming attacks
at vehicle level
Frequency hopping,
Multiple radio transceivers
Current transmitters are
susceptible to selective
jamming
3 Information Non-encrypted
messages,
Insecure
wireless
communication
channel
Message
modification
with wrong
and
compromised
messages
MITM attacks Strong cryptographic
Techniques
cryptographic attacks like
namely guess-and-
determine attacks.
15. In the context of the information security world, integrity means
that when a sender sends data, the receiver must receive exactly
the same data as sent by the sender.
Data must not be changed in transit. For example, if someone
sends a message “Hello!”, then the receiver must receive
“Hello!” That is, it must BE exactly the same data as sent by the
sender. Any addition or subtraction of data during transit would
mean the integrity has been compromised.
What is the Integrity ?
16. Attacks on Integrity
N
o
Asset Vulnerability Target Attack Solution weakness
1 Vehicle OBU
vulnerabilities
,
Sensors
malfunctions
Network
flooding
with
wrong
information
Bogus
Information
ECDSA
derive the
signer’s private
key in case he
uses the same
random number
for to generate
two signatures for
two different
messages.
2 Vehicle/
Vehicle
User
Software
flaws, Weak
Password
Privacy
leakage
of sensitive
data
Social
engineering
attack
Encrypted and
strong password
for message
communication
potential points
of entry and weak
security
protocols, needed
to proceed with
the attack.
17. In simple terms, Privacy means something that is secret and is not supposed to be
disclosed to unintended people or entities.
Privacy ensures that sensitive information is accessed only by an authorized
person and kept away from those not authorized to possess them.
Everyone has information which they wish to keep secret. Thus Protecting such
information is an important part of information security.
What is the Privacy ?
18. Attacks on Privacy
No Asset Vulnerability Threat Attack Solution weakness
1 Vehicle/
Vehicle User
Software flaws,
Weak
Password
Privacy
leakage
of sensitive
data
Social
engineering
attack
Encrypted and
strong password
for message
communication
potential points of entry and
weak security protocols,
needed to proceed with the
attack.
2 Vehicle User OBU
vulnerabilities,
Insecure
wireless
Communication
Revelation of
users
Identity
User privacy
Disclosure
Holistic
approach for
data
Transmission
Modification of messages
3 Information Broadcast nature
of
messages via
wireless
communication
channel
Revelation of
sensitive
information
and user’s
private
credentials
Eavesdropping Strong
encrypted
message
for user’s
communication
attacks like detection,
modification, extraction and
destruction the data
19. The research will be focussed onto the improvement
of security on Autonomous vehicles. privacy during
information exchange (V2V or V2I) will be part of
the research. The work on one of the weakness that
privacy have it ,also this work will solve this
weakness to be secure in future.
19
The Research scope :-
20. Why Autonomous vehicle security ?
Autonomous Vehicles and its connectivity to the Internet via IoT
and IoE is an emerging technical and scientific topics. Many
challenges, especially in data security and is facing the
development of this sector.
The improvement of the security in V2V and V2I communication
will lead to a robust trustable reliable and safer system.