Mitigating Cybersecurity Threats in Autonomous Vehicles: A Real-World Case Study on Protecting V2X Communication Against Remote Hacking Attempts

  • Mohialden Y
  • Hussien N
  • Hussain S
N/ACitations
Citations of this article
7Readers
Mendeley users who have this article in their library.

Abstract

As of now, maintaining the security and dependability of V2X communication remains an open issue due to the complexity and vulnerability of wireless networking technologies for Autonomous Vehicles (AVs). This study is conducted to address the research gap. The initial research activities are to routinely test the security vulnerability of the communication technologies in AVs, which encompass vehicle-to-infrastructure (V2I), vehicle-to-vehicle (V2V), and vehicle-to-device (V2D) communication. Industry tools and software licenses are used to perform these experimental tests. The results reveal that malicious cyber-attacks targeting V2X communication are successful. Building on the results, a model-based SDLC and a set of guidelines are proposed to securely develop software for AVs 2. Participants of the project are also trained in these newly developed methodologies to enhance the development security of the AVs in the future.

Cite

CITATION STYLE

APA

Mohialden, Y. M., Hussien, N. M., & Hussain, S. A. K. (2024). Mitigating Cybersecurity Threats in Autonomous Vehicles: A Real-World Case Study on Protecting V2X Communication Against Remote Hacking Attempts. CyberSystem Journal, 1(2), 41–50. https://doi.org/10.57238/csj.9tjh0036

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free