www.design-reuse-embedded.com
Find Top SoC Solutions
for AI, Automotive, IoT, Security, Audio & Video...

Why Automotive Cybersecurity Is Important

www.eetimes.eu, Sept. 03, 2022 – 

Cybersecurity is becoming a fundamental concern for the development of autonomous vehicle (AV) systems, as attacks can have serious consequences for autonomous electric vehicles and can put human lives at risk. Software attacks include data-driven decisions negatively impacting the autonomy of EVs and compromising the benefits of autonomous cars.

AVs have seen many recent advances, with the integration of technologies like edge computing, private 5G, and high-performance processing units. In autonomous EVs, edge computing helps process the high volume of data at the edge to reduce latency and help vehicles make data-driven decisions in real time. Edge sensors deployed in vehicles have the scarcity of resources but require high computational power to process data. This data is then migrated to edge data centers and the cloud to serve vehicle-to-everything (V2X) communications and services that have sparked significant interest as a potential element of future intelligent transportation systems.

V2X facilitates communication and interaction between vehicles (V2V), infrastructure (V2I), pedestrians (V2P), and networks (V2N). But these advanced communication systems introduce more surface area for cyberattacks and damage the existing ecosystem, which can lead to serious repercussions.

Cyberattacks in V2X communications

In the whole AV ecosystem, V2X communication takes care of the transmission of edge data across the various parts of the traffic system and requires multiple communication channels between these edge sensors and other infrastructure. These multiple communication channels expose vehicles to cyberattacks, which can have severe implications not only for the vehicle but other connected devices. An increase in the number of connected devices can make these cyberattacks unpredictable and more frequent.

Many different entry points can be used to infiltrate a vehicular architecture, including vehicular databases, remote communication technologies, and vehicular parts. In recent times, researchers have focused on vehicle ad-hoc networks (VANETs), which use dedicated short-range communication (DSRC) based on the IEEE 802.11p standard for wireless access in vehicular networks. Another communication protocol used within V2X communication is the mobile cellular network that uses the long-term evolution (LTE) technology.

One of the most common V2X-communication–related attacks is the VANET, which has been widely researched since 2008 to analyze the secure problems for wireless communication transmission from outside the vehicular system. Some known VANET attacks include man-in-the-middle attacks, bogus information attacks, DoS, location tracking, malicious code, and replay attacks. The other known attack on AVs due to V2X communication is on the infotainment system and Bluetooth data transmission.

click here to read more...

 Back

Partner with us

List your Products

Suppliers, list and add your products for free.

More about D&R Privacy Policy

© 2024 Design And Reuse

All Rights Reserved.

No portion of this site may be copied, retransmitted, reposted, duplicated or otherwise used without the express written permission of Design And Reuse.