Evaluating Vulnerabilities of Connected Vehicles Under Cyber Attacks by Attack-Defense Tree
By: Muhammad Baqer Mollah, Honggang Wang, Hua Fang
Connected vehicles represent a key enabler of intelligent transportation systems, where vehicles are equipped with advanced communication, sensing, and computing technologies to interact not only with one another but also with surrounding infrastructures and the environment. Through continuous data exchange, such vehicles are capable of enhancing road safety, improving traffic efficiency, and ensuring more reliable mobility services. Further, when these capabilities are integrated with advanced automation technologies, the concept essentially evolves into connected and autonomous vehicles (CAVs). While connected vehicles primarily focus on seamless information sharing, autonomous vehicles are mainly dependent on advanced perception, decision-making, and control mechanisms to operate with minimal or without human intervention. However, as a result of connectivity, an adversary with malicious intentions might be able to compromise successfully by breaching the system components of CAVs. In this paper, we present an attack-tree based methodology for evaluating cyber security vulnerabilities in CAVs. In particular, we utilize the attack-defense tree formulation to systematically assess attack-leaf vulnerabilities, and before analyzing the vulnerability indices, we also define a measure of vulnerabilities, which is based on existing cyber security threats and corresponding defensive countermeasures.
Similar Papers
Advancing Security in Software-Defined Vehicles: A Comprehensive Survey and Taxonomy
Cryptography and Security
Makes cars safer from hackers and last longer.
Connected and Exposed: Cybersecurity Risks, Regulatory Gaps, and Public Perception in Internet-Connected Vehicles
Cryptography and Security
Makes smart cars safer from hackers.
Secure Control of Connected and Autonomous Electrified Vehicles Under Adversarial Cyber-Attacks
Systems and Control
Keeps self-driving cars safe from hackers.