Autonomous Vehicle Data Protection : A Review of Security Threats, Challenges and Protective Mechanism

Authors

  • Gowthami M School of Sciences and Computer Studies, CMR University, Bengaluru, Karnataka, India Author
  • Dr. Gowthami V Assistant Professor, School of Sciences and Computer Studies, CMR University, Bengaluru, Karnataka, India Author

DOI:

https://doi.org/10.32628/CSEIT2410429

Keywords:

Autonomous Vehicle Data Protection, Review writing, Autonomous Vehicle Technologies, Cyber security, V2V and V2I system hacking

Abstract

The swift advancement of autonomous vehicle (AV) technology has presented notable obstacles with data security and privacy. This analysis examines major security threats that jeopardize user privacy and vehicle control, including data breaches, virus penetration, cyber attacks, illegal access, V2V and V2I system hacking, GPS spoofing, and data leaks. It also looks at the challenges developers have when putting strong security measures in place, considering how complicated AV infrastructures may be and how cloud, IoT, and AI are integrated. The paper outlines a number of defence tactics, such as blockchain technology, machine learning for anomaly detection, encryption, and secure communication protocols. In order to improve AV cyber security, it ends with suggestions for further study in fields like edge computing and quantum-resistant cryptography.

Downloads

Download data is not yet available.

References

D. Goodin, "Hackers Remotely Kill a Jeep on the Highway—With Me in It," in Wired, 2015.

J. Wang and P. Zhang, "Securing Autonomous Vehicle Networks: A Blockchain Approach," in IEEE Transactions on Vehicular Technology, vol. 69, no. 4, pp. 3421-3432, Apr. 2020.

K. Singh et al., "AI-Based Intrusion Detection Systems for Autonomous Vehicles," in Journal of Cybersecurity Research, vol. 7, no. 2, pp. 123-135, Jun. 2022.

A. Smith, "Privacy and Data Protection in Connected and Autonomous Vehicles: A Regulatory Overview," in Data Protection Journal, vol. 3, no. 1, pp. 1-12, Jan. 2019.

Biraja Prasad Nayak, Lopamudra Hota, Arun Kumar, Ashok Kumar Turuk, and Peter H J Chong "Autonomous Vehicles: Resource Allocation, Security and Data Privacy" in LATEX Class Files Journal, VOL. XX, NO. XX, 2021

Alam, “Data Privacy and Security in Autonomous Connected Vehicles in Smart City Environment” in Big Data and Cognitive Computing, 2024 DOI: https://doi.org/10.3390/bdcc8090095

Alhabib, and Yadav, “Data Authorization and Validation in Autonomous Vehicles: A Critical Review”, in Cornell University, 2024

Dr.Takahashi, “Privacy-Preserving Location-based Services for Autonomous Vehicle Navigation”, in Distributed Learning and Broad Applications in Scientific Research, Annual Volume 10, 2024.

Xuegang, “Urban Traffic Signal Control with Connected and Automated Vehicles: A Survey”, in Transportation Research Part C: Emerging Technologies, vol. 101, April 2019. DOI: https://doi.org/10.1016/j.trc.2019.01.026

Manfreda, Ljubi, Groznik, “Autonomous vehicles in the smart city era: An empirical study of adoption factors important for millennial”, in International Journal of Information Management, vol.58, June 2021. DOI: https://doi.org/10.1016/j.ijinfomgt.2019.102050

ALMarshoud, Sabir Kiraz, H ALBatti, “Security, Privacy, and Decentralized Trust Management in VANETs: A Review of Current Research and Future Directions”, in ACM Computing Surveys, vol.56, 2024. DOI: https://doi.org/10.1145/3656166

Haung, Kong, Wang, Chen, “Secure Data Sharing over Vehicular Networks Based on Multi-sharding Blockchain”, in ACM Transaction on Sens0r Networks, vol.20, issue 2, Art.No.31, 2024. DOI: https://doi.org/10.1145/3579035

Downloads

Published

09-10-2024

Issue

Section

Research Articles

How to Cite

[1]
Gowthami M and Dr. Gowthami V, “Autonomous Vehicle Data Protection : A Review of Security Threats, Challenges and Protective Mechanism”, Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol, vol. 10, no. 5, pp. 524–528, Oct. 2024, doi: 10.32628/CSEIT2410429.

Similar Articles

1-10 of 238

You may also start an advanced similarity search for this article.