Conference PaperPDF Available

Cybersecurity Readiness for Automated Vehicles

Authors:

Abstract and Figures

Autonomous Vehicle (AV) is a rapidly evolving mobility technology with the potential to drastically alter the future of transportation. Despite the plethora of potential benefits that have prompted their eventual introduction, AVs may also be a source of unprecedented disruption for future travel eco-systems due to their vulnerability to cyber-threats. In this context, this work assesses AVs' cybersecurity readiness. It establishes a Causal Loop Diagram (CLD) based on the System Dynamics approach: a powerful technique inferred from system theory, which can synthesise the behaviour of complicated AV systems. Based on the CLD model, three feedback loops and a system archetype "Fixes-That-Fail" are envisioned, in which the growth in hacker capability, an unforeseen result of technology innovation, demands constant mitigation efforts. The most challenging aspect of this context is determining the trade-off between five components: i) the natural growth of AV technology; ii) stakeholders (communication service providers, road operators, automakers, AV consumers, repairers, and the general public) access to AV technology; iii) the measures to limit hackers' access to AV technology; iv) a pervasive dynamic strategy for circumventing hacker amplification; and v) the efficient usage of AV operating logfiles.
Content may be subject to copyright.
Cybersecurity Readiness for Automated Vehicles
Shah Khalid Khan*1, Nirajan Shiwakoti1, Peter Stasinopoulos1, Matthew Warren2
1School of Engineering, RMIT University Melbourne, Australia
2RMIT Centre for Cyber Security Research and Innovation, RMIT University,
Melbourne, Australia
Email for correspondence: s3680269@student.rmit.edu.au; shahkhalid_k@yahoo.com
Abstract. Autonomous Vehicle (AV) is a rapidly
evolving mobility technology with the potential to
drastically alter the future of transportation. Despite the
plethora of potential benefits that have prompted their
eventual introduction, AVs may also be a source of
unprecedented disruption for future travel eco-systems
due to their vulnerability to cyber-threats. In this
context, this work assesses AVs' cybersecurity
readiness. It establishes a Causal Loop Diagram (CLD)
based on the System Dynamics approach: a powerful
technique inferred from system theory, which can
synthesise the behaviour of complicated AV systems.
Based on the CLD model, three feedback loops and a
system archetype "Fixes-That-Fail" are envisioned, in
which the growth in hacker capability, an unforeseen
result of technology innovation, demands constant
mitigation efforts. The most challenging aspect of this
context is determining the trade-off between five
components: i) the natural growth of AV technology; ii)
stakeholders (communication service providers, road
operators, automakers, AV consumers, repairers, and
the general public) access to AV technology; iii) the
measures to limit hackers' access to AV technology; iv)
a pervasive dynamic strategy for circumventing hacker
amplification; and v) the efficient usage of AV
operating logfiles.
Keywords: Driverless cars, Risk assessment, Cyber-
Physical System, Privacy, Cyber-attack, Safety,
Ransomware.
1. Introduction
Automated Vehicles (AVs) will breathe new life into road transportation.
It has the potential to fundamentally alter how people and goods are
transported in the future. The developments in AV's connectivity, the
integration of sensors (gyroscopic, RADAR, LASER, GPS, ultrasonic,
TPMS, LiDAR, and cameras), the creation of 3D holographic displays, and
virtual reality are the primary enablers of this technology. The most
important benefit is that human error, which causes 94% of all car accidents,
is eliminated.
Dataflow is a key enabler for the operation of AV technology. With at
least 200 sensors, AVs would produce roughly 25 gigabytes of data each
hour, which can generate $450-750 billion in global revenue by 2030 in
predictive maintenance, pay-as-you-drive services, and creative
infrastructure [1]. Despite the plethora of potential benefits that have
compelled their eventual introduction, AVs may also be a source of
unprecedented disruption for tomorrow's travel eco-systems due to their
susceptibility to cyber-threats and hacking [2]. There is no universally
accepted definition or classification of what constitutes a cybersecurity
breach, and there is no comprehensive list of potential hazards. Very
sophisticated cybersecurity assaults often have no end. The aim is to guard
AVs against all possible cyber-attacks, which might result in disruption of
road traffic, consumer/infrastructure damage, and protecting consumers'
sensitive information.
In the event of a successful cyber-attack, the aforementioned disruption
would be amplified. The term "modern-day pirates" has been applied to
cyber-attackers. The massive financial flow ($450-750 billion in global
revenue by 2030) encourages hackers to pursue alternative revenue streams
in addition to ransomware in the AVs operation. Additionally, global
geoeconomics divisions have exacerbated the hacking industry's transition
to "Cyber-attacks-as-a-Service." As a result, establishing the culpability of
AVs hackers operating within a dynamically linked AV-based road
operation is critical.
1.1 Rationale of the study
Academics and industry alike are concerned about the safety and security
of AVs on public roadways. Numerous aspects of AV's cybersecurity have
been examined. For example, there is a focus on AV design that
incorporates technological innovation as well as data transmissions
encryption techniques such as layering, patching, and backup [3]. Several
researchers investigated AVs' infrastructure, focusing on security evaluation
in Vehicle-to-Everything Communications (V2X-C) networks that integrate
5G and 6G cellular networks [4]. The authors [2] synthesised and
interpreted critical areas for the roll-out and progression of CAVs in
combating cyber-attacks. A holistic view of potentially critical avenues,
which lie at the heart of CAV cybersecurity research, is described in a
structured way. CAVs communication framework is presented in an
integrated form, i.e., from In-Vehicle (IV) communication to Vehicle-to-
Vehicle (V2X) communication, with a visual flowchart to provide a
transparent picture of all the interfaces for potential cyber-attacks.
Furthermore, there is a focus on a robust CAVs cyber-policy framework, the
importance of CAVs stakeholders' awareness and understanding
stakeholders, and the relevance of trust in boosting CAVs cybersecurity
initiatives stakeholders [5].
These studies, however, have concentrated on linear interaction and do not
synthesise the complexity inherent in AV deployments. In a traditional
"arms versus armour" technology race, it is projected that Artificial
Intelligence (AI) would enable attacks to expand at the same pace as AI-
enabled defences. Because hackers' expertise and resources are improving,
the concept of acceptable or successful cybersecurity is constantly evolving
[6]. Additionally, it has been shown that machine learning and deep learning
techniques are susceptible to well-designed adversarial perturbations, and
various physical world attacks on the visual systems of AVs have been
successfully carried out. Thus, concurrent research is required to weigh the
benefits and drawbacks of AV technological innovation, i.e., boosting
cybersecurity vs. increasing hackers' capacity during the operation of AVs.
1.2 System Dynamic based Causal Loop Diagram
The Causal Loop Diagram (CLD)-based System Dynamic (SD) approach
is a subset of system theory, which can synthesise the behaviour of
complicated AV systems. CLDs are evaluated in terms of behavioural
patterns, necessitating further knowledge and comprehension [7, 8].
Established in the early 1960s, SD methods provide a firm theoretical
framework for explaining how complex systems function [8]. It has been
applied to the examination and evaluation of a wide variety of dynamic and
complex systems, including those relating to information security [9]. The
authors [10] developed a conceptual SD model to analyse cybersecurity in
the complex, uncertain deployment of CAVs. Specifically, the SD model
integrates six critical avenues and maps their respective parameters that
either trigger or mitigate cyber-attacks in the operation of CAVs using a
systematic theoretical approach. These six avenues are: i) CAVs
communication framework, ii) secured physical access, iii) human factors,
iv) CAVs penetration, v) regulatory laws and policy framework, and iv)
trustacross the CAVs-industry and among the public.
Similarly, the authors [5] developed a CLD-based SD model that
incorporates critical inter-disciplinary parameters and dynamically evaluates
the impact of regulations on CAVs cybersecurity. Two loops are envisioned:
"balancing loops" demonstrate how regulations can facilitate cyber-attacks
prevention, whereas "reinforcing loops" reveal how imposing regulations
can negate its potential benefits by creating a detrimental parallel circle.
Based on the feedback loops, a "shifting the burden" system archetype is
postulated in which governments combat cyber-threats by strengthening
regulations while also reducing CAVs adaptation through imitation and
induction.
Moreover, [11] developed an SD model for strategic cybersecurity
assessment in the CAVs roll-out. The SD model incorporates a Stock-and-
Flow Model, which can integrate multiple perspectives into a single model
and map various parameters that either stimulate or prevent cyber-attacks by
integrating the critical elements of CAV cybersecurity. Due to the fact that
AV technology is constantly evolving and there is a dearth of actual data on
how AVs operate, CLD is an appropriate research strategy for developing a
unified suite of high-leverage technologies and laws to safeguard AVs.
1.3 Contribution of the study
We conducted an integrated dynamic evaluation of the Technological
Maturity (TM) on cybersecurity as well the hacker's capability of AVs. The
key contributions are listed below:
We introduced the SD-based CLD method, a powerful technique
derived from system theory and capable of synthesising and
comprehending the behaviour of complex AVs systems.
We developed the SD model that incorporates key inter-disciplinary
factors pertinent to the technological maturity in AVs cybersecurity
and hacker's ability.
Three feedback loops are described using the CLD model: the
Balancing Loop (BL) #1 shows how TM improves resistance to
cyberattacks; the Reinforcing Loop (RL) #1 shows how TM helps
hackers become more skilled; and the Reinforcing Loop (RL) #2
shows how successful cyberattacks and AV data files allow
malicious actors to "weaponise."
The three feedback loops define the system archetype "Fixes-that-
Fail," emphasising the importance of concurrent actions to thwart
hackers' growth and maximise the benefit of TM in AVs
cybersecurity.
The remainder of the paper is structured as follows. The next section
outlines the methodology adopted. Section 3 elaborates on the conceptual
CLD-based SD Model. The following section describes the feedback loops
and system archetype. Section 5 focuses on discussion and policy
recommendations. The limitations and future extensions of the study are
finally presented in Section 6.
2. Methodology
To investigate the complex, interconnected, and uncertain impact of TM
on AVs cybersecurity, we used a CLD-based SD approach, a technique that
has the potential to investigate the system-level cybersecurity implications
of self-driving cars [8, 12]. CLD visualises model composition using
intuitive graphical diagrams, determines key factors, generates feedback
loops, and identifies a system archetype. The use of system archetypes
enables the efficient improvement of systems. System archetypes may be
used as a diagnostic tool to identify behavioural patterns that have
developed in an undesirable situation. CLD is used to assess the security of
SAE 4 (or higher) self-driving vehicles through the lens of a functional
pathway [13].
3. Proposed structure of the Causal Loop Diagram
The model variables and their mapping are based on solid innovation
theory, i.e., meta-exploratory quantitative analysis of post-2010 literature
derived from various sources, including peer-reviewed journal databases,
books, doctoral dissertations, and credible company surveys, augmented
with forward and backward snowballing. This leads to identifying critical
avenues that are crucial to assessing the impact of TM on AVs cyber-safety
research. The next section describes each parameter's scope, significance,
and influence in the model, as well as giving references.
Additional aspects such as regulations, human factors, and trust are
outside the scope of this study. This choice is mainly motivated by the need
for a restricted border when assessing limited parameters as well as the non-
geographical character of the SD model, although these features are
essential for future research.
3.1 The Causal Loop Diagram (CLD) development
The CLD consists of nodes and edges. Nodes represent the variables, and
edges represent the relationships between the variables. In a positive causal
relationship, both nodes increase in the same direction. In a negative
connection, on the other hand, when one node expands, the other shrinks,
meaning that the two variables move in opposing directions. The two closed
cycles, reinforcing and balancing, are essential features of CLDs.
Reinforcing loop: change in one direction is compounded by additional
change, and balancing loop: change in one direction is countered by a
change in the opposite direction. The arrow with two small lines indicates
the presence of a delay sign. The loops come together to form a system
archetype.
The proposed architecture of the CLD for TM in the AVs cybersecurity is
depicted in Figure 1. The scope of the various variables covered in CLD
(Figure 1) is detailed in a tabular explanation in Table 1, along with
references. The link between dependent and independent variables is shown
in Table 1 in terms of cause and effect. Additionally, it describes the process
of possible effect, its polarity (positive or negative influence), and visualises
the uncertainty. Because there is a dearth of empirical evidence, the
uncertainty rating in Table 1 is based on the synthesis of available literature
and logical conjecture.
Table 1: Factors influencing TM in AVs cybersecurity in the CLD.
Independent Variable
Dependent
Variable
Impact as Process
Uncertainty
Polarity
Sources
Technology Maturity
(TM)
V2X
communication
cybersecurity
TM, which assesses the
communication framework
of CAVs and demonstrates
its capabilities, is triggered
by the level of technology,
procedures, qualified
personnel and information.
Defence Science and
Technology Group in
Australia spotlighted the
nine-level of estimating the
maturity of technologies
during the acquisition phase
of a program. Innovation in
technology maturity will
lead to more secured V2X
communication.
Medium
+
[14, 15].
V2X communication
cyber-security
Resilience to
cyber-attacks
CAVs communication is the
primary interface for cyber-
attacks. A potential breach
of V2X communication
security reduces robustness;
results in the incorrect
location, incorrect speed
value, and incorrect route
adaptation to full CAVs
communication blockage.
High
+
[16-19].
Resilience to cyber-
attacks
AVs
Communication
Cyber Safety
A highly robust CAVs
communication network is
less vulnerable to attacks
and is incredibly difficult for
hackers to infiltrate. A
network more robust to
attacks will enhance the
CAVs cybersecurity, given
their hybrid nature of
attacks, i.e. cyber and
physical.
High
+
[20, 21]
AVs Communication
Cyber Safety
Probability of
Hacks
Defended
A highly robust CAVs
communication framework
is less vulnerable to attacks
and is incredibly difficult for
hackers to infiltrate.
Additionally, Unnamed
Aerial Vehicles may
function as an ad-hoc, cost-
High
+
[22-28]
effective
telecommunications
network, allowing CAVs to
communicate in
mountainous or dark
regions. For instance, the
use of UAVs in conjunction
with 5G networks, both for
access and backhaul,
Probability of Hacks
Defended
Successful
Cyber-Attacks
The high number of hacks
being defended will
minimise the number of
successful CAVs cyber-
attacks.
High
-
Successful cyber-attacks
Log Files
Preservation
CAV's network
observability is primarily
based on log files. All CAV
activities in ITS are
documented in log files.
Cyber-assaults-valuable
input to log file preservation
-can serve as lessons learned
and aid in investigating
hacker attacks and
motivations.
Medium
+
[29]
Log Files Preservation
Technology
Maturity
Retaining log files for all
CAVs interactions for a
specified period would
improve ITS reliability,
protect CAVs cybersecurity
posture of cloud computing
environments, and enhance
CAVs decision-making
Medium
+
[30]
Log files preservation
The hacker's
ability
Preservation of log files over
a specified period for all
CAVs interactions, i.e.,
physical and communication
data file with stringent
privilege access. The
rationale is threefold; i) data
files are useful input as
information to TRM, ii)
enhance cybersecurity
lessons learned could
facilitate the handling and
investigation of hacker
attacks and motives, iii)
robust evidence in assessing
insurance liabilities.
However, the CAVs log file
protection is also a potential
risk, i.e., sweet data for the
hacktivists.
High
+
[29-31]
Figure 1 : The CLD system architecture.
4. Model Qualitative Analysis: Loops and System archetype.
CLDs conceptualise dynamic systems coherently in order to enable
comprehension of the interdependence of TM in the cybersecurity context of
AVs. The loops propose a "system archetype" that reveals the system's
underlying constraints by indicating intervention possibilities, enabling the
development of relevant policy proposals [8]. The following sub-sections
describe various feedback loops and the envisoned system archetype.
BL#1: Figure 2a illustrates BL #1, in which TM amplifies AVs-CS,
increases Resilience to Attacks owing to advancements in V2X security.
Similarly, it illustrates how the technological innovation would be able to
withstand cyber-attacks due to the higher Probability of Hacks Defended.
RL #1: Figure 2b shows RL#1, in which Log-Files-Preservation strengthen
TM. The increase in TM enables the Hacker's ability to lift the Successful-
cyber-attacks. However, the attacks provide a valuable source of log files
due to the lesson learned.
RL#2: Figure 2c depicts the process described in RL #2, in which
Successful-cyber-attacks allow malicious actors to "weaponise." Moreover,
the experience and knowledge obtained throughout the battle on the design
of AVs and cloud computing dataflow might be used to attack any future
flaws. Additionally, the log file records all AVs operations in road
transportation: from user behaviour to communication architecture and is a
goldmine for hackers.
4.5 Holistic View: Fixes-that-Fail system archetype
The loops envision a system archetype that elucidates underlying system
constraints by emphasising intervention opportunities. Figure 3 depicts a
holistic view and is related to the "Fixes-that-Fail" archetype: which is used
to express and analyse instances where a remedy has unanticipated long-
term effects on the system's behaviour, demanding further solutions.
In terms of AVs cybersecurity, it refers to the technique by which the
industry mitigates the perceived cybersecurity danger posed by hackers by
increasing the resilience of AVs communication to assaults, thereby
lessening successful attacks, referred to as BL#1. However, hackers,
unintentionally, gain from advanced technology as well. Hackers employ
technology to augment their powers, most often to the point where the
perceived
a. Balancing loop #1
danger is completely restored. Thus, the reinforcement cycle, shown by
RL#1 and RL#2, continues. Increased hacker capability is an unintended
result of TM, demanding further mitigation measures. Breaking the pattern
of "Fixes-that-fail" demands an understanding that mending just alleviates a
system's symptoms and a commitment to tackle the underlying issue.
b. Reinforcing Loop #2
Figure 2: Feedback loops in CLD
Figure 3: Holistic view- "Fixes-that-Fail" system archetype
5. Discussions and policy recommendations
This paper aims to incorporate critical cross-disciplinary parameters that
dynamically assess the impact of TM on AVs' cybersecurity vs. hacker
ability. Recognising common structures, referred to as "system archetypes,"
is an important first step in the long-term deployment of AVs that is secure
and reliable. The core premise of system archetypes is that adverse
outcomes or side effects may be associated with common behavioural
patterns. The creation of a CLD-based SD model for evaluating the
influence of TM on the cybersecurity of AVs is crucial because it gives a
dynamic, linked perspective of the "whole picture."
The "Fixes-that-Fail" pattern illustrates how to cope with a hacker's ability
and elucidates the never-ending conflict between defenders and attackers in
AVs' cybersecurity. The hacking world is highly diversified, ranging from
hacktivists to individual hackers, as well as the participation of well-
established non-geographical organisations. Additionally, hacking is far
more attractive in the vulnerable Internet-on-Wheel environment (such as
AVs). Consequently, in addition to protecting the fundamentals of AV
technology, design, parameters, and driving models from the adversary, it is
critical to developing a systematic plan for defeating the AV hacker threat in
both the cyber and physical realms.
The most challenging aspect of this context is determining the trade-off
between five aspects: i) the natural growth of AV technology; ii)
stakeholders (communication service providers, road operators, automakers,
AV consumers, repairers, and the general public) access to AV technology;
iii) the measures to limit hackers' access to AV technology; iv) a pervasive
dynamic strategy for circumventing hackers' amplification; and v) the
efficient usage of AV operating logfiles [32].
6. Limitations and future extensions
While the proposed paradigm is comprehensive, thorough, and rigour-
filled, it does have certain limitations. The model's empirical evaluation is
complicated by data scarcity, a high degree of uncertainty, and the
subjectivity inherent in TM. As a result, the coming phases may include
data gathering in order to conduct a quantitative assessment of the model.
The main source will be a survey of qualified subject professionals,
supplemented by pilot programmes like Australia's "Austroads Future
Vehicles & Technology Program" [33]. On the other hand, qualitative
research may still be the most popular choice for a few more years, until the
right amount of data is available.
7. Conclusions
This paper proposes a CLD-based SD model that incorporates key inter-
disciplinary variables and evaluates the impact of TM on AVs' cybersecurity
in a dynamic and integrated manner. The CLD model illustrate three
feedback loops: BL#1 shows how TM improves resistance to cyberattacks;
the RL#1 describes how TM helps hackers become more skilled; and the
RL#2 demonstrates how successful cyberattacks and AV data files allow
malicious actors to "weaponise." Based on three feedback loops a system
archetype, "Fixes-that-Fail" is envisioned, in which the growth in hacker
capability, an unintended result of technology maturity, demands constant
mitigation efforts. The method used is believed to open up new avenues for
the research community's methodical exploration of complex systems like
AVs, while the recommendation serves as a first-order analysis for AVs
cybersecurity.
References
1. McKinsey, 'Monetizing Car Data, New Service Business Opportunities to Create New
Customer Benefits',
https://www.mckinsey.com/~/media/mckinsey/industries/automotive%20and%20asse
mbly/our%20insights/monetizing%20car%20data/monetizing-car-data.ashx, 2016, ,
accessed on Feb 4, 2022.
2. Khan, S.K., Shiwakoti, N., Stasinopoulos, P., and Chen, Y., 'Cyber-Attacks in the
Next-Generation Cars, Mitigation Techniques, Anticipated Readiness and Future
Directions', Accident Analysis & Prevention, 2020, 148, p. 105837.
3. He, Q., Meng, X., Qu, R., and Xi, R., 'Machine Learning-Based Detection for Cyber
Security Attacks on Connected and Autonomous Vehicles', Mathematics, 2020, 8, (8),
p. 1311.
4. Khan, S.K., Shiwakoti, N., Stasinopoulos, P., and Matthew, W., Security Assessment
in Vehicle-to-Everything Communications with the Integration of 5g and 6g
Networks', 2021 International Symposium on Computer Science and Intelligent
Controls (ISCSIC), (2021)
5. Khan, S.K., Shiwakoti, N., Stasinopoulos, P., and Matthew, W., Dynamic Assessment
of Regulation and Policy Framework in the Cybersecurity of Connected and
Autonomous Vehicles', in https://www.researchgate.net/profile/Shah-Khalid-
Khan/publication/357017370_Dynamic_assessment_of_regulation_and_policy_frame
work_in_the_cybersecurity_of_Connected_and_Autonomous_Vehicles/links/61bbaf1
4a6251b553ac3d301/Dynamic-assessment-of-regulation-and-policy-framework-in-
the-cybersecurity-of-Connected-and-Autonomous-Vehicles.pdf (ed.), In Australasian
Transport Research Forum, ATRF 2021-Proceedings, (2021)
6. CouncilLaw, 'Strengthening Australia’s Cyber Security Regulations and Incentives', ,
accessed on Feb 4, 2022, 2021,
https://www.lawcouncil.asn.au/publicassets/ea4a4407-0615-ec11-9440-
005056be13b5/4089%20-%20Strengthening%20cyber%20security.pdf.
7. Forrester, J.W., 'Industrial Dynamics. A Major Breakthrough for Decision Makers',
Harvard business review, 1958, 36, (4), pp. 37-66.
8. Sterman, J., 'Business Dynamics: Systems Thinking and Modeling for a Complex
World Mcgraw Hill Ny', 2000.
9. Nazareth, D.L. and Choi, J., 'A System Dynamics Model for Information Security
Management', Information Management science, 2015, 52, (1), pp. 123-134.
10. Khan, S.K., Shiwakoti, N., and Stasinopoulos, P., 'A Conceptual System Dynamics
Model for Cybersecurity Assessment of Connected and Autonomous Vehicles',
Accident Analysis & Prevention, 2021.
11. Khan, S.K., Shiwakoti, N., Stasinopoulos, P., and Matthew, W., 'Modelling
Cybersecurity in Connected and Autonomous Vehicles ', 2022.
12. Stasinopoulos, P., Shiwakoti, N., and Beining, M., 'Use-Stage Life Cycle Greenhouse
Gas Emissions of the Transition to an Autonomous Vehicle Fleet: A System
Dynamics Approach', Journal of Cleaner Production, 2020, p. 123447.
13. SAE-International, 'Taxonomy and Definitions for Terms Related to Driving
Automation Systems for on-Road Motor Vehicles', 2018.
14. Vimmerstedt, L.J., Bush, B.W., and Peterson, S.O., Dynamic Modeling of Learning in
Emerging Energy Industries: The Example of Advanced Biofuels in the United
States', (NREL (National Renewable Energy Laboratory (NREL), 2015)
15. Australia-Goverment, 'Technology Readiness Level Definition', Defence Science and
Technology Group, 2020,
https://www.dst.defence.gov.au/sites/default/files/basic_pages/documents/TRL%20E
xplanations_1.pdf.
16. Raiyn, J., 'Data and Cyber Security in Autonomous Vehicle Networks', Transport and
Telecommunication 2018, 19, (4), pp. 325-334.
17. Liu, L., Wu, B., and Shi, W., 'A Comparison of Communication Mechanisms in
Vehicular Edge Computing', in, 3rd {USENIX} Workshop on Hot Topics in Edge
Computing (HotEdge 20), (2020)
18. Muhammad, M. and Safdar, G.A., 'Survey on Existing Authentication Issues for
Cellular-Assisted V2x Communication', Vehicular Communications, 2018, 12, pp.
50-65.
19. Al Zaabi, A.O., Yeun, C.Y., and Damiani, E., 'Autonomous Vehicle Security:
Conceptual Model', in, 2019 IEEE Transportation Electrification Conference and
Expo, Asia-Pacific (ITEC Asia-Pacific), (IEEE, 2019)
20. Tu, H., Xia, Y., Wu, J., and Zhou, X., 'Robustness Assessment of CyberPhysical
Systems with Weak Interdependency', Physica A: Statistical Mechanics its
Applications, 2019, 522, pp. 9-17.
21. Qiu, T., Liu, J., Si, W., and Wu, D.O., 'Robustness Optimization Scheme with Multi-
Population Co-Evolution for Scale-Free Wireless Sensor Networks', IEEE/ACM
Transactions on Networking, 2019, 27, (3), pp. 1028-1042.
22. Khan, S.K., Naseem, U., Siraj, H., Razzak, I., and Imran, M., 'The Role of Unmanned
Aerial Vehicles and Mmwave in 5g: Recent Advances and Challenges', Transactions
on Emerging Telecommunications Technologies, 2020, p. e4241.
23. Khan, S.K., Naseem, U., Sattar, A., Waheed, N., Mir, A., Qazi, A., and Ismail, M.,
'Uav-Aided 5g Network in Suburban, Urban, Dense Urban, and High-Rise Urban
Environments', in, 2020 IEEE 19th International Symposium on Network Computing
and Applications (NCA), (IEEE, 2020)
24. Khan, S.K., Farasat, M., Naseem, U., and Ali, F., 'Performance Evaluation of Next-
Generation Wireless (5g) Uav Relay', Wireless Personal Communications, 2020, 113,
(2), pp. 945-960.
25. Khan, S.K., Al-Hourani, A., and Chavez, K.G., 'Performance Evaluation of Amplify-
and-Forward Uav Relay in Millimeter-Wave', in, 2020 27th International Conference
on Telecommunications (ICT), (IEEE, 2020)
26. Khan, S.K., 'Mathematical Framework for 5g‐Uav Relay', Transactions on Emerging
Telecommunications Technologies
2020, p. e4194.
27. Khan, S.K., 'Performance Evaluation of Next Generation Wireless Uav Relay with
Millimeter-Wave in Access and Backhaul', Master Thesis, School of Engineering,
RMIT University, Melbourne, Australia, 2019.
28. Khan, S.K., Farasat, M., Naseem, U., and Ali, F., 'Link‐Level Performance Modelling
for Next-Generation Uav Relay with Millimetre‐Wave Simultaneously in Access and
Backhaul', Indian Journal of Science Technology, 2019, 12, (39), pp. 1-9.
29. Dimitriadis, A., Ivezic, N., Kulvatunyou, B., and Mavridis, I., 'D4i-Digital Forensics
Framework for Reviewing and Investigating Cyber Attacks', Array, 2020, 5, p.
100015.
30. Prasad, R. and Rohokale, V., Cyber Security: The Lifeline of Information and
Communication Technology, (Springer, 2020)
31. Kent, A.D., Cyber Security Data Sources for Dynamic Network Research', Dynamic
Networks and Cyber-Security, (World Scientific, 2016)
32. Khan, S.K., Shiwakoti, N., Stasinopoulos, P., and Matthew, W., 'Governing
Connected and Automated Vehicles: Cybersecurity Regulations and Operational
Framework ', 2022.
33. Austroads, 'Austroads' Future Vehicles & Technology Program', Austroads, 2021,
https://austroads.com.au/drivers-and-vehicles/future-vehicles-and-technology/trials.
... There are three broad categories of model fit in literature: incremental fit, absolute fit, and parsimonious fit [6]. The following criteria in Table 8 have been defined for model acceptance on the suggested literature [35]. The following measurement model in Figure 3 depicts the results of each latent variable (constructs) shown in oval shapes. ...
Article
Full-text available
The integration of Autonomous Vehicles (AVs) into modern systems of transportation brings with it a new and transformative era. Central to the successful realisation of this transformation is the public’s trust in these vehicles and their safety, particularly in the aftermath of cyber security breaches. The following research therefore explores the various factors underpinning this trust in the context of cyber security incidents. A dual-methodological approach was used in the study. Quantitative data was gathered from structured questionnaires distributed to and completed by a cohort of 151 participants and qualitative data, from comprehensive semi-structured interviews with AV technology and cyber security experts. Rigorous Structural Equation Modelling of the quantitative data then allowed for the identification of the key factors influencing public trust from the standpoint of the research participants including the perceived safety of AV technology, the severity of cyber security incidents, the historic cyber security track record of companies and the frequency of successful cyber security breaches. The role of government regulations, though also influential, emerged as less so. The qualitative data, processed via thematic analysis, resonated with the findings from the quantitative data. This highlighted the importance of perceived safety, incident severity, regulatory frameworks and corporate legacy in shaping public trust. Whilst cyber incidents no doubt erode trust in AVs, a combination of technological perception, regulatory scaffolding and corporate history critically impacts this. These insights are instrumental for stakeholders, from policymakers to AV manufacturers, in charting the course of AV assimilation successfully in future.
... These six avenues are: i) CAVs communication framework, ii) secured physical access, iii) human factors, iv) CAVs penetration, v) regulatory laws and policy framework, and iv) trust-across the CAVsindustry and among the public. Similar the same authors (Khan et al., 2022a) proposes a CLDbased SD model that incorporates key inter-disciplinary variables and evaluates the impact of TM on AVs' cybersecurity in a dynamic and integrated manner. Moreover, Khan et al. (2022c) developed an SD model for strategic cybersecurity assessment in the CAVs roll-out. ...
Conference Paper
Full-text available
CAVs (Connected and Autonomous Vehicles) technology will transform the current Intelligent Transportation System (ITS). However, the most significant challenge is keeping up the criminal justice system, particularly the Regulation and Policy Framework (R&PF) in ITS, because ubiquitous CAVs connectivity expands the scope of criminal activity in both the physical and cyberspace realms. This article developed a Causal Loop Diagram-based System Dynamic model that incorporates critical inter-disciplinary parameters and dynamically evaluates the impact of R&PF on CAVs cybersecurity. Two loops are envisioned: "balancing loops" demonstrate how R&PF can facilitate cyber-attacks prevention, whereas "reinforcing loops" reveal how imposing R&FP can negate its potential benefits by creating a detrimental parallel circle. Based on the feedback loops, a "shifting the burden" system archetype is postulated in which governments combat cyber-threats by strengthening R&PF while also reducing CAVs adaptation through imitation and induction. Recommendations for R&PF formulation include a balanced approach to the trade-off between: i) protection of CAV users' privacy and freedom, ii) operational and data accessibility constraints on CAV automakers and service providers, as well as their business investment protection, and iii) state regulators command and control thresholds.
Article
Full-text available
The technological advancements of Connected and Automated Vehicles (CAVs) are outpacing the current regulatory regime, potentially resulting in a disconnect between legislators, technology, and CAV stakeholders. Although many studies explore the regulatory requirements of operations of CAVs, studies on regulatory challenges specific to the cybersecurity of CAVs are also emerging and receiving lots of attention among researchers and practitioners. However, studies providing an up-to-date synthesis and analysis on CAVs regulatory requirements specific to cyber-risk reduction or mitigation are almost non-existent in the literature. This study aims to overcome this limitation by presenting a comprehensive overview of the role of key Intelligent Transportation Systems (ITS) stakeholders in CAV's cybersecurity. These stakeholders include road operators, service providers, automakers, consumers, repairers, and the general public. The outcome of this review is an in-depth synthesis of CAV-based ITS stakeholders by visualising their scope in developing a Cybersecurity Regulatory Framework (CRF). The study demonstrated the compliance requirements for ITS communication service providers, regulatory standards for CAVs automakers, policy readiness for CAVs customers and the general public who interact with CAVs, and the role of the CAVs Network Operator Centre in regulating CAVs data flow. Moreover, the study illuminates several critical pathways necessary in future for synthesizing and forecasting the legal landscape of CAV-based transportation systems to integrate the regulatory framework for CAV stakeholders. The paper's findings and conclusions would assist policymakers in developing a comprehensive CRF.
Article
Full-text available
Technological advancements in Connected and Automated Vehicles (CAVs), particularly the integration of diverse stakeholder groups (communication service providers, road operators, automakers, repairers, CAV consumers, and the general public) and the pursuit of new economic opportunities, have resulted in the emergence of new technical, legal, and social challenges. The most pressing challenge is deterring criminal behaviour in both the physical and cyber realms through the adoption of CAV cybersecurity protocols and regulations. However, the literature lacks a systematic decision tool to analyze the impact of the potential cybersecurity regulations for dynamically interacting stakeholders, and to identify the leverage points to minimise the cyber-risks. To address this knowledge gap, this study uses systems theory to develop a dynamic modelling tool to analyze the indirect consequences of potential CAVs cybersecurity regulations in the medium to long term. It is hypothesized that CAVs Cybersecurity Regulatory Framework (CRF) is the property of the entire ITS stakeholders. The CRF is modelled using the System Dynamic based Stock-and-Flow-Model (SFM) technique. The SFM is founded on five critical pillars: the Cybersecurity Policy Stack, the Hacker's Capability, Logfiles, CAV Adopters, and intelligence-assisted traffic police. It is found that decision-makers should focus on three major leverage points: establishing a CRF grounded on automakers' innovation; sharing risks in eliminating negative externalities associated with underinvestment and knowledge asymmetries in cybersecurity; and capitalising on massive CAV-generated data in CAV operations. The formal integration of intelligence analysts and computer crime investigators to strengthen traffic police capabilities is pivotal. Recommendations for automakers include data-profiteering in CAV design, production, sales, marketing, safety enhancements and enabling consumer data transparency. Furthermore, CAVs-CRF necessitate a balanced approach to the trade-off between: i) data accessibility constraints on CAV automakers and ITS service providers; ii) regulator command and control thresholds; iii) automakers' business investment protection; and iv) consumers' data privacy guard.
Conference Paper
Full-text available
In Vehicle-to-Everything Communications (V2X-C), the integration of high throughput, reduced latency-5G and Artificial Intelligence (AI) enabled-6G would add new levels to smart mobility. However, it would introduce a multitude of new vulnerabilities in the form of cyber-attacks. Therefore, a robust V2X-C cyber-safe framework that considers cross-industry information-sharing mechanisms must be proactively developed and evaluated. This study aims to provide a comprehensive security assessment in V2X-C with the integration of 5G and 6G networks. The evolution of V2X-C is outlined and vehicular connectivity in a consolidated manner is demonstrated, visualising all communication interfaces. The Quality of Service (QoS) vs. security provisions for next-generation cars is illustrated. The security and privacy challenges that would be evident after the convergence of the 5G and 6G networks in V2X-C architecture is then described. Lastly, state-of-the-art V2X-C security enhancement mechanisms for a cyber-safe ITS operation is detailed. It is believed that the findings and discussions from this study could be used for decision-making and would stimulate a roadmap for a secure V2X-C architecture.
Conference Paper
Full-text available
CAVs (Connected and Autonomous Vehicles) technology will transform the current Intelligent Transportation System (ITS). However, the most significant challenge is keeping up the criminal justice system, particularly the Regulation and Policy Framework (R&PF) in ITS, because ubiquitous CAVs connectivity expands the scope of criminal activity in both the physical and cyberspace realms. This article developed a Causal Loop Diagram-based System Dynamic model that incorporates critical inter-disciplinary parameters and dynamically evaluates the impact of R&PF on CAVs cybersecurity. Two loops are envisioned: "balancing loops" demonstrate how R&PF can facilitate cyber-attacks prevention, whereas "reinforcing loops" reveal how imposing R&FP can negate its potential benefits by creating a detrimental parallel circle. Based on the feedback loops, a "shifting the burden" system archetype is postulated in which governments combat cyber-threats by strengthening R&PF while also reducing CAVs adaptation through imitation and induction. Recommendations for R&PF formulation include a balanced approach to the trade-off between: i) protection of CAV users' privacy and freedom, ii) operational and data accessibility constraints on CAV automakers and service providers, as well as their business investment protection, and iii) state regulators command and control thresholds.
Article
Full-text available
Next‐generation wireless communication networks, in particular, the densified 5G will bring many developments to the existing telecommunications industry. The key benefits will be the higher throughput and very low latency. In this context, the usage of unmanned aerial vehicle (UAV) is becoming a feasible option for deploying 5G services on demand. At the same time, the immense bandwidth potential of mmWave has strengthened its performance in radio communication. In this article, we provide a consolidated synthesis on the role of UAVs and mmWave in 5G, emphasis on recent developments and challenges. The review focuses on UAV relay architectures, identifies the relevant problems and limitations in the deployment of UAVs using mmWave in both access and backhaul links simultaneously. There is a critical analysis of the optimum placement of the UAVs as a relay with a focus on the mmWave band. The distinctive rich characteristics of the mmWave propagation and scattering are presented. We also synthesis mmWave path loss models. Then, the scope of artificial intelligence and machine learning techniques as an efficient solution for combating the dynamic and complex nature of UAV‐based cellular communication networks are discussed. In the end, security and privacy issues in UAV‐based cellular network are spotlighted. It is believed that the literature discussed, and the findings reached in this article are of significant importance to researchers, application engineers and decision‐makers in the designing and deployment of UAV‐supported 5G network.
Article
Full-text available
Unmanned aerial vehicle's (UAVs) small size, long-lasting battery, and flexible trajectory have produced widespread applications in radio communication systems, especially its usage as a cellular tower (gNB) for 5G services. At the same time, the mmWave's enormous available bandwidth makes it the primary contender for next-generation communication networks. This article aims to synthesize and assess the usage of mmWave concurrently in backhaul and access links for amplify-and-forward (AF) relay installed on the UAV. A mathematical framework is developed for the received power of the user equipment (UE) obtained in relay path (gNB-UAV-UE) and direct path (gNB-UE) via; (i) free space, and (ii) log-distance path loss model. The International Telecommunication Union recommended city model is used to assess the likelihood for LoS and NLoS paths in four urban environments; (i) high-rise urban, (ii) dense urban, (iii) urban, and (iv) suburban. Furthermore , various parameters, that is, UAV's position and amplification factor are stipulated to optimize the efficiency of a UAV-based AF relay for enhanced users coverage.
Conference Paper
Full-text available
A topic of interest to researchers and engineers alike is the potential of using Unmanned Aerial Vehicle (UAV) as a relay base station in cellular communication. The driving factor behind its use is the innovations in wireless communication technologies, in particular the upcoming 5G network. The superlow latency and enormous bandwidth availability in millimeterwave triggers the usefulness of UAV deployment in Mobile Ad- Hoc Networks (MANET). This paper is a brief experimental review on ray-tracing simulation for a UAV-aided 5G network. The objective of this paper is to assess the usage of UAV in next-generation wireless networks, i.e., deploying UAV as a relay using millimeter-wave concurrently in backhaul and access links. Ray-tracing simulations are used to synthesise the coverage of UAV-aided base station (UAV) in three scenarios; i) UAV elevation, ii) UAV horizontal variation, and iii) UAV base station elevation and horizontal variation-simultaneously. In all three scenarios, the optimum placement of UAV for enhanced User (UE) coverage is spotlighted. In addition, the significance of the amplification factor in the relay path is illustrated. It is believed that the findings reached in this paper are of great value to 5G ad-hoc network planners.
Article
Emerging Connected and Autonomous Vehicles (CAVs) technology have a ubiquitous communication framework. It poses security challenges in the form of cyber-attacks, prompting rigorous cybersecurity measures. There is a lack of knowledge on the anticipated cause-effect relationships and mechanisms of CAVs cybersecurity and the possible system behaviour, especially the unintended consequences. Therefore, this study aims to develop a conceptual System Dynamics (SD) model to analyse cybersecurity in the complex, uncertain deployment of CAVs. Specifically, the SD model integrates six critical avenues and maps their respective parameters that either trigger or mitigate cyber-attacks in the operation of CAVs using a systematic theoretical approach. These six avenues are: i) CAVs communication framework, ii) secured physical access, iii) human factors, iv) CAVs penetration, v) regulatory laws and policy framework, and iv) trust—across the CAVs-industry and among the public. Based on the conceptual model, various system archetypes are analysed. “Fixes that Fail”, in which the upsurge in hacker capability is the unintended natural result of technology maturity, requires continuous efforts to combat it. The primary mitigation steps are human behaviour analysis, knowledge of motivations and characteristics of CAVs cyber-attackers, CAVs users and Original Equipment Manufacturers education. “Shifting the burden”, where policymakers counter the perceived cyber threats of hackers by updating legislation that also reduces CAVs adaptation by imitations, indicated the need for calculated regulatory and policy intervention. The “limits to success” triggered by CAVs penetration increase the defended hacks to establish regulatory laws, improve trust, and develop more human analysis. However, it may also open up caveats for cyber-crimes and alert that CAVs deployment to be alignment with the intended goals for enhancing cybersecurity. The proposed model can support decision-making and training and stimulate the roadmap towards an optimized, self-regulating, and resilient cyber-safe CAV system.