h-index: 18     i10-index: 25

Cybersecurityin Autonomous Systems: Threats, ‎Vulnerabilities, and Defense Mechanisms

Document Type : Original Research Article

Author

Department of Law, Florida International University, Florida, U.S.A

Abstract
There is the rapid evolution of autonomous systems, including autonomous vehicles, drones, and smart infrastructure, that has revolutionized industries through enhanced efficiency, precision, and scalability. It has, however, been accompanied by significant cybersecurity risks. Autonomous systems are susceptible to all types of cyber-attacks because of their connectivity to networks, including data tampering, sensor spoofing, denial-of-service attacks, and unauthorized access to control systems. These vulnerabilities stem from the integration of complex software architectures, communications networks, and sensor suites that offer a number of attack surfaces to malicious agents. This study provides a comprehensive assessment of the primary cybersecurity threats and vulnerabilities in autonomous systems, with an emphasis on their ability to affect safety, privacy, and operational integrity. Moreover, it analyzes state-of-the-art protection methods, including intrusion detection systems, encryption protocols, anomaly-based monitoring, and machine learning-based threat prevention methods. By presenting real case studies and current research advances, this study advocates for the urgent need for secure, adaptive, and multi-level security architectures for safeguarding autonomous systems against new and rising cyber threats. The findings stress the importance of coordination among cybersecurity researchers, system engineers, and policy makers to ensure the secure and dependable introduction of autonomous technologies into mission-critical applications.

Keywords

Subjects


OPEN ACCESS

©2025 The author(s). This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this license, visit: http://creativecommons.org/licenses/by/4.0/

[1]. F. Jameel, Z. Chang, J. Huang, T. Ristaniemi, Internet of autonomous vehicles: architecture, features, and socio-technological challenges, IEEE Wireless Communications, 2019, 26, 21-29. [Crossref], [Google Scholar], [Publisher]
[2]. E. Yağdereli, C. Gemci, A.Z. Aktaş, A study on cyber-security of autonomous and unmanned vehicles, The Journal of Defense Modeling and Simulation, 2015, 12, 369-381. [Crossref], [Google Scholar], [Publisher]
[3]. S. Parkinson, P. Ward, K. Wilson, J. Miller, Cyber threats facing autonomous and connected vehicles: Future challenges, IEEE Transactions on Intelligent Transportation Systems, 2017, 18, 2898-2915. [Crossref], [Google Scholar], [Publisher]
[4]. V.K. Kukkala, S.V. Thiruloga, S. Pasricha, Roadmap for cybersecurity in autonomous vehicles, IEEE Consumer Electronics Magazine, 2022, 11, 13-23. [Crossref], [Google Scholar], [Publisher]
[5]. J. Petit, S.E. Shladover, Potential cyberattacks on automated vehicles, IEEE Transactions on Intelligent transportation systems, 2014, 16, 546-556. [Crossref], [Google Scholar], [Publisher]
[6]. M. Chowdhury, M. Islam, Z. Khan, Security of connected and automated vehicles, arXiv Preprint Arxiv:2012.13464, 2020. [Crossref], [Google Scholar], [Publisher]
[7]. F. Jahan, W. Sun, Q. Niyaz, M. Alam, Security modeling of autonomous systems: A survey, ACM Computing Surveys (CSUR), 2019, 52, 1-34. [Crossref], [Google Scholar], [Publisher]
[8]. A. Khadka, P. Karypidis, A. Lytos, G. Efstathopoulos, A benchmarking framework for cyber-attacks on autonomous vehicles, Transportation Research Procedia, 2021, 52, 323-330. [Crossref], [Google Scholar], [Publisher]
[9]. K. Kim, J.S. Kim, S. Jeong, J.H. Park, H.K. Kim, Cybersecurity for autonomous vehicles: Review of attacks and defense, Computers & security, 2021, 103, 102150. [Crossref], [Google Scholar], [Publisher]
[10]. X. Sun, F.R. Yu, P. Zhang, A survey on cyber-security of connected and autonomous vehicles (CAVs), IEEE Transactions on Intelligent Transportation Systems, 2021, 23, 6240-6259. [Crossref], [Google Scholar], [Publisher]
[11]. C. Gao, G. Wang, W. Shi, Z. Wang, Y. Chen, Autonomous driving security: State of the art and challenges, IEEE Internet of Things Journal, 2021, 9, 7572-7595. [Crossref], [Google Scholar], [Publisher]
[12]. M.C. Chow, M. Ma, Z. Pan, Attack models and countermeasures for autonomous vehicles, Intelligent Technologies for Internet of Vehicles, 2021, 375-401. [Crossref], [Google Scholar], [Publisher]
[13]. H.P.D. Nguyen, D.D. Nguyen, Drone application in smart cities: The general overview of security vulnerabilities and countermeasures for data communication, Development and Future of Internet of Drones (IoD): Insights, Trends and Road Ahead, 2021, 185-210. [Crossref], [Google Scholar], [Publisher]
[14]. J.P.A. Yaacoub, H.N. Noura, O. Salman, A. Chehab, Robotics cyber security: Vulnerabilities, attacks, countermeasures, and recommendations, International Journal of Information Security, 2022, 21, 115-158. [Crossref], [Google Scholar], [Publisher]
[15]. P. Ranaweera, A. Jurcut, M. Liyanage, MEC-enabled 5G use cases: A survey on security vulnerabilities and countermeasures, ACM Computing Surveys (CSUR), 2021, 54, 1-37. [Crossref], [Google Scholar], [Publisher]
[16]. T. Campisi, A. Severino, M.A. Al-Rashid, G. Pau, The development of the smart cities in the connected and autonomous vehicles (CAVs) era: From mobility patterns to scaling in cities, Infrastructures, 2021, 6, 100. [Crossref], [Google Scholar], [Publisher]
[17]. M.A. Ribeiro, D. Gursoy, O.H. Chi, Customer acceptance of autonomous vehicles in travel and tourism, Journal of Travel Research, 2022, 61, 620-636. [Crossref], [Google Scholar], [Publisher]
[18]. E.V. Brovarone, J. Scudellari, L. Staricco, Planning the transition to autonomous driving: A policy pathway towards urban liveability, Cities, 2021, 108, 102996. [Crossref], [Google Scholar], [Publisher]
[19]. A. Aldakkhelallah, M. Simic, Autonomous vehicles in intelligent transportation systems,  Human Centred Intelligent Systems: Proceedings of KES-HCIS 2021 Conference, Springer, 2021, pp. 185-198. [Crossref], [Google Scholar], [Publisher]
[20]. A. Ahmadpour, Investigating the economic feasibility of using a fuel cell for a chlor-alkali unit of a petrochemical company, Eurasian Journal of Chemical, Medicinal and Petroleum Research, 2024, 4, 42-55. [Google Scholar], [Publisher]
[21]. A. Ahmadpour, synthetic wastewater Treatment of methanol to propylene conversion unit by membrane bioreactor system, Eurasian Journal of Chemical, Medicinal and Petroleum Research, 2024, 3, 140-151. [Google Scholar], [Publisher]
[22]. A. Algarni, V. Thayananthan, Improvement of 5G transportation services with SDN-based security solutions and beyond 5G, Electronics, 2021, 10, 2490. [Crossref], [Google Scholar], [Publisher]
[23]. R.A. Shaikh, V. Thayananthan, Risk-based decision methods for vehicular networks, Electronics, 2019, 8, 627. [Crossref], [Google Scholar], [Publisher]
[24]. V. Thayananthan, J. Yazdani, Secure Cyber-Physical Systems for improving transportation facilities in Smart cities and industry 4.0, Secure Cyber-Physical Systems for Smart Cities, 2019, 1-26. [Crossref], [Google Scholar], [Publisher]
[25]. A. Gupta, S.K. Gupta, Flying through the secure fog: a complete study on UAV‐fog in heterogeneous networks, International Journal of Communication Systems, 2022, 35, e5237. [Crossref], [Google Scholar], [Publisher]
[26]. D. Sharma, S.K. Gupta, A. Rashid, S. Gupta, M. Rashid, A. Srivastava, A novel approach for securing data against intrusion attacks in unmanned aerial vehicles integrated heterogeneous network using functional encryption technique, Transactions on Emerging Telecommunications Technologies, 2021, 32, e4114. [Crossref], [Google Scholar], [Publisher]
[27]. S. Kumar, M.K. Chaube, S.N. Nenavath, S.K. Gupta, S.K. Tetarave, Privacy preservation and security challenges: a new frontier multimodal machine learning research, International Journal of Sensor Networks, 2022, 39, 227-245. [Crossref], [Google Scholar], [Publisher]
[28]. A. Alharbi, A. Alotaibi, L. Alghofaili, M. Alsalamah, N. Alwasil, S. Elkhediri, Security in social-media: awareness of phishing attacks techniques and countermeasures, 2022 2nd International Conference on Computing and Information Technology (ICCIT), IEEE, 2022, 10-16. [Crossref], [Google Scholar], [Publisher]
[29]. J. Chen, A.J. Gallo, S. Yan, T. Parisini, S.Y.R. Hui, Cyber-attack detection and countermeasure for distributed electric springs for smart grid applications, IEEE Access, 2022, 10, 13182-13192. [Crossref], [Google Scholar], [Publisher]
[30]. D. An, F. Zhang, Q. Yang, C. Zhang, Data integrity attack in dynamic state estimation of smart grid: Attack model and countermeasures, IEEE Transactions on Automation Science and Engineering, 2022, 19, 1631-1644. [Crossref], [Google Scholar], [Publisher
[31]. A. Bahalul Haque, B. Bhushan, A. Nawar, K.R. Talha, S.J. Ayesha, Attacks and countermeasures in IoT based smart healthcare applications, Recent advances in internet of things and machine learning: Real-world applications, 2022, 67-90. [Crossref], [Google Scholar], [Publisher]
[32]. M.N. Ahangar, Q.Z. Ahmed, F.A. Khan, M. Hafeez, A survey of autonomous vehicles: Enabling communication technologies and challenges, Sensors, 2021, 21, 706. [Crossref], [Google Scholar], [Publisher]
[33]. H. Bangui, M. Ge, B. Buhnova, L. Hong Trang, Towards faster big data analytics for anti‐jamming applications in vehicular ad‐hoc network, Transactions on Emerging Telecommunications Technologies, 2021, 32, e4280. [Crossref], [Google Scholar], [Publisher]
[34]. H. Bangui, M. Ge, B. Buhnova, Improving big data clustering for jamming detection in smart mobility, ICT Systems Security and Privacy Protection: 35th IFIP TC 11 International Conference, SEC 2020, Maribor, Slovenia, September 21–23, 2020, Proceedings 35, 2020, 78-91. [Crossref], [Google Scholar], [Publisher]
[35]. A. Samimi, Risk Management in EPC Projects, Eurasian Journal of Chemical, Medicinal and Petroleum Research 3, 2024, 191-201. [Crossref], [Google Scholar], [Publisher]
[36]. J. Renn, Einstein's invention of Brownian motion, Annalen der Physik, 2005, 517, 23-37. [Crossref], [Google Scholar], [Publisher]
[37]. S. Bokhari, S. Hamrioui, M. Aider, Cybersecurity strategy under uncertainties for an IoE environment, Journal of Network and Computer Applications, 2022, 205, 103426. [Crossref], [Google Scholar], [Publisher]
[38]. N.R. Potlapally, S. Ravi, A. Raghunathan, N.K. Jha, Analyzing the energy consumption of security protocols, Proceedings of the 2003 International Symposium on Low Power Electronics and Design, 2003, 30-35. [Crossref], [Google Scholar], [Publisher]
[39]. S.A. Oussous, F.Z. Hamza, S. Beloualid, A.E. Allali, A. Bajit, A. Tamtaoui, Green smart city intelligent and cyber-security-based iot transportation solutions for combating the Pandemic COVID-19, Computational Intelligence Techniques for Green Smart Cities, 2022, 129-146. [Crossref], [Google Scholar], [Publisher]
[40]. D. Said, M. Elloumi, L. Khoukhi, Cyber-attack on P2P energy transaction between connected electric vehicles: A false data injection detection-based machine learning model, IEEE access, 2022, 10, 63640-63647. [Crossref], [Google Scholar], [Publisher]
[41]. S. Srivastava, A. Tiwari, P.K. Srivastava, Review on quantum safe algorithms based on Symmetric Key and Asymmetric Key Encryption methods, 2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE), IEEE, 2022, 905-908. [Crossref], [Google Scholar], [Publisher]
Volume 6, Issue 2
Winter 2025
Pages 179-194

  • Receive Date 13 March 2025
  • Revise Date 23 March 2025
  • Accept Date 14 April 2025