Study 1
Study 1
Available online at
journal homepage:
Kyounggon Kim a,c, Jun Seok Kim a, Seonghoon Jeong a, Jo-Hee Park b,
Huy Kang Kim a,∗
a
School of Cybersecurity, Korea University, Seoul, Republic of Korea
b
TMS security TFT, Hyundai Motor Company, Republic of Korea
c
Department of Forensics Science, Naif Arab University for Security Sciences, Riyadh, Kingdom of Saudi Arabia
A R T I C L E I N F O A B S T R A C T
Article history:
As technology has evolved, cities have become increasingly smart. Smart mobility is a
Received 11 February 2020
crucial element in smart cities, and autonomous vehicles are an essential part of smart
Revised 19 August 2020
mobility. However, vulnerabilities in autonomous vehicles can be damaging to quality of
Accepted 10 December 2020
life and hu- man safety. For this reason, many security researchers have studied attacks
Available online 5 January 2021
and defenses for autonomous vehicles. However, there has not been systematic research
on attacks and defenses for autonomous vehicles. In this survey, we analyzed previously
Keywords: conducted attack and defense studies described in 151 papers from 2008 to 2019 for a
Smart city systematic and compre- hensive investigation of autonomous vehicles. We classified
Smart mobility autonomous attacks into the three categories of autonomous control system, autonomous
Autonomous vehicle artificial driving systems components, and vehicle-to-everything communications. Defense against
intelligence security survey such attacks was classified into security architecture, intrusion detection, and anomaly
detection. Due to the development of big data and communication technologies,
techniques for detecting abnormalities using artificial intelligence and machine learning are
gradually being developed. Lastly, we provide implications based on our systemic survey
that future research on autonomous attacks and defenses is strongly combined with
artificial intelligence and major component of smart cities.
∗
Corresponding author.
E-mail addresses: a n e s r a @ k o r e a . a c . k r (K. Kim), s e o n g h o o n @ k o r e a . a c . k r (S. Jeong), c e n d a @ k o r e a . a c . k r (H.K. Kim).
https://doi.org/10.1016/j.cose.2020.102150
0167-4048/© 2021 Elsevier Ltd. All rights reserved.
Table 1 – Counts of selected papers from 2008 to 2019.
Table 2 – Inter-vehicle wired interconnection technologies in autonomous driving (Wang et al., 2018).
Low-Speed High-Speed
Component Functionality Comm. bus Comm. bus
ECM Engine control module. Uses information from sensors to determine the V
amount of fuel, ignition timing, and other engine parameters.
EBCM Electronic break-control module. Controls the anti-lock brake system V
pump motor and values, preventing brakes from locking up and
skidding by regulating hydraulic pressure.
TCM Transmission control module. Controls electronic transmission using V
data from sensors and from the engine control modules to determine
when and how to change gears.
BCM Body control module. Controls various vehicle functions, provides V V
information to occupants, and acts as firewall between two subnets.
Telematics Telematics module. Enables remote data communication with vehicles V V
via a cellular link
RCDLR V
Remote-control door lock receiver. Receives the signal from the car’s key
to lock and unlock doors and trunk. It also receives data wirelessly
from the tire pressure monitoring system sensors.
HVAC V
Heating, ventilation, and air conditioning. Controls the cabin
environment.
SDM V
Inflatable restraint sensing and diagnostic module. Controls airbags and
seat belt pretensioners.
IPC/DIC V
Instrument panel cluster/driver information center. Displays information to
the driver about speed, fuel level, and various alerts about car’s status.
Radio V
Radio. In addition to regular radio functions, funnels and generates
TDM most of the in-cabin sounds (beeps, buzzes, and chimes) V
Theft-deterrent module. Prevents vehicle from starting without
legitimate key.
Garcia et al. (2016) described the vulnerability of a vehi- real challenge from a
cle immobilizer (key) used primarily by vehicle manufacturers
and original equipment manufacturers. First, they recovered
encryption algorithms and keys to and from the immobilizer.
Next, a VW Group remote-control signal was transmitted us-
ing the recovered key, and the signal sent from the vehicle
was eavesdropped upon to allow arbitrary access to the
vehicle. This attack can recover the encryption key and
replicate the remote-control key with four to eight rolling
codes and a short calculation time. The results of this study
affected millions of vehicles worldwide and are now
considered a significant com- ponent of physical vehicle
security.