Autonomous Vehicles Security AAM
Autonomous Vehicles Security AAM
Gueltoum Bendiab, Amina Hameurlaine, Georgios Germanos, Nicholas Kolokotronis & Stavros
Shiaeles
Abstract
The arrival of autonomous vehicles (AVs) promises many great benefits, including increased
safety and reduced energy consumption, pollution, and congestion. However, these engines
have many security and privacy issues that could undermine the expected benefits if not
addressed. AVs will provide new opportunities for hackers to carry out malicious attacks, posing
a great threat to the future of mobility and data protection. The research trend in this field
indicates that combining Blockchain and AI could bring strong protection for AVs against
malicious attacks. Blockchain and AI have different working paradigms, but when merged, they
can empower each other, and solve many security and privacy issues of AVs. AI can optimise
the construction of the Blockchain to make it more efficient, secure and energy-saving, where
Blockchain provides data immutability and trust mechanism for AI-based solutions and makes
them more transparent, trustful, and explainable. Although some research is being conducted
on this area, the topic of applying Blockchain and AI for securing AVs is not deeply investigated.
In this paper, we explore the possible application of an amalgamation of Blockchain and AI
solutions for securing AVs. We first introduce a classification of security and privacy threats that
may arise from the application of AVs. Then, we provide an overview of recent literature
regarding Blockchain and AI usage for securing AVs. Finally, we highlight limitations and
challenges that may face the integration of Blockchain and AI with AVs based on our systemic
review and suggest potential future directions for research in this field.
Index Terms
Autonomous vehicles, artificial intelligence, blockchain, privacy, cybersecurity, cyberattacks
Manuscript received 25 February 2022; revised 21 August 2022 and 10 November 2022;
accepted 4 January 2023.
Acknowledgment
This work was supported by the European Union’s Horizon 2020 Research and Innovation
Programme under Grant 957406 and Grant 101021936. The work reflects the authors’ view and
the Agency is not responsible for any use that could be made from the information it contains.
The Associate Editor for this article was H. H. Song. (Corresponding author: Gueltoum
Bendiab.)
2
I. INTRODUCTION
Recently, Autonomous Vehicles (AVs) technology is attracting a lot of attention in both industry
and academia, and has already been implemented by many automotive industries, such as
Uber, Google, Apple, Aptiv, BMW, Tesla and Toshiba [1]. This technology enables driving
automation systems to assist/replace human drivers in controlling the vehicle with butter driving
skills, which greatly helps in reducing energy consumption, pollution, congestion and road
accidents [2], knowing that around 94% of crashes are due to human error [3]. According to ABI
Research [4], more than 30 million new AVs were sold in 2020, and by 2025, more than 115
million connected autonomous cars will be delivered by the global auto industry, nearly four
times more than in 2020. Another recent study predicts that by 2030, one in 10 vehicles will be
fully automated globally [5], but before integrating these engines into our transportation
systems, there are several issues that need to be fully resolved. Of course, security and privacy
are among the most important concerns of this new technology. In reality, AVs are vulnerable to
various cyberattacks, which is a big challenge for the entire research community. A single
compromised component can impact the hole in-vehicle network and lead to major safety losses
that could potentially put human lives at stake [1]. For instance, malicious manipulation of
Global Positioning System (GPS) data (e.g., GPS spoofing attacks) can affect the localisation of
the AV and cause traffic accidents [2]. Moreover, hackers can prevent access to a fleet of
connected AVs unless a ransom is paid, which could have a troubling effect on both automotive
companies and customers using their vehicles [6].
In addition to security and safety concerns, AVs also have issues related to data privacy and
protection. Hackers can have access to a huge amount of sensitive personal data that is
collected and stored by the AV with relative ease. This may include information about location,
biometric data and passwords for connected devices [7]. Industry players and security experts
agree that cybersecurity and privacy challenges in the automotive industry are becoming
increasingly important as AVs become a reality [1], [8]. For this reason, identifying attacks and
defences against connected AVs has become one of the most active areas for researchers. In
recent years, significant research efforts have been carried out to study vulnerabilities and major
security attacks on connected AVs and available security countermeasures [1], [7], [8], [9], [10].
However, there is a lack of comprehensive reviews related to effective security and privacy
countermeasures. In this context, many researchers in this field have argued that Artificial
Intelligence (AI) and Blockchain (BC) can be used to effectively defend AVs attacks [2], [11],
[12], [13]. BC has shown a notable ability to prevent cyberattacks completely without any failure
in the past decade, while AI has proved to be more efficient and faster than traditional security
approaches in detecting and dealing with cyber threats [2], [12]. However, the interrelationship
between BC and AI is still a largely undiscovered area, and there is a lack of comprehensive
surveys on efforts made in recent years addressing AVs security and privacy issues using BC
and AI techniques. Thus, the motivation behind this paper is to explore the possible application
of an amalgamation of BC and AI solutions for securing intelligent AVs, through an extensive
overview of existing and new applicable solutions. The key contributions of this paper go
beyond existing studies in terms of the following aspects:
3
• Comprehensive analysis of the major vulnerabilities and issues related to AV security and
privacy based on current literature in this field. Since detailed studies that focus on security and
privacy issues related to AVs are fairly new, we propose a classification of the most critical
cyberattacks on both AV components and communication channels based on current literature
and recently reported attacks to help researchers improve AVs security and make them more
resistant to cyberattacks.
• Critical review of the recent solutions employed to protect AVs against cyberattacks based on
BC, AI, or an integration of both techniques. This will help researchers to understand how BC
and AI can offer solutions for protecting and securing AVs. To our best knowledge, this work is
the first that proposes a detailed review of these studies and explores the benefits and
challenges of combining BC and AI for securing AVs.
• Discussion of open issues and challenges related to combining BC and AI with AVs and
highlights future research directions that can help researchers in this field to explore and tackle
the pressing challenges for making AVs more safe, secure, and privacy-preserving.
Overall, this paper represents an effort of understanding how BC and AI can make AVs more
safe, secure and privacypreserving. The remainder of this paper is structured as follows:
Section II presents the key components of AVs and their communication networks, while Section
III presents a classification of security threats based on recent literature in this field. Section IV
presents a critical review of AVs security and privacy solutions using AI and BC and analyses
the feasibility of the combination of BC and AI. Section V discusses the open issues and
challenges related to combining BC and AI with AVs and finally, Section VI concludes the paper
and outlines directions for future research.
The arrival of new technologies and more optimized communication systems has led to the
creation of autonomous or self-driving vehicles, with greater functionality and better levels of
autonomy. These vehicles use information gathered from internal systems and the external
environment, Machine Learning (ML) systems and powerful processors to provide useful
driving assistance and improve convenience and safety [14]. The term autonomous is usually
used interchangeably with self-driving. However, there is a slight difference between the two
terms. Based on the Society of Automotive Engineers (SAE) definitions for the levels of
automation for vehicles [15], which have been adopted by the U.S. Department of
Transportation, there are 6 levels of automation ranging from level 0 (no automation) to level 5
(full automation), each level with an increasing amount of automation and a decreasing amount
of driver involvement (see Fig. 1). From levels 0 to 2, a human driver monitors the driving
environment, whereas from Levels 3 to 5, an Automated Driving System (ADS) monitors the
driving environment and the human is not fully involved (such as being hands-off). Thus, based
on SAE definitions [15], an autonomous vehicle at levels 4 and 5 is self-driving, but a self-driving
vehicle at level 3 is not autonomous as it is limited in the operating environment and requires
4
the involvement of a human driver that can take control when needed. From level 3 onwards,
the vehicle must be equipped with an increased number of sensing and communicating devices
in order to be “self-aware” [8]. Actually, fully autonomous vehicles are still unavailable for the
general public except at special trial programs (e.g., Google and Tesla self-driving cars),
however, analysts predict that by 2030 these vehicles will be in use in cities and urban areas [5].
In general, an AV could be defined as a specific type of Internet of Things (IoT) system and also
a kind of Cyber-Physical System (CPS) that is composed of a collection of complex
interconnected embedded system components [16], [17]. It differs from conventional vehicles by
using various automotive sensors (e.g., radar, camera, and LiDAR (Light Detection and
Ranging)), actuators, and Electronic Control Units (ECUs) connected to an onboard computer
that accomplishes the role of the human driver in navigating the vehicle [1], [18]. The AV’s
sensors are responsible for sensing the vehicle’s dynamics (e.g., the vehicle location) and its
surrounding environment (e.g., road traffic status, etc.) [18]. The computer processes the
sensors data and commands the ECUs, which control their corresponding actuators accordingly
to achieve a specific function [18]. The connections between the onboard computer, external
sensors, ECUs, and actuators form an in-vehicle network [16]. AVs are also able to transmit and
receive data from other vehicles, road infrastructure, Internet
and also pedestrians by using the Vehicle-to-Everything (V2X) communication technology [16],
[18]. All these components represent attack surfaces that malicious actors can exploit in order to
get unauthorized access to the AV [8], [18]. In this paper, we have identified four key
components in order to explore the security and privacy aspects of AVs. These components are;
(a) sensing components, (b) ECUs, (c) in-vehicle network and (d) V2X network.
A. Sensing Components
Sensors are key components for autonomous driving: they allow the vehicle to monitor its
surrounding environment, as well as collect the data needed in order to drive safely [17]. In this
context, analytics predict that connected AVs can generate up to 25 GB of data per hour, but in
the future, especially with increasing levels of automation, they will likely generate over 300 TB
of data per year [19]. Generated data is processed and analysed by an onboard computer in
order to build a path from one point to another and to send the appropriate instructions to the
controls of the AV, such as steering, change speed, and braking [8], [18]. As illustrated in Fig. 2,
the three primary AV sensors are cameras (mono and stereo cameras), LiDAR and RADAR
(Radio Detection and Ranging technology) [16]. These three sensors together provide the
vehicle visual of its surrounding environment and help it detect the speed and distance of
nearby objects [8], [17].
The RADAR sensor uses radio waves for object detection within a certain range. It is used in AV
to recognize the environment of a vehicle in real-time [18]. LiDAR uses a shorter wavelength
laser to achieve higher measurement accuracy and better spatial resolution than RADAR. Video
cameras read traffic lights and road signs and monitor pedestrians and obstacles. The global
5
navigation satellite system (GNSS) is the most widely used technology for providing accurate
position information on the surface of the earth. The best-known GNSS system is the Global
Positioning System (GPS), which provides Positioning, Navigation, and Timing (PNT) services
to the users. The operating principle of the GNSS is based on the ability of the receiver to locate
at least four satellites, to calculate the distance to every single one of them, and then use this
information to identify its own location by using a process called trilateration. Ultrasonic sensors
are used to measure distances between the sensor and an object using high-frequency sound
waves. These sensors have the capability to detect objects that are solid, liquid, granular, or in
powder form. Ultrasonic sensors are typically used in shortdistance applications, such as a
parking assistance system in a vehicle [21]. Additionally, other sensors, including odometry and
Inertial Measurement Unit (IMU) sensors, are used to determine the relative and absolute
positions of the vehicle.
The body control module mainly takes care of the comfort and security features of the car. It
includes modules for the door, seat, power lock, airbag, air condition system, and light control
[21]. TCM is mainly responsible for automatic transmissions of data from sensors and the
engine control unit. Whereas, the powertrain control module combines the functions of the
engine control unit and transmission control unit [1], [21]. All ECUs are connected as nodes
through a physically conventional two-wire bus, which transmits differential wired-AND signals.
The On-Board Diagnostic (OBD) connection port (standards OBD-I and OBD-II) is mainly used
in Controller Area Network (CAN) to retrieve diagnostic data such as voltage, fuel level, and
speed from the AV components and its ECUs. It is also used by many manufacturers to update
or modify the software (or firmware) embedded in the ECUs [9], [21]. Currently, the OBD-II port
is adopted by all automotive manufacturers and a large number of wireless OBD-II dongles are
developed, enabling vehicle owners to perform remote vehicle functions from mobile apps [24].
C. In-Vehicle Network
An in-vehicle network realizes the transmission of status information and control signals among
sensors, actuators and electronic units (ECUs) in the AV. In [25], a survey on networking and
6
The mobile cellular network is another communication structure required for V2X. In June 2017,
the mobile industry body 3GPP [29] standardised a set of technologies, known as Cellular
Vehicle-to-Everything (C-V2X), specifically designed to enable communications between AVs
and roadside infrastructure. Based on LTE networks, C-V2X provides one solution for integrated
direct communication (V2V, V2I and V2P) with network communication (V2N) by leveraging
existing cellular network infrastructure. C-V2X can support a wider range of capabilities than
earlier dedicated vehicle connectivity solutions that are based on 802.11p. It supports both
short-range and long-range transmissions, and enables highly reliable, real-time communication
at high speeds and in high-density traffic [30]. In the V2V, V2I and V2P communications mode,
C-V2X operates in the 5.9 GHz frequency band and works independently of the cellular
networks. It uses GNSS as its primary source of time synchronisation in out of coverage
scenarios. In the network communications mode, C-V2X employs the conventional mobile
network to enable the vehicle to receive information about road conditions and traffic in the area
[31]. Recently, 3GPP started to enhance C-V2X in several ways towards the 5G New Radio
(NR) V2X specifications in Release 16 [32] and beyond.
V2X communication technologies can also be used to establish communication between AVs
and Unmanned Aerial vehicles (UAVs) which can provide many services to ground AVs.
Currently, UAVs are envisioned as an essential ingredient in realizing the next generation of
intelligent transportation systems for connected AVs. Some of the critical applications that UAVs
can provide to ground AVs include traffic monitoring by using UAV and edge computing devices,
edge/fog computing services, incident or accident reporters and dynamic roadside units (RSUs)
[33]. For instance, UAVs can act as mobile aerial base stations to assist AVs, resulting in an
interconnected heterogeneous automated system. Further, because of their high mobility, UAVs
can enhance the AVs’ perspective and the visibility of their surrounding areas [33], [34].
Autonomous Vehicles provide new opportunities for hackers and malicious actors to implement
different successful cyberattacks that could lead to catastrophic incidents and cause major
safety losses [1], [7], [9], [35]. Extensive research efforts have been made by the research
community to identify vulnerabilities in these engines [1], [8], [21], [35], [36], [37], [38], and many
studies have demonstrated successful scenarios of attacks on AVs and their components
including sensing components, ECUs and communication channels [2], [39], [40], [41].
According to [9], the main common motivations of these attacks are to gain remote control over
AVs, to steal important and confidential information that can be used for launching further
attacks on AVs, or to interrupt the AVs operations by corrupting important components (e.g.,
Radar, LiDAR, ECUs, CAN bus, etc.) and making the autonomous driving mode unavailable
[21], [35], [37], [38], [40]. Fig. 4 shows the most hackable points of AV and AV communication
networks by which the attacks could land on the AV.
In this section, we present the most critical cyberattacks on both AV components and
communication channels based on the current literature and recently reported attacks. As
8
illustrated in Fig. 5, we classify the major cybersecurity and privacy threats into the following
main categories: manipulation-based attacks, identity-based attacks, servicebased attacks,
software-based attacks, attacks targeting data and attacks through physical access to the AV
system.
A. Manipulation-Based Attacks
The aim of this category of attacks is to gain unauthorized access to the AV in order to
compromise the data integrity and violate the privacy of users. The following attacks are
reported: Man-in-the-middle attacks, injection attacks, tampering attacks, overlay attacks and
modification attacks.
1) Man-in-the-Middle Attacks: In this attack, malicious actors can intercept and manipulate the
communications between AVs and external devices, which are usually established through WiFi,
Bluetooth, ZigBee and mobile communication protocols [38]. For instance, attackers can take
control of an AV, OBU or RSU and actively intercept, replay, and manipulate the messages
transmitted between two entities (e.g., two AVs in V2V network, or RSU in V2I network), while
both entities believe that they are in direct communications with each other [35], [36]. Authors in
[42] successfully implemented a man-in-the-middle attack on a connected AV. After gaining
access to the OBD port, the attackers were able to intercept data to and from the AutoPi Cloud
interface and interrogate information about the AV and control key components such as the
airbag control system.
2) Injection Attacks: This category refers to a broad class of attack vectors in which attackers try
to supply untrusted and malicious input to the AV components, especially the control units
(ECUs) that control the major components in the AV [9]. For instance, firmware in ECUs that is
programmed based on modern operating systems, such as Linux and Android, is vulnerable to
code injection attacks [9], [36], [38]. By injecting malicious code, these ECUs can behave
normally while sending sensitive information from the AV to third malicious parties at the same
time [9], [38]. The CAN bus, which does not have enough security features [9], [35], is also
vulnerable to two forms of injection attacks. The one is injecting CAN diagnostic messages, and
another one is injecting standard messages to intimate the messages from control units [9], [35].
3) Tampering Attacks: The aim of this attack is to deliberately modify (destroy, manipulate, or
edit) data through unauthorized channels [43], [44]. Many studies have proven that AV sensing
components are vulnerable to physical chip-tampering and data tampering attacks [9], [21],
where attackers can easily
tamper with sensor readings to disrupt the normal operation of the AV. ECUs are also vulnerable
to ECUs code tampering attacks (ECU firmware code tampering) [43], and ECUs
reprogramming/flashing attacks, since the in-vehicular network give easy and non-secure
9
access to ECUs. Meanwhile, the issue of messages tampering has been noticed from the early
days of V2V and V2X communications, where many successful message tampering attacks
have been reported on VANET comprising of vehicles with autonomous Levels 1 to 4 [1], [35],
[36], especially those related to traffic safety.
4) Modification Attacks: Such attacks are primarily considered as integrity attacks because they
involve modification of data in real-time, but they could also represent availability attacks
because they can affect the AV behaviour. For instance, authors in [45], exploited the invisible
infrared lights (IR light) to implement a new security threat to the AV camera, called
“I-Can-See-the Light” attack (ICSL Attack). By leveraging the IR light features, authors have
successfully modified the environment perception results by generating invisible traffic lights,
creating fake invisible objects and introducing SLAM (Environment Perception and
Simultaneous Localization and Mapping) errors to the connected AV.
B. Identity-Based Attacks
Every AV is identified with a unique identifier that can help to recognise the AV and the
exchanged messages [9]. Identitybased attacks are one of the most serious threats to
connected AVs as they forge identities to masquerade as authorized entities, in order to get
access to the AV components and manipulate them [9], [37], [40], [46], or to send falsified
information through the V2V and V2I communication channels to disrupt AVs’ operation and
traffic flow [9], [35]. These attacks mainly target components that lack strong authentication
methods, such as CANs and signals for sensors [9], [47]. The most critical cyberattacks in this
category are; spoofing attacks, impersonation attacks, Sybil attacks, replay attacks, and
passcode and Key attacks.
1) Spoofing (or masquerading) Attacks: The aim of this attack is to gain control over AVs by
using false identities or sending false data [40], [48]. Examples of spoofing attacks are GPS
spoofing, LiDAR spoofing, radar spoofing, GNSS spoofing and camera spoofing [37], [38]. In the
case of GPS spoofing, attackers attempt to trick a GPS receiver by broadcasting false, but
realistic GPS signals (e.g., fake time or location) [9], [11]. Similarly, a LiDAR Spoofing attack
creates fake signals that represent an object and injects them into a LiDAR sensor. Researchers
in [49] demonstrated that it is possible to deceive a moving AV and perform LiDAR point
spoofing with alarming consequences. Radar spoofing attacks try to replicate and rebroadcast
fake radar signals to inject distorted data into the sensor [9]. Authors in [48] have demonstrated
two successful real-world scenarios of radar spoofing, in which the victim radar is spoofed to
detect either a phantom emergency stop or a phantom acceleration.
lead to traffic congestion. In this mode of attacks, a single identity is spoofed or created at a time
[35].
3) Sybil Attacks: In Sybil attacks, a large number of identities are spoofed, or created,
simultaneously in order to carry out several malicious operations [9], [21], such as spreading
falsified information through the V2V and V2I communications to disrupt AVs’ operation and
traffic flow [35]. In 2018, a successful Sybil attack on Google’s autonomous car led the car to
show an incorrect GPS location and caused the vehicle to stop in the middle of the road [41]. In
this scenario of attack, several fake nodes were successfully added to the network and sent
misleading location and traffic condition information to the Google car by exploiting the routing
table’s flaws and non-encrypted messages of Google cars.
4) Replay Attack: The aim of this attack is to spoof the identities of two parties, intercept the
exchanged messages, and relay them to their destinations without modification [46]. Several
studies on the in-vehicle network have demonstrated that sensors channels and control systems
in AVs are not resilient to replay attacks [35], [47], especially CAN protocols that do not support
encrypting messages for authentication and confidentiality [9]. Therefore, attackers can gain
access to the AV and observe all messages transmitted on the CAN bus, and therefore easily
impersonate a control unit (ECU) and transmit fake messages through the OBD connection
ports [9]. Replay attacks can also target communication channels between the vehicle and the
RSUs or other neighbouring AVs in order to steal secret encryption keys or passwords and use
them to authenticate themselves later [9], [35], [38], [46].
5) Passcode and Key Attacks: Passcode and keys are one of the safety features of connected
AVs [9], [38]. Many studies have demonstrated that attackers can easily recover secret keys and
passwords from connected AVs, RSUs or OBD by performing attacks such as brute force,
dictionary, rainbow table, password theft and social engineering [9], [35], [36], [38], [46]. For
instance, a brute force attack can crack the Bluetooth connectivity of a connected AV in a few
seconds since the AV’s Bluetooth pin has only four digits [35], [36]. Another form of attack,
which has been observed, and can take place against any type of vehicle (not only connected
AVs) using remote central locking, is replay attack of key signal. By re-using a stolen key signal
wirelessly, an attacker could unlock the vehicle without having the original key–device in his
possession [50].
C. Service-Based Attacks
The primary goal of service-based attacks is to interrupt the AV operations, or to disrupt the
traffic flow in a large area. This category includes the following attacks.
1) Denial of Service Attack (DoS) and Distributed DoS: DoS/DDoS attacks are of the most
dangerous threats that AVs may experience. In fact, several studies proved that DoS/DDoS
attacks can be used to stop the in-vehicle key components, such as camera, LiDAR, Radar,
CAN bus and ECUs, by an overload of processes [9], [11]. For instance, studies [51], [52]
illustrated by experiments that the CAN protocol does not have any security measures against
DoS attacks and showed how easy such an attack is. The experiments were performed with
11
cars that are currently in use. Authors in [52] confirmed that a DoS attack can overload the CAN
network with irrelevant messages that may alter the AV behaviour, disrupt the vehicle control
system, and even cause physical harm to drivers and passengers [38]. V2V networks are also
vulnerable to DoS and DDoS attacks because they have limited connection bandwidth [9]. In
this context, researchers in [53] demonstrated a successful botnet-based DDoS attack by
exploiting BSM messages exchanged between AVs in V2V networks. The attack caused heavy
congestion on a previously targeted road. DoS and DDoS attacks on V2I networks could be
much more destructive and cause traffic flows disruptions in a large region [9], [11], [36], [40].
2) Jamming Attacks: This type of attack aims to prevent the AV from using V2V and V2I
channels to communicate with other AVs as well as RSU stations, by causing intentional
interference with noisy signals or messages [9], [36]. It can also target the AV sensors (GPS
jamming [38], LiDAR jamming [9], radar jamming [9] and camera frequency jamming [36]) by
injecting noise and crafted signals, which could cause blindness and AV malfunction [9], [36].
Authors in [54] validated by experiments several successful jamming and spoofing attacks on
many ultrasonic sensors of several real car models with driver assistance system, including a
Tesla Model S. The attacks were performed by using a DIY ultrasonic jammer with a low-cost
Arduino in order to generate ultrasonic noises and cause continuing vibration of the membrane
on the sensor, which makes the measurements impossible. Authors confirmed that when
jamming attacks are launched, the obstacle can no longer be detected by all the tested vehicles,
therefore no alarm is given to the driver.
3) Routing Attacks: The main features of the AV external networks (V2V and V2I) include high
mobility, fastchanging network topology, absence of fixed security systems, open wireless
communication medium and in some cases, a large number of vehicles on roads [25], [26].
These features make them vulnerable to routing attacks including black hole attacks [55], grey
hole attacks, wormhole attacks [35], sinkhole attacks and rushing attacks [56]. The
misbehaviour routing problem has been extensively discussed and investigated in the wired and
wireless networks, but the security problem cannot be prevented completely [56], especially in
the vehicular networks composed of vehicle nodes, which behave quite differently from other
wireless nodes [35], [55], [57].
4) Sensor Blinding Attacks: This kind of attack targets the three primary AV sensors (camera,
radar and LiDAR), which work together to provide the vehicle visuals of its surroundings. Each
of these three sensors can be blinded, thereby hindering the AV’s ability to retain full awareness
of environmental conditions or potential obstructions [9], [58]. For instance, cameras may be
blinded by a quick burst of extra light [21]. In [58], authors implemented a successful blinding
attack on a MobilEye C2-270 camera installed on a non-automated car’s windshield. In this
scenario of attack, the authors used a quick burst of 650 nm laser to fully blind the camera and
the camera never recovered from the blindness.
5) Spamming Attacks: The aim of this attack is to send a massive amount of unsolicited and
SPAM messages through the network, thereby increasing the transmission latency and causing
a severe delay in V2V and V2X communications [1], [38], [53], [59]. Security professionals warn
12
that spamming attacks could be a serious threat to the AV ecosystem due to the use of botnets
(Spamming botnets), where numerous compromised nodes (e.g. AVs, RSUs, AV sensors, etc.)
can be used to send large numbers of spam messages across the AV networks (e.g., VANETs)
[1], [9], [53].
D. Software-Based Attacks
In addition to all the attacks mentioned above, there are many software-based attack vectors
that pose undeniable security and privacy risks that must be addressed. This includes malware,
ransomware attacks, mobile apps attacks [21] and attacks against the machine learning system
[35].
1) Malware Attacks: One of the severe threats of the extensive introduction of automation in
vehicles is vehicle hacking by using different forms of malware including viruses, worms, trojans,
rootkits, backdoors, etc. [36], [52], [60], [61]. Malware can infect AVs through a variety of
vulnerabilities, including wireless communication (Bluetooth, WiFi, Cellular and 5G),
vehicle-based WiFi hotspots, internet connectivity and malware-infected devices [60], [61], [62].
In recent years, numerous research studies have demonstrated different methods by which
malware can infect the AV systems [61], [63]. For example, in 2019, a group of white hats
proved the ability to hack a Tesla Model 3 vehicle in few seconds by exploiting a weakness in
the browser of the “infotainment” system to get inside the vehicle’s computers and run their own
source code [64]. Another research group at Leuven in Belgium were able to steal a Tesla
Model X vehicle by injecting malware through the firmware update into the key fob via Bluetooth
connection [65]. In [63], authors demonstrated the first remote car-hacking against a Chevy
Malibu vehicle by exploiting a weakness of the Bluetooth stack. The malware is injected into the
vehicle by synchronising their mobile phones with the radio of the vehicle. Then, the inserted
malicious code was able to send messages to the ECU of the vehicle that could lock the brakes.
Simulation studies in [52], [66], [67], and [53] showed that malware can spread to many AVs
through V2V and V2X communication channels and turn these AVs into malicious bots, thereby
creating a botnet network.
2) Ransomware Attacks: The term ransomware, which is a mash-up of the words malware and
ransom, covers all cyberattacks that use computer malware (e.g., virus, trojan horse, worm,
rootkit, etc.) to infect a computer system so that the attacker can then try to extort something
from the victim such as paying a ransom [68]. Security professionals expect that ransomware
attacks will be a major security threat for AI-based self-driving vehicles, mainly for commercial
vehicles [36], [60], [69]. In 2017, Honda Motor Company, one of the largest automobile
manufacturers in the world, was subject to a major WannaCry ransomware attack, in which lots
of Honda self-driving cars have been hindered to get software updates during the ransomware
attack [70]. In [69], authors demonstrated by experiments potential hybrid crypto-ransomware
attacks on the in-vehicle infotainment systems. In these experiments, authors showed how AV
ransomware will differ from traditional ransomware and identified a set of constraints on
vehicular ransomware.
13
3) Attacks on Machine Learning: Machine Learning (ML) and Deep Neural Networks (DNNs) are
essential in AVs for processing sensory data and making informed decisions at different levels
[9], [36], [71]. However, these techniques have been recently found vulnerable to several
attacks that attempt to manipulate the learning system and lead it to produce an incorrect result
[44]. The most well-known attacks are evasion, poisoning and inference [44], [63], while there
are also trojaning, backdooring and reprogramming attacks [9], [71]. Adversarial poisoning
attacks target the data used to train the learning system by introducing poisoned data into the
training dataset [44]. However, adversarial evasion attacks attempt to trick the learning system
at the testing stage by providing deceptive real-time input [71]. Adversarial Attacks can only add
new data to the existing dataset or modify it, but they do not have access to the model and initial
dataset [44], [71]. Regarding trojaning, attackers still do not have access to the initial dataset,
nevertheless, they have access to the predictive model and its parameters and can for example
retrain this model. As for inference, attackers intend to explore the learning system, such as
model, or dataset that can further come in handy. Backdooring is a new class of attacks on
DNNs that combine poisoning and trojaning [72]. However, attackers not only inject additional
behaviour, but they do so in such a way that the backdoor operates after retraining the system
[44], [72]. Adversarial reprogramming attacks are based on remote reprogramming of the neural
network algorithms with the use of well-crafted perturbations on the input data [73].
Recently, several real-world scenarios of attacks have been successfully performed on the
vision system of AVs, which has led the learning system to make mistakes [25], [44], [74], such
as misclassification of traffic signs [75]. This has raised many privacy and security concerns
about the use of such methods in AVs, especially in fully automated vehicles [36], [40], [44]. 4)
Mobile Apps Attacks: Autonomous vehicles and their ecosystems are connected to mobile
applications, through which their owners have the ability to remotely control fundamental
operations of the vehicle [9], [21], [61]. These applications, which are normally installed on
mobile phones, iPads or tablets, are prone to various cyberattacks. Using these mobile
applications, attackers may gain unauthorized access to the vehicles, their ecosystems and the
data processed in them, practically being able to perform any kind of malicious activity [21], [24],
[61]. Security experts from Kaspersky found that mobile apps from car manufacturers available
from app stores lack sufficient security and can be used by hackers to get the GPS coordinates
of a connected AV, trace its route, open its doors, steal the vehicle or even disable it [76].
E. Data Privacy
Autonomous vehicles by their very nature would generate, collect, process and store a massive
amount of data that can identify, with a high degree of certainty, the owner or passenger of the
vehicle, their activities, location, direction of travel and journey history [77]. This data will have
great value to hackers, advertisers, insurance companies and many other service or product
providers [77], a situation that creates various security and privacy fears, not only because of
the huge amount of data collected, and stored, either in the vehicle itself or sent to the cloud,
but also because it remains unclear who owns the generated data and if further transmissions
take place [78]. Specific threats, which have an effect on privacy aspects of AVs have been
deeply investigated in [78], [79], [80], and [77].
14
1) Location Trailing Attacks: This passive attack constitutes a critical threat to the privacy of
users as well as con?dentiality of transmitted messages, since attackers can obtain private and
sensitive data of the owner and passengers through location and tracking of the AV activities as
well as the driving record [9], [35]. For example, determining that the user visited an ATM and/or
shopped at an expensive store provides the possibility of targeted theft [8]. In addition, with the
help of location information, attackers can profile, predict, and possibly manipulate the
behaviour of AV users [35]. In fact, many studies demonstrated that attackers can track any AV
of interest and violate privacy of the drivers and passengers [1], [8], [35], [67], [81]. In [67],
authors demonstrated a global-scale location trailing attack that is performed by AVs
themselves. For that, authors have created a vehicular botnet by compromising multiple
vehicles and organizing them into a botnet. The vehicular botnet communication is concealed
inside BSM broadcasts. Authors proved that the vehicular botnet is effective even against the
best existing pseudonym changing scheme used by AVs, where the attack can keep a vehicle
under surveillance up to 85% of its route, and identify its destination address 90% of the time.
2) Eavesdropping Attacks: This type of attack, also known as sniffing or snooping attack,
involves the interception and/or theft of sensitive information transmitted over a communication
channel (e.g., AV identity, current AV position, speed, acceleration, and CAN messages) [8],
[36], by taking advantage of the insecure communications and unencrypted protocols in the AV
networks (in-vehicle networks and external networks (V2V and V2X)) [8], [82]. Stolen
information can help to access other information on the network and to launch further attacks
such as identity-based attacks. Eavesdropping is also a passive attack, and hence is difficult to
detect, especially in broadcast wireless communication [1], [35], [83].
3) Traffic Analysis Attacks: Similar to eavesdropping attacks, the purpose of traffic analysis
attacks is to passively collect valuable data about the target victim (e.g., AV ID, AV location,
route travelled, etc.), but without compromising the actual data [9], [84]. This data can be further
analyzed to perform further attacks against the target victim, such as jamming, eavesdropping,
location trailing and Sybil attacks [1], [84]. This attack presents a high-level threat to user
privacy and to data confidentiality in vehicular communication as it aims to break the anonymity
of the communications between vehicles (V2V) and with the RSUs (V2I) [1], [46].
4) Home Attacks: This is a new class of attacks against privacy and data confidentiality, where
attackers hijack control of the vehicle from another user on the network, through the Internet
connection [85] and gain unauthorized access to important information about the vehicle (e.g.,
its location, owner’s identity, etc.). In the worst-case scenario, attackers can gain full control over
the vehicle and use it to perform their malicious operations such as broadcasting wrong
messages, stealing valuable and sensitive data, changing sensors’ behaviour, or launching
further attacks that can affect the whole network [1], [81], [84].
F. Physical-Access Attacks
AV has many direct and indirect physical interfaces that can become potential surfaces of
attacks because they give the attackers direct access to the in-vehicle network, especially the
CAN bus and subsequently access to the control units (ECUs) [51], [61]. These interfaces are
15
vulnerable to attack due to their lack of security features, such as authentication scheme,
access control and verification process [9], [35], [61].
1) Direct Access Attacks: Certain attacks could be performed by those with direct physical
access to the vehicle. For instance, vehicular systems that are exposed to passengers, such as
USB ports or OBD-II ports, might provide mechanisms to allow for malicious use or exploitation
[9], [51], [58], [60], [62]. The OBD system is the primary attack surface because it can provide
direct access to the vehicle’s control units (ECUs) and its internal network busses through the
OBD-II port and the OBD dongles [24], [61]. In [24], authors identified five different types of
vulnerabilities in wireless OBD-II dongles, which are used to perform remote functions on
vehicles through mobile apps, with 4 being newly discovered.
2) Indirect Access Attacks: The in-vehicle network can also be accessed through indirect
interfaces without the presence of the attacker [61]. In fact, most connected vehicles nowadays
offer indirect physical access through electronic devices such as multimedia devices (CD, USB
driver, or MP3 player), cell phones, iPads, and laptops [1], [41], [62]. For instance, these devices
can be abused by malware to infect an AV with the possibility of extending such attacks to
multiple vehicles [9], [21], [40], [60]. Bluetooth, Remote Keyless Entry and Tire pressure also
provide indirect physical access to the AV network that could be exploited by hackers and
malicious actors [62]. In [86], authors successfully implemented four indirect access scenarios of
attack to the CAN network through a multimedia disc. In another similar study [63], authors
demonstrated several indirect access attacks to the CAN bus of the vehicle via different
multimedia devices, including computer, CD, USB driver and MP3 player.
Throughout this section, we presented an extensive list of potential threats related to the
security and privacy of autonomous vehicles. As AVs are experimental at this time, there is little
empirical evidence of real cyberattacks against these connected engines. However, all the
attacks mentioned above lead to the conclusion that securing these vehicles and business
models is of great importance. Solutions to these issues may be provided through the
application of AI and BC, which are the topics discussed in the next section.
The main characteristics of BC, including integrity, immutability of the data, decentralisation,
irreversibility, persistence, transparency and anonymity [13], [123], make it the most suitable
solution in all fields requiring secure data sharing among multiple parties. Autonomous driving is
certainly one of the important application areas of BC, where it has been considered by the
research community as a potential solution for enhancing data security, integrity and
transparency [2], [82], [123], [124]. In particular, the research community has applied BC and
distributed ledger technologies in the following aspects of AV security and privacy.
1) Transparent and Secure Storage of Data: Analysts predict that AVs will soon generate
significantly more data than people, with more than 4,000 GB of data per day [125]. BC, with its
distributed information sharing and tamper-resistant features, can provide transparent and
secure storage of the sensitive data generated by AV systems [112], [126], [127]. In this context,
many studies [96], [97], [98], [128] investigated the usage of BC for distributed and secure
storage of data in vehicular networking. For instance, in [13], the data that need to be distributed
through the BC network has been classified into five main categories: data monitored by RSUs
(e.g. speed, driving habits), in-vehicle sensory data (e.g. electronics, air pressure, temperature),
vehicle insurance data, infotainment data (e.g. voice, video) and vehicle financial transactions
data (e.g., refuelling, charging, washing). Thus, five different BCs were designed according to
different applications in vehicular networks. The data communications of different types of BCs
are independent. Similarly, authors in [98] proposed a BC-based storage architecture for
decentralized and secure storage of the data generated by the AVs in the cloud layer with a
17
Distributed Hash Table (DHT). This architecture has been implemented with the Ethereum
platform, where the primary nodes are AVs and RSU. RSU nodes are used for mining, blocks
generation, and data authentication and verification.
Security and privacy issues related to the AV IoT sensors have been addressed in [104] by
proposing a BC-based solution, where each sensor/actuator of the AV is registered to the BC
network before acquiring any of the services. For performance reasons, the authors proposed
that only relevant information related to the IoT sensor is stored in the BC. Therefore, even one
or more smart sensors are compromised, the AVs connected to the BC network are aware of
the information registered under that compromised sensor. In [130], authors exploited the BC
technology for providing autonomic, secure, and dependable AV services. The BC network is
managed by a Cloud Service Provider (CSP), which provides a number of VMs representing the
ride-sharing service providers and users connected to the BC platform. Due to limited
capabilities, smart IoT devices are not nodes by themselves, but they are connected to the
nodes of the BC network, which do the necessary computation for them. The proposed solution
is implemented by using the private BC Hyperledger Fabric.
18
3) Data Integrity and Privacy: The immutability and decentralization features of BC make it a
powerful security solution to tackle data integrity and privacy problems [127]. For that, many
studies proposed to use of BC technology for increasing data integrity and privacy in the AV
ecosystem [113], [114], [134]. For instance, in [113], the private BC Exonum is used for tracking
the AV actions and sending the parameters of the current state of each AV through neighbouring
ones. Whereas, authors in [134] discussed a VANET BC implementation to ensure data integrity
and security. Similarly, authors in [135] proposed a BC-based solution for secure and
tamper-resilient intra-vehicular data aggregation. IoT sensors and control units participating in
the BC network will require on-board identity management modules to ensure the integrity and
authenticity of the data during aggregation. In addition, a trusted execution environment is used
for secure execution of the core data fusion and real-time decisions.
In [114], authors proposed a BC-based distributed trust and reputation model to address
information integrity and data tampering threats in AVs networks. The proposed trust model is
built upon some of the key tenets of the IOTA Tangle distributed ledger [136] that is specifically
designed for IoT environments. Authors in [112] proposed a BC-based architecture to improve
the integrity of information inside the AV, where each ECU can act as a miner and shares its
information with other ECUs. ECUs that work as miners hold a copy of the BC and the CAN bus
is used to broadcast all transactions and blocks. In [110], a decentralized BC-based architecture
is proposed for protecting AV identity and location privacy. The proposed architecture is based
on the OTChain [111], which is designed for secure authorized access to IoT resources. It is
also worth mentioning the Mobility Open Blockchain Initiative (MOBI) [137], which is one of the
largest consortiums that is created by several well-known vehicle manufacturers and suppliers.
This group aims to preserve data integrity and privacy in connected AVs and transportation
systems by creating standards in BC, distributed ledger and related technologies.
Conventional routing algorithms in mesh UAS networks are also vulnerable to cyberattacks
such as black Hole attacks, where a malicious node can flood fake routing information to either
disrupt the network or cause packet congestion in specific nodes. For that, many recent studies
have exploited the features of BC to enable UAS in mesh networks to collect and redistribute
routing information in a secure manner and avoid the disclosure of sensitive network topology in
the presence of compromised nodes [34], [106], [138].
4) Forensics Applications: Blockchain technology has also been exploited for forensic purposes,
where AV data is recorded on an externally shared ledger that is accessible by authorized third
parties, with an aim to prevent malicious tampering and accurate auditing [105], [109], [116],
[139], [140], [141], [142]. In this context, authors in [139] proposed a BC-based event recording
system for accident forensics. In this work, authors designed a new dynamic federation
consensus scheme, called “proof of event”, for recording and broadcasting of events. In
addition, a credit score is used to measure how ‘trusted’ an AV is. This includes being a witness
or a versifier to an accident. Similarly, a BC-based system for forensic analysis of traffic
19
5) Reputation and Trust Management: In order to solve the limitations of centralised trust
models, many studies about vehicular trust models applied BC technology to store AV
reputation information for ensuring trusted communications and mitigate adversary attacks
[119], [120], [121], [122]. For instance, a consortium BC has been used in [121] to store
the transactional updates through a reputation score. Nodes with a registration score higher
than a threshold are allowed to communicate messages in the V2X network. In [120], a
lightweight BC is used in the in-vehicle network to store local traffic information created for
one-day and is destroyed the next day, while the reputation information of the AV is recorded
and managed through a global BC where the RSU is a full node.
As shown in Figure 6, the three categories of ML that have been widely used are supervised,
unsupervised and reinforcement learning [46]. Supervised learning refers to learning by training
a model on labelled data and the learning process is supervised by matching the predictions.
This learning method can be applied to regression, prediction and classification problems [144],
[146], [147]. Unlike supervised learning, unsupervised learning does not require labelled or
tagged data, but it can find hidden relationships and patterns in a large set of data points [147],
[148]. Especially in complex tasks, such as autonomous driving, this learning method can be
useful to find solutions that would hardly be solvable by convolutional methods [9], [144].
20
Reinforcement Learning (RL) is concerned with evaluative feedback, but no supervised signals
[149], [150]. In this learning method, an agent learns behaviour through trial-and-error
interactions with a dynamic, uncertain and complex environment [150]. The main challenge in
RL is the preparation of the simulation environment, which is highly dependent on the task to be
performed [149]. In the AV cybersecurity area, various ML techniques have been successfully
deployed to improve data privacy and integrity, trust management, collaborative learning and to
design new Intrusion Detection Systems (IDSs) and malware analysis methods that can handle
various newly arising attacks in the AV internal and external networks [56], [146], [151].
1) Intrusion Detection and Prevention: There have been many attempts to design new
ML/DL-based intrusion detection techniques for securing the CAN network and VANETs.
Classification techniques such as k-nearest neighbour (K-NN), support vector machine (SVM),
artificial neural networks (ANN), hidden Markov model (HMM) and one-class support vector
machines (OCSVM) have gained the attention of many researchers in this field. In [56], a
security system to protect vehicular ad-hoc networks was proposed. This system employed the
k-NN algorithm to identify malicious vehicles for external communication in autonomous and
semi-autonomous vehicles. In a similar approach [152], SVM, OCSVM and standard neural
network models were used for intrusion and anomaly detection within automotive CAN
networks. Similarly, authors in [146] proposed a new intrusion detection method based on a
modified one-class SVM in the CAN traffic by deploying three attacks (i.e., DoS, fuzzing, and
spoofing attacks). In another work [173], an HMM-based detection and mitigation technique is
proposed to detect attacks against Cooperative Adaptive Cruise Control (CACC) applications.
Artificial neural networks (ANNs) were employed in [174] to identify the malicious behaviour in
VANETs of AVs.
Deep learning (DL), which is one of the powerful ML techniques, has been also applied by many
researchers to design IDS/IPSs for AVs cybersecurity [54], [175], [176]. Deep neural network
(DNN), long short-term memory (LSTM), recurrent neural network (RNN), and convolutional
neural network (CNN) are among the most used DL models in this field. In [176] an IDS using
DNN was proposed to secure the invehicular network. In [175], LSTM was used to propose an
IDS for detecting various attacks on the CAN bus network, such as DDoS, fuzzing, and spoofing
attacks. LSTM was also used with RNN in [154] to identify spoofing attacks in CAN bus. A
hybrid network combining CNN and LSTM models was applied in [151] to identify four types of
CAN bus attacks, namely flooding, fuzzing, spoofing and replaying attacks. In a previous work
[177], authors focused on detecting DDoS, command injection, and malware attacks targeting
the in-vehicle network by applying recurrent deep learning (RDL) and LSTM. In a similar
approach [158], authors proposed a DL-based anomaly detection model for cyberattacks
detection in the in-vehicle network. The model is designed based on generative adversarial
network (GAN) classification to assess the message frames transferring between the ECU and
other hardware in the vehicle. In [153] authors developed an intrusion detection method for
securing the in-vehicle network using the deep contractive autoencoder (DCAE) model.
Deep Transfer Learning (DTL) is also used as a solution in terms of intrusion detection. DTL can
reuse previous trained-model knowledge and outperform other traditional ML and DL models. In
21
[156] authors proposed a deep transfer learning-based IDS model for In-Vehicle Network (IVN)
along with improved performance in comparison to several other existing models. The proposed
model can effectively identify and classify the normal and attack scenarios of in-vehicle
networks to correctly manage vehicle communications for vehicle security. Reference [178]
proposed a DTL-based intrusion detection scheme of different types of attacks for the
connected AVs. In [179], an intelligent IDS model based on CNNs, TL, and ensemble learning
techniques is proposed to protect AV systems. In [155], authors proposed an IDS based on
Transfer Learning using Deep Belief Network (DBN) to detect the attacks in the vehicle
communications channels. Their proposed model outperforms other standard ML/DL models
used in the same environment, such as SVM, RNN and DNN. Recently, In [161] transfer
learning using DNN models is employed to propose a solution against Adversarial Attacks in
AVs.
2) Malware Analysis and Classification: In the never-ending battle against malware, many
researchers in the field of AV security have applied ML/DL techniques for new malware
detection due to its ability to automate the malware analysis and detection process [163]. In the
area of AVs, authors in [60] proposed a ML-based malware classifier trained on multi-features
using ten different learning methods including K-NN, along with Opcode N-gram and Pixel
feature. The proposed method was able to classify malware to their family with an accuracy of
99.99%. In [164], authors proposed a ML-based framework for detecting new zero-day bot
malware specific to the vehicular context, especially, WAVE Short Message Protocol
(WSMP)-Flood and GeoWSMP Flood. The proposed solution has been tested with the ML
algorithms Naive Bayes (NB), SVM, k-NN, Decision Trees (DT), Random Forest (RF), Neural
Network (NN) and Multilayer perceptron (MLP). The experimental results showed that this
solution outperforms existing solutions with a detection rate higher than 97%.
3) Reputation and Trust Management: Many studies have proposed dynamic reputation and
trust models for securing communication of AVs by using different ML techniques [147], [148],
[165], [168]. In [165], authors proposed a trust model to detect the presence of malicious
vehicles in vehicular networks. This work applied the Bayesian Neural Network (BNN) to model
trust as a classification process and extract relevant features that can be used for intelligent
decision and effective computation of trust of honest and dishonest vehicles. Studies [147],
[148], [166], and [168] applied Deep Reinforcement Learning (DRL) to design dynamic trust
models for securing communication of AVs. DRL is a novel subset of ML that combines DL
algorithms with RL methods (e.g., Q-learning, SARSA) in order to help software agents learn
how to reach their goals [146]. In [147], authors proposed a trust-based method for limiting the
wrong feedback from malicious vehicles. In this work, feedback from AVs is combined in
vehicular edge computing servers and the results are used to predict the average number of
true messages. The edge server then uses a DRL method that combines the Q-learning method
with DNN to determine the optimum reputation update policy to stimulate vehicles to send true
feedback. The authors affirmed that their trust method achieved better results in terms of the
average number of true feedbacks compared to the existing reputation-based methods.
Whereas, in [148], a Software-Defined Networking (SDN) controller is used as an agent to learn
22
the most trusted routing path by DNN in VANETs, where the trust model is designed to evaluate
neighbours’ behaviour of forwarding routing information.
4) Data Privacy and Integrity: Lately, there has been extensive research on the usage of
Federated Learning (FL) approach to support data privacy and integrity, through the dissociation
of data generated by AVs and ML model aggregation [180], [181], [182], [183]. FL is simply the
decentralized form of ML, where the learning algorithm is trained across multiple decentralized
edge devices or servers holding local data samples. This collaborative learning approach solves
many critical issues related to data privacy and integrity, data access rights and access to
heterogeneous data [180]. In traditional ML methods, if there are several data sets in a server,
they could be linked and lead to privacy violation, even if a data set has been “anonymized”. On
the contrary, for the purposes of FL, data transmitted would consist of “minimal updates” so that
the accuracy of a learning model is improved. The updates themselves could be temporary, and
would not contain more information than the raw data used for training [181]. The usage of FL
over ML in vehicular network applications is investigated in [182]. In this study, authors provide a
comprehensive analysis on the feasibility of FL for ML-based vehicular applications, including
secure data sharing in vehicular networks. In more recent work [169], authors introduced FL into
autonomous driving to preserve vehicular privacy by keeping original data in a local vehicle and
sharing the training model parameter only with the help of Multi-Access Edge Computing (MEC)
server. The problem of malicious MEC servers and malicious vehicles has been addressed by
using an auxiliary BC-based reputation system. In a similar approach [170], authors applied FL
and CNN for enhancing data privacy and mitigating data leakage in the AV systems.
In more recent work [171], misbehaviour detection system is proposed by using FL for local
training of the model using Basic Service Message (BSM) data generated on vehicles. BSM
may include critical and private information like current speed, location, etc. Different ML and DL
algorithms have been used as training algorithms including SVM, KNN, LSTM and ANN. In
another work [172], RL technique has been used to preserve the privacy of the AV location
information. This sensitive information can be exploited by hackers to exploit the users’
preferences and life patterns. Table III presents recent AI-based solutions related to the AV’s
security and privacy.
enhance the AVs privacy and protection against cyberattacks [12], [82], [83], [88], [184], [190],
[191], [192].
Similarly, authors in [193] deployed both Deep Neural Network (DNN) and BC to address
security challenges in smart vehicular networks. In this work, a public BC is used to ensure
secure communication between authenticated components (e.g., AVs, RSUs, etc.) in vehicular
Networks, while DNN is adopted to detect abnormal components which are victims of attacks,
then update their status to invalid in the BC. This makes other components aware of invalid
ones and prevents them from being associated with the compromised devices. In [145], authors
integrated AI and BC into one network to effectively address driving safety and data security
issues in vehicular networks. In this context, the Long short-term memory (LSTM) model is used
to ensure safe self-driving by using time-series vehicular data to extract useful information. Each
cluster of approved RSUs deploys a consortium BC network that uses the Byzantine Fault
Tolerance-Delegated Proof of Stake (BFT-DPoS) consensus protocol in order to ensure
excellent transaction throughput necessary to support real-time operations in the vehicular
network. Authors confirmed that their approach maintained high prediction accuracy of 92.5% -
93.8%, compared to traditional centralized approaches.
2) Data Privacy and Integrity: The intersection of BC and AI will also offer the opportunity to
safeguard the data generated by AVs against cyberattacks as well as access data in a
decentralized manner [190], [195]. In this context, authors in [190], employed AI and BC to
empower security and resist undesirable data modification in vehicular networks. In this work,
data generated from the different AV components and sensors are sent to the nearest RSU for
storage and processing. To securely store data and preserve the anonymity of AVs generating
them, a consortium BC (BC 2.0 architecture) is deployed as the underlying network for each
cluster of RSUs, which is formed by neighbouring RSUs. Blockchain 2.0, which is an extension
of Blockchain 1.0, uses efficient consensus algorithms, such as Istanbul Byzantine Fault
Tolerance (IBFT) [206], Selective Endorsement (SE) [207], and Raft-based Consensus
24
mechanisms [207], which can process a great number of transactions at higher speed rates with
less power consumed. Due to the RSU’s poor storage capabilities, newly received data is
forwarded to the cloud for further analysis, where an RL model is used for new data patterns
recognition and categorisation according to the various conditions. In another relevant study
[195], BC and AI have been merged to preserve the privacy of data exchanged between AVs
and RSUs. In this work, BC is used to create transparent and reliable information-sharing
channels among AVs and RSUs, while AI algorithms are used to perceive the needs of the
underlying AVs and predict relevant content requirements to RSUs or AVs who choose to be
content providers.
3) Collaborative Learning: Many recent studies exploited BC to process the AI learning data in a
distributed manner, without being restricted to a single entity data set [181], [191], [196], [208],
[209]. This is a very important aspect of integrating BC and AI as it provides full control over the
usage of data and learning models and therefore, solve the growing privacy concerns over
sharing raw data of AV [201], [202], [210]. In this context, authors in [197] combined BC with a
hierarchical FL algorithm to guarantee the security and privacy of knowledge during the sharing
process. AVs learn environmental data through machine learning methods and share the
learning knowledge with each other through the BC network. Furthermore, the BC-enabled
framework is designed to deal with certain malicious attacks effectively. Authors confirmed that
the proposed AI-based BC model effectively reduced the computation consumption compared
with conventional BC systems and enhanced the learning accuracy by about 10% for MLP
network and 3% for CNN network. In a similar approach [208], a BC-based collective learning
solution is proposed, where each AV can share the learned local model as knowledge to
improve the efficiency and accuracy of ML. The BC system, which replaces the central server, is
used to make the collective learning process secure, automatic and transparent. Towards the
same direction, studies [191], [192], [199] proposed a BC-based federated learning (BFL)
design for privacy-aware and efficient vehicular communication networking, where local
on-vehicle ML (oVML) model updates are exchanged and verified in a distributed fashion.
4) Collaborative Intrusion Detection: FL and BC were also used to design collaborative and
distributed ML-based intrusion detection systems for AVs. FL has the capability to avoid sharing
sensitive data directly, by training models locally at each vehicle. Whereas, BC can solve the
problem of traditional centralised data training that highly depends on the robustness and
trustworthiness of a central server. Authors in [201], proposed a distributed DL-based intrusion
detection mechanism that offloads the training model to distributed edge devices (e.g.,
connected vehicles and roadside units (RSUs)), by using FL and BC. In this work, the Ethereum
BC is used for storing and secure sharing of the training models. Whereas, the FL model is
implemented by using DNNs and the “Syft” library. In a similar approach [202], authors
introduced DL-based IDS for detecting cyberattacks in vehicular networks. The proposed
system is integrated into a BC managed edge intelligence framework where the edge nodes
(AVs, RSUs) collaboratively and reliably participate in the federated training of intrusion
detection schema. Table V presents examples of some recent studies that exploited both BC
and AI models for securing and preserving the privacy of the AV components and vehicular
networks.
25
Additionally, most of the discussed articles do not take into account the various limitations of BC
and AI technologies in real-world implementation such as those related to scalability, high costs,
integration with legacy systems and high energy consumption. The next section presents the
main limitations and challenges that should be considered when using AI and BC for securing
AVs.
In this section, we will give insights on to-date open challenges of implementing AI and
Blockchain technologies in the connected AV ecosystem and some directions for researchers to
take into consideration.
city applications, vehicular traces of 700 cars for 24h demand a storage capacity of close to
4.03 GB, which is about 0.24 MB per hour [59]. Thus, without completely addressing the
scalability challenges, BC technology cannot reach its true disruptive potential in AVs. A number
of efforts have been made to address this challenge utilizing different approaches, including the
on-chain [214], the off-chain [59], parallel mining approaches [214] and software-based
techniques [214]. However, this challenge still persists in AV application.
2) Performance and Computation Challenges: As can be easily understood from the data
presented, the operation of AVs is already based on extremely complex interconnected
systems, which require constantly fast exchanges and processing of an incredibly large volume
of data [2], [9], [140]. In other words, the above-mentioned systems should perform without the
slightest problem, since in any other case, e.g., an error or a delay in processing or
communication, there could even be loss of human lives and physical damage. The situation
described above becomes even more complicated if additional mechanisms are added to AV
systems to implement BC technology and solutions based on AI techniques. More specifically,
these mechanisms will require additional technological resources for faster processing and
wired and wireless communications for data exchanges, always based on security and privacy,
on the one hand causing performance problems in the systems, and on the other hand, rising
production costs due to high resource demands and computational complexity, as explained in
[208], [215], [216], and [217]. According to current research, there are solutions that are not
based on BC, such as smart contracts without BC, proposed in [218]. Nevertheless, these
solutions, that do not use BC, are obviously outside the scope of the current research.
3) Vulnerability: Blockchain and AI have been recently found vulnerable to several cyberattacks
and a number of security issues have arisen [44], [87], [110], especially when it comes to
processing sensitive data. Smart contracts and BC are vulnerable to 51% attacks, cryptojacking,
Sybil attacks, whitewashing attacks, eclipse attacks, refusal-to-sign and many others. Security
issues and vulnerabilities related to the usage of BC in AVs networks have been deeply
investigated in [87], [127], and [181]. The future quantum computing also presents a serious
threat to the crypto industry, the backbone of BC technology as quantum computers can crack
the encryption of even the most advanced BCs in few seconds.
AI systems are also vulnerable to adversarial attacks, which become an inherent weakness of
Ml/DL models [36], [71], [72]. Studies [21] and [219] provided a detailed description of the main
vulnerabilities in AI systems. In parallel, a recent study in [220] discussed some security
challenges related to the usage of AI in the AV ecosystem. Moreover, integrating both
technologies will surely be compounded by new vulnerabilities and security problems. BC is
based on cryptography algorithms which make data theft a complicate task. However, it is
crucial to decrypt the data first, so that the AI can generate better predictions, which can lead to
data breaches. In addition, successfully exploited vulnerabilities will have serious impact on the
whole network.
4) Lack of Transparency and Trust in AI Systems: The application of AI models will certainly
bring strong security protection for AVs; however, this technology has a key drawback that
27
should be considered in order to build a trusted AI-based system. In fact, most AI-based
systems are perceived as a black-box that allows powerful predictions, but it cannot be directly
interpreted due to the difficulties in determining how and why it makes certain decisions.
Actually, lack of transparency and trust in modern AI systems poses important ethical issues as
highlighted in the “ethical guidelines” published by the EU Commission’s High-Level Expert
Group on AI (AI HLEG) in March 2020 [221]. Recent legislation, such as the European General
Data Protection Regulation (GDPR), enshrines the right to explanation for ML decisions. In
order to solve this issue, research on the explainability of AI algorithms (i.e., eXplainable
Artificial Intelligence (XAI), or Interpretable AI ), which represents a novel research path, is
currently raising, especially in the ecosystem of AVs and their security against cyberattacks
[222], [223], [224].
5) Lack of Standards and Regulations: Both Blockchain and artificial intelligence are two areas
that have emerged very recently and continue to evolve rapidly. The same does not happen with
the legal framework that governs their operation and their overall integration into the political,
social and economic life of a country. This is a more general situation in terms of the
coexistence of technology and legislation: legislation adapts very slowly to technological
developments. Although there is already a great deal of discussion about the processing of
personal data related to AVs [225], in fact, nationally and internationally, efforts are being made
to set rules for the operation of both BC and AI. Indicatively, in [226], the authors provide
up-to-date information about legal regulation of AVs in Europe and the United States of America
(U.S.). At EU level, there are approaches for the AI [227], as well as for Blockchain [228]. More
specifically, the EU wants to be a leader in BC technology, becoming an innovator in Blockchain
and a home to significant platforms, applications and companies. At the same time, the EU’s
approach to AI centres on excellence and trust, aiming to boost research and industrial capacity
and ensure fundamental rights.
Quantum BCs with explainable AI and quantum computing can solve the discussed challenges,
especially those related to security, trust, transparency, scalability and performance, and thus,
move a step closer to secure smart AVs, safer, more transparent and more efficient in the near
future.
2) Using Specialised Trusted Hardware Devices and Trusted Execution Environments: One of
the overlooked aspects in integrating BC and AI with AVs is the impact hardware faults can have
on BC execution and AI decisions. This impact is of significant importance, especially when
deployed in safety-critical applications such as AVs and intelligent transportation systems. In this
context, high-processing machines and Trusted Execution Environments (TEEs) are fairly new
technological approaches that can solve these problems and secure data transmission as well
as processing in the AV environment.
4) Federated Learning and BC-Based UAV Networks: The integration of federated learning with
BC-based UAV networks can provide a promising security solution that fulfils the processing and
storage needs at AV wide-scale networks, facilitate the distribution of generated data processing
and analysis, and improve the scalability and management of massive mobile connectivity.
VI. CONCLUSION
Despite the benefits of autonomous vehicles, these network-based engines are highly
susceptible to privacy and security attacks. In this article, we have elaborated on this topic by
first presenting the key components of autonomous vehicles and their internal and external
communication networks. This presentation has served as a baseline for a systematic review of
the most critical cyberattacks on both AV components and communication channels based on
the current literature and recently reported attacks. This review is concluded with a new
classification of the identified cyberattacks according to their goals and proposes. In this
context, several defensive techniques and countermeasures are explored. In particular, the
usage of AI and BC technologies for securing connected AVs against malicious attacks has
recently attracted great attention in both the academic and industrial sectors.
Both technologies can make a better combination as AI can perfectly process the huge amount
of data generated by AVs and make good decisions, whereas Blockchain provides a highly
secured and trusted platform for data storage and sharing through in-vehicle and V2X networks.
In this article, we have reviewed the current state-of-the-art related to the usage and
applicability of Blockchain, AI and both of them for preserving the AV’s security and privacy. Our
literature review shows that the integration of both technologies is still in its early development
stage and most proposed solutions are in the experimental phase. In addition, there are many
research challenges and open issues that should be addressed and tackled in areas related to
security, performance, scalability, data storage, transparency, interoperability, regulation and
standards. All these aspects have been discussed in this article as well as future research
directions.
ACKNOWLEDGMENT
The work reflects the authors’ view and the Agency is not responsible for any use that could be
made from the information it contains.
30
REFERENCES
[1] J. Cui, L. S. Liew, G. Sabaliauskaite, and F. Zhou, “A review on safety failures, security
attacks, and available countermeasures for autonomous vehicles,” Ad Hoc Netw., vol. 90, Jul.
2019, Art. no. 101823.
[2] R. Gupta, S. Tanwar, N. Kumar, and S. Tyagi, “Blockchain-based security attack resilience
schemes for autonomous vehicles in industry 4.0: A systematic review,” Comput. Electr. Eng.,
vol. 86, Sep. 2020, Art. no. 106717.
[3] G. J. M. Read, S. Shorrock, G. H. Walker, and P. M. Salmon, “State of science: Evolving
perspectives on ‘human error,”’ Ergonomics, vol. 64, no. 9, pp. 1091–1114, Sep. 2021.
[4] How Many Connected Cars Are Sold Worldwide. Verzion. Accessed: Apr. 15, 2021. [Online].
Available: https://smartcar.com/ blog/connected-cars-worldwide/
[5] A. Proch. By 2030, One in 10 Vehicles Will Be Self-Driving Globally. Statista. Accessed: Sep.
30, 2021. [Online]. Available: https://www.statista.com/press/p/autonomous_cars_2020/
[6] F. Holmes. Autonomous Cars Low on a Hacker’s Hit List, for Now. Automotive World.
Accessed: Oct. 30, 2021. [Online]. Available:
https://www.automotiveworld.com/articles/autonomous-cars-lowon-a-hackers-hit-list-for-now/
[7] A. Taeihagh and H. S. M. Lim, “Governing autonomous vehicles: Emerging responses for
safety, liability, privacy, cybersecurity, and industry risks,” Transp. Rev., vol. 39, no. 1, pp.
103–128, Jul. 2018.
[8] S. Parkinson, P. Ward, K. Wilson, and J. Miller, “Cyber threats facing autonomous and
connected vehicles: Future challenges,” IEEE Trans. Intell. Transp. Syst., vol. 18, no. 11, pp.
2898–2915, Nov. 2017.
[9] M. Pham and K. Xiong, “A survey on security attacks and defense techniques for connected
and autonomous vehicles,” Comput. Secur., vol. 109, Oct. 2021, Art. no. 102269.
[10] A. Nanda, D. Puthal, J. J. P. C. Rodrigues, and S. A. Kozlov, “Internet of autonomous
vehicles communications security: Overview, issues, and directions,” IEEE Wireless Commun.,
vol. 26, no. 4, pp. 60–65, Aug. 2019.
[11] S. Kim, “Blockchain for a trust network among intelligent vehicles,” in Advances in
Computers, vol. 111. Amsterdam, The Netherlands: Elsevier, 2018, pp. 43–68.
[12] CUBE. Cube Autonomous Car Network Security Platform Based on Blockchain. Accessed:
Dec. 5, 2021. [Online]. Available: https://cubeint.io/
[13] R. Gupta et al., “VAHAK: A blockchain-based outdoor delivery scheme using UAV for
healthcare 4.0 services,” in Proc. IEEE INFOCOM Conf. Comput. Commun. Workshops
(INFOCOM WKSHPS), Jul. 2020, pp. 255–260.
[14] H.-K. Kong, T.-S. Kim, and M.-K. Hong, “A security risk assessment framework for smart
car,” in Proc. 10th Int. Conf. Innov. Mobile Internet Services Ubiquitous Comput. (IMIS), Jul.
2016, pp. 102–108.
[15] SAE International. (2019). SAE Updates J3016 Levels of Automated Driving Graphic to
Reflect Evolving Standard. [Online]. Available:
https://www.sae.org/news/2019/01/sae-updates-j3016-automateddriving-graphic
[16] A. Chattopadhyay, K.-Y. Lam, and Y. Tavva, “Autonomous vehicle: Security by design,”
IEEE Trans. Intell. Transp. Syst., vol. 22, no. 11, pp. 7015–7029, Nov. 2021.
31
[53] M. T. Garip, M. E. Gursoy, P. Reiher, and M. Gerla, “Congestion attacks to autonomous cars
using vehicular botnets,” in Proc. Workshop Secur. Emerg. Netw. Technol., 2015, pp. 1–9.
[54] C. Yan, W. Xu, and J. Liu, “Can you trust autonomous vehicles: Contactless attacks against
sensors of self-driving vehicle,” DEF CON, vol. 24, p. 109, Aug. 2016.
[55] A. Gruebler, K. D. McDonald-Maier, and K. M. A. Alheeti, “An intrusion detection system
against black hole attacks on the communication network of self-driving cars,” in Proc. 6th Int.
Conf. Emerg. Secur. Technol. (EST), Sep. 2015, pp. 86–91.
[56] K. M. A. Alheeti and K. McDonald-Maier, “An intelligent security system for autonomous
cars based on infrared sensors,” in Proc. 23rd Int. Conf. Autom. Comput. (ICAC), Sep. 2017, pp.
1–5.
[57] N. Aleisa and K. Renaud, “Privacy of the Internet of Things: A systematic literature review,”
in Proc. 50th Hawaii Int. Conf. Syst. Sci., 2017, pp. 5947–5956.
[58] J. Petit, B. Stottelaar, M. Feiri, and F. Kargl, “Remote attacks on automated vehicles
sensors: Experiments on camera and LiDAR,” Black Hat Eur., vol. 11, p. 995, Nov. 2015.
[59] D. Khan, L. T. Jung, and M. A. Hashmani, “Systematic literature review of challenges in
blockchain scalability,” Appl. Sci., vol. 11, no. 20, p. 9372, Oct. 2021.
[60] X. Han, F. Jin, R. Wang, S. Wang, and Y. Yuan, “Classification of malware for self-driving
systems,” Neurocomputing, vol. 428, pp. 352–360, Mar. 2021.
[61] A. A. Elkhail, R. U. D. Refat, R. Habre, A. Hafeez, A. Bacha, and H. Malik, “Vehicle security:
A survey of security issues and vulnerabilities, malware attacks and defenses,” IEEE Access,
vol. 9, pp. 162401–162437, 2021.
[62] A. Al-Sabaawi, K. Al-Dulaimi, E. Foo, and M. Alazab, “Addressing malware attacks on
connected and autonomous vehicles: Recent techniques and challenges,” in Malware Analysis
Using Artificial Intelligence and Deep Learning. Cham, Switzerland: Springer, 2021, pp. 97–119.
[63] S. Checkoway et al., “Comprehensive experimental analyses of automotive attack
surfaces,” in Proc. USENIX Secur. Symp., vol. 4. San Francisco, CA, USA, 2011, p. 2021.
[64] S. Ornes. (2022). How to Hack a Self-Driving Car. Accessed: Jan. 1, 2022. [Online].
Available: https://physicsworld.com/a/how-tohack-a-self-driving-car/
[65] F. Siddiqui. Hackers Said They Could Steal a Tesla Model X in Minutes. Tesla Pushed Out a
Fix. Accessed: Jan. 1, 2022. [Online]. Available:
https://www.washingtonpost.com/technology/2020/11/23/tesla-modelxhack/
[66] D. T. Le, K. Q. Dang, Q. L. T. Nguyen, S. Alhelaly, and A. Muthanna, “A behavior-based
malware spreading model for vehicle-to-vehicle communications in VANET networks,”
Electronics, vol. 10, no. 19, p. 2403, Oct. 2021.
[67] M. T. Garip, P. Reiher, and M. Gerla, “BOTVEILLANCE: A vehicular botnet surveillance
attack against pseudonymous systems in VANETs,” in Proc. 11th IFIP Wireless Mobile Netw.
Conf. (WMNC), Sep. 2018, pp. 1–8.
[68] G. Bendiab, S. Shiaeles, and N. Savage, “Malware detection and mitigation,” in
Cyber-Security Threats, Actors, and Dynamic Mitigation. Boca Raton, FL, USA: CRC Press,
2021, pp. 199–246.
[69] P. Bajpai, R. Enbody, and B. H. C. Cheng, “Ransomware targeting automobiles,” in Proc.
2nd ACM Workshop Automot. Aerial Vehicle Secur., Mar. 2020, pp. 23–29.
34
[70] C. Brook. Chonda Shut Down Plant Impacted by Wannacry. Accessed: Dec. 25, 2021.
[Online]. Available:
https://threatpost.com/honda-shutdown-plant-impacted-by-wannacry/126429/
[71] A. Qayyum, M. Usama, J. Qadir, and A. Al-Fuqaha, “Securing connected & autonomous
vehicles: Challenges posed by adversarial machine learning and the way forward,” IEEE
Commun. Surveys Tuts., vol. 22, no. 2, pp. 998–1026, 2nd Quart., 2020.
[72] Y. Wang, E. Sarkar, M. Maniatakos, and S. E. Jabari, “Watch your back: Backdoor attacks
in deep reinforcement learning-based autonomous vehicle control systems,” Work, vol. 8, no.
28, p. 12, 2020.
[73] G. F. Elsayed, I. Goodfellow, and J. Sohl-Dickstein, “Adversarial reprogramming of neural
networks,” 2018, arXiv:1806.11146.
[74] N. Akhtar and A. Mian, “Threat of adversarial attacks on deep learning in computer vision: A
survey,” IEEE Access, vol. 6, pp. 14410–14430, 2018.
[75] C. Sitawarin, A. N. Bhagoji, A. Mosenia, M. Chiang, and P. Mittal, “DARTS: Deceiving
autonomous cars with toxic signs,” 2018, arXiv:1802.06430.
[76] Kaspersky. Hackers Could Use Mobile Apps to Steal Connected Cars, Says Kaspersky.
Accessed: Jan. 11, 2022. [Online]. Available:
https://internetofbusiness.com/hackers-connected-cars-kaspersky/
[77] L. Collingwood, “Privacy implications and liability issues of autonomous vehicles,” Inf.
Commun. Technol. Law, vol. 26, no. 1, pp. 32–45, Jan. 2017.
[78] H. Lim and A. Taeihagh, “Autonomous vehicles for smart and sustainable cities: An in-depth
exploration of privacy and cybersecurity implications,” Energies, vol. 11, no. 5, p. 1062, Apr.
2018.
[79] E. G. Abdallah, M. Zulkernine, Y. X. Gu, and C. Liem, “Towards defending connected
vehicles against attacks,” in Proc. 5th Eur. Conf. Eng. Comput.-Based Syst., Aug. 2017, pp.
1–9.
[80] C. Bernardini, M. R. Asghar, and B. Crispo, “Security and privacy in vehicular
communications: Challenges and opportunities,” Veh. Commun., vol. 10, pp. 13–28, Oct. 2017.
[81] M. S. Sheikh, J. Liang, and W. Wang, “Security and privacy in vehicular ad hoc network and
vehicle cloud computing: A survey,” Wireless Commun. Mobile Comput., vol. 2020, pp. 1–25,
Jan. 2020.
[82] M. Dibaei et al., “Investigating the prospect of leveraging blockchain and machine learning
to secure vehicular networks: A survey,” IEEE Trans. Intell. Transp. Syst., vol. 23, no. 2, pp.
683–700, Feb. 2022.
[83] D. Reebadiya, T. Rathod, R. Gupta, S. Tanwar, and N. Kumar, “Blockchain-based secure
and intelligent sensing scheme for autonomous vehicles activity tracking beyond 5G networks,”
Peer Peer Netw. Appl., vol. 14, pp. 2757–2774, Feb. 2021.
[84] M. Obaidat, M. Khodjaeva, J. Holst, and M. B. Zid, “Security and privacy challenges in
vehicular ad hoc networks,” in Connected Vehicles Internet Things. Cham, Switzerland:
Springer, 2020, pp. 223–251.
[85] I. A. Sumra et al., “Behavior of attacker and some new possible attacks in vehicular ad hoc
network (VANET),” in Proc. 3rd Int. Congr. Ultra Modern Telecommun. Control Syst. Workshops
(ICUMT), Oct. 2011, pp. 1–8.
35
[86] T. Hoppe, S. Kiltz, and J. Dittmann, “Security threats to automotive CAN networks-practical
examples and selected short-term countermeasures,” Rel. Eng. Syst. Saf., vol. 96, no. 1, pp.
11–25, 2011.
[87] S. Brotsis, K. Limniotis, G. Bendiab, N. Kolokotronis, and S. Shiaeles, “On the suitability of
blockchain platforms for IoT applications: Architectures, security, privacy, and performance,”
Comput. Netw., vol. 191, May 2021, Art. no. 108005.
[88] Z. Zhang, X. Song, L. Liu, J. Yin, Y. Wang, and D. Lan, “Recent advances in blockchain and
artificial intelligence integration: Feasibility analysis, research issues, applications, challenges,
and future work,” Secur. Commun. Netw., vol. 2021, pp. 1–15, Jun. 2021.
[89] G. Wood, “Ethereum: A secure decentralised generalised transaction ledger,” Ethereum
Project Yellow Paper, vol. 151, pp. 1–32, Apr. 2014.
[90] Litecoin. Litecoin Foundation. Accessed: Sep. 29, 2021. [Online]. Available:
https://litecoin.org
[91] S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” Decentralized Bus. Rev.,
2008.
[92] Hyperledger Fabric Documentation. Accessed: Dec. 5, 2021. [Online]. Available:
https://hyperledger-fabric.readthedocs.io/en/release2.0/whatsnew.html
[93] Ripple. (2020). Ripple Documentation. Accessed: Dec. 5, 2021. [Online]. Available:
https://ripple.com/xrp
[94] Quorum. (2020). Quorum Documentation. Accessed: Dec. 5, 2021. [Online]. Available:
http://docs.goquorum.com/en/latest/
[95] R3. R3 Primer Series 1. Accessed: Dec. 5, 2021. [Online]. Available:
https://www.r3.com/wp-content/uploads/2019/01/R3-Quick-Facts.pdf
[96] T. G. Jiang, H. Fang, and H. Wang, “Blockchain-based Internet of Vehicles: Distributed
network architecture and performance analysis,” IEEE Internet Things J., vol. 6, no. 3, pp.
4640–4649, Jun. 2019.
[97] X. Zhang and X. Chen, “Data security sharing and storage based on a consortium
blockchain in a vehicular ad-hoc network,” IEEE Access, vol. 7, pp. 58241–58254, 2019.
[98] S. K. Singh, J. H. Park, P. K. Sharma, and Y. Pan, “BIIoVT: Blockchain-based secure
storage architecture for intelligent Internet of vehicular things,” IEEE Consum. Electron. Mag.,
vol. 11, no. 6, pp. 75–82, Nov. 2022.
[99] R. Kakkar, R. Gupta, S. Agrawal, S. Tanwar, and R. Sharma, “Blockchain-based secure and
trusted data sharing scheme for autonomous vehicle underlying 5G,” J. Inf. Secur. Appl., vol. 67,
Jun. 2022, Art. no. 103179.
[100] M. M. Nair and A. K. Tyagi, “Preserving privacy using blockchain technology in
autonomous vehicles,” in Proc. Int. Conf. Netw. Secur. Blockchain Technol. Cham, Switzerland:
Springer, 2022, pp. 237–248.
[101] M. Singh and S. Kim, “Introduce reward-based intelligent vehicles communication using
blockchain,” in Proc. Int. SoC Design Conf. (ISOCC), Nov. 2017, pp. 15–16.
[102] S. Rowan, M. Clear, M. Gerla, M. Huggard, and C. M. Goldrick, “Securing vehicle to
vehicle communications using blockchain through visible light and acoustic side-channels,”
2017, arXiv:1704.02553.
36
[118] J. Kang, Z. Xiong, D. Ye, D. I. Kim, J. Zhao, and D. Niyato, “Toward secure
blockchain-enabled Internet of Vehicles: Optimizing consensus management using reputation
and contract theory,” IEEE Trans. Veh. Technol., vol. 68, no. 3, pp. 2906–2920, Mar. 2019.
[119] S. Abbes and S. Rekhis, “A blockchain-based solution for reputation management in IoV,”
in Proc. Int. Wireless Commun. Mobile Comput. (IWCMC), Jun. 2021, pp. 1129–1134.
[120] C. Pu, “A novel blockchain-based trust management scheme for vehicular networks,” in
Proc. Wireless Telecommun. Symp. (WTS), Apr. 2021, pp. 1–6.
[121] P. Bhattacharya, A. Shukla, S. Tanwar, N. Kumar, and R. Sharma, “6Blocks: 6G-enabled
trust management scheme for decentralized autonomous vehicles,” Comput. Commun., vol.
191, pp. 53–68, Jul. 2022.
[122] D. Kianersi, S. Uppalapati, A. Bansal, and J. Straub, “Evaluation of a reputation
management technique for autonomous vehicles,” Future Internet, vol. 14, no. 2, p. 31, Jan.
2022.
[123] M. B. Mollah, J. Zhao, D. Niyato, Y. L. Guan, and L. H. Koh, “Blockchain for the Internet of
Vehicles towards intelligent transportation systems: A survey,” IEEE Internet Things J., vol. 8,
no. 6, pp. 4157–4185, Mar. 2021.
[124] T. Dargahi, H. Ahmadvand, M. Alraja, and C. Yu, “Integration of blockchain with connected
and autonomous vehicles: Vision,” Technology, vol. 26, no. 28, pp. 33–50, 2021.
[125] B. Krzanich. (2021). Data is the New Oil in the Future of Automated Driving. [Online].
Available: https://newsroom.intel.com/editorials/
krzanich-the-future-of-automated-driving/#gs.htm2ps
[126] P. K. Sharma, N. Kumar, and J. H. Park, “Blockchain-based distributed framework for
automotive industry in a smart city,” IEEE Trans. Ind. Informat., vol. 15, no. 7, pp. 4197–4205,
Jul. 2019.
[127] N. Kamble, R. Gala, R. Vijayaraghavan, E. Shukla, and D. Patel, “Using blockchain in
autonomous vehicles,” in Artificial Intelligence and Blockchain for Future Cybersecurity
Applications. Cham, Switzerland: Springer, 2021, pp. 285–305.
[128] Y. Yin, Y. Li, B. Ye, T. Liang, and Y. Li, “A blockchain-based incremental update supported
data storage system for intelligent vehicles,” IEEE Trans. Veh. Technol., vol. 70, no. 5, pp.
4880–4893, May 2021.
[129] J. A. L. Calvo and R. Mathar, “Secure blockchain-based communication scheme for
connected vehicles,” in Proc. Eur. Conf. Netw. Commun. (EuCNC), Jun. 2018, pp. 347–351.
[130] M. G. M. M. Hasan, A. Datta, M. A. Rahman, and H. Shahriar, “Chained of things: A
secure and dependable design of autonomous vehicle services,” in Proc. IEEE 42nd Annu.
Comput. Softw. Appl. Conf. (COMPSAC), Jul. 2018, pp. 498–503.
[131] S. Kudva, S. Badsha, S. Sengupta, I. Khalil, and A. Zomaya, “Towards secure and
practical consensus for blockchain based VANET,” Inf. Sci., vol. 545, pp. 170–187, Feb. 2021.
[132] J. Kang et al., “Blockchain for secure and efficient data sharing in vehicular edge
computing and networks,” IEEE Internet Things J., vol. 6, no. 3, pp. 4660–4670, Jun. 2019.
[133] R. Shrestha and S. Y. Nam, “Regional blockchain for vehicular networks to prevent 51%
attacks,” IEEE Access, vol. 7, pp. 95033–95045, 2019.
[134] R. Barber, “Autonomous vehicle communication using blockchain,” M.S. thesis, Dept.
Comput. Inf. Sci., Univ. Mississippi, Honors, Oxford, MS, USA, 2018.
38
[169] Y. Li, X. Tao, X. Zhang, J. Liu, and J. Xu, “Privacy-preserved federated learning for
autonomous driving,” IEEE Trans. Intell. Transp. Syst., vol. 23, no. 7, pp. 8423–8434, Jul. 2022.
[170] Y. Lu, X. Huang, Y. Dai, S. Maharjan, and Y. Zhang, “Federated learning for data privacy
preservation in vehicular cyber-physical systems,” IEEE Netw., vol. 34, no. 3, pp. 50–56, May
2020.
[171] A. Uprety, D. B. Rawat, and J. Li, “Privacy preserving misbehavior detection in IoV using
federated machine learning,” in Proc. IEEE 18th Annu. Consum. Commun. Netw. Conf. (CCNC),
Jan. 2021, pp. 1–6.
[172] M. Min, W. Wang, L. Xiao, Y. Xiao, and Z. Han, “Reinforcement learning-based sensitive
semantic location privacy protection for VANETs,” China Commun., vol. 18, no. 6, pp. 244–260,
2021.
[173] M. Jagielski, N. Jones, C.-W. Lin, C. Nita-Rotaru, and S. Shiraishi, “Threat detection for
collaborative adaptive cruise control in connected cars,” in Proc. 11th ACM Conf. Secur. Privacy
Wireless Mobile Netw., Jun. 2018, pp. 184–189.
[174] K. M. Ali Alheeti and K. McDonald-Maier, “Intelligent intrusion detection in external
communication systems for autonomous vehicles,” Syst. Sci. Control Eng., vol. 6, no. 1, pp.
48–56, Jan. 2018.
[175] M. D. Hossain, H. Inoue, H. Ochiai, D. Fall, and Y. Kadobayashi, “LSTM-based intrusion
detection system for in-vehicle can bus communications,” IEEE Access, vol. 8, pp.
185489–185502, 2020.
[176] M.-J. Kang and J.-W. Kang, “Intrusion detection system using deep neural network for
in-vehicle network security,” PLoS ONE, vol. 11, no. 6, Jun. 2016, Art. no. e0155781.
[177] G. Loukas, T. Vuong, R. Heartfield, G. Sakellari, Y. Yoon, and D. Gan, “Cloud-based
cyber-physical intrusion detection for vehicles using deep learning,” IEEE Access, vol. 6, pp.
3491–3508, 2018.
[178] X. Li, Z. Hu, M. Xu, Y. Wang, and J. Ma, “Transfer learning based intrusion detection
scheme for Internet of Vehicles,” Inf. Sci., vol. 547, pp. 119–135, Feb. 2021.
[179] L. Yang and A. Shami, “A transfer learning and optimized CNN based intrusion detection
system for Internet of Vehicles,” 2022, arXiv:2201.11812.
[180] T. Zeng, O. Semiari, M. Chen, W. Saad, and M. Bennis, “Federated learning on the road:
Autonomous controller design for connected and autonomous vehicles,” 2021,
arXiv:2102.03401.
[181] S. R. Pokhrel and J. Choi, “Federated learning with blockchain for autonomous vehicles:
Analysis and design challenges,” IEEE Trans. Commun., vol. 68, no. 8, pp. 4734–4746, Aug.
2020.
[182] A. M. Elbir, B. Soner, S. Coleri, D. Gunduz, and M. Bennis, “Federated learning in
vehicular networks,” 2020, arXiv:2006.01412.
[183] U. Majeed, L. U. Khan, A. Yousafzai, Z. Han, B. J. Park, and C. S. Hong, “ST-BFL: A
structured transparency empowered cross-silo federated learning on the blockchain framework,”
IEEE Access, vol. 9, pp. 155634–155650, 2021.
[184] S. Singh, P. K. Sharma, B. Yoon, M. Shojafar, G. H. Cho, and I.-H. Ra, “Convergence of
blockchain and artificial intelligence in IoT network for the sustainable smart city,” Sustain. Cities
Soc., vol. 63, Dec. 2020, Art. no. 102364.
41
[185] Enigma. Enigma is Securing the Future of the Web. Accessed: Jan. 14, 2022. [Online].
Available: https://www.enigma.co/
[186] NUMERAI. The Hardest Data Science Tournament on the Planet. Accessed: Jan. 14,
2022. [Online]. Available: https://numer.ai/
[187] SINGULARITYNET. The Hardest Data Science Tournament on the Planet. Accessed: Jan.
14, 2022. [Online]. Available: https:// singularitynet.io/
[188] OCEANPROTOCOL. The Hardest Data Science Tournament on the Planet. Accessed:
Jan. 14, 2022. [Online]. Available: https:// oceanprotocol.com/about
[189] O. Padilla. Namahe-the First Revolutionary Blockchain AI Solution for a Transparent &
Sustainable Future. Accessed: Jan. 14, 2022. [Online]. Available:
https://www.linkedin.com/pulse/namahe-first-revolutionaryblockchain-ai-solution-future-padilla
[190] A. Hammoud, H. Sami, A. Mourad, H. Otrok, R. Mizouni, and J. Bentahar, “AI, blockchain,
and vehicular edge computing for smart and secure IoV: Challenges and directions,” IEEE
Internet Things Mag., vol. 3, no. 2, pp. 68–73, Jun. 2020.
[191] S. R. Pokhrel and J. Choi, “A decentralized federated learning approach for connected
autonomous vehicles,” in Proc. IEEE Wireless Commun. Netw. Conf. Workshops (WCNCW),
Apr. 2020, pp. 1–6.
[192] L. Barbieri, S. Savazzi, M. Brambilla, and M. Nicoli, “Decentralized federated learning for
extended sensing in 6G connected vehicles,” Veh. Commun., vol. 33, Jan. 2022, Art. no.
100396.
[193] E. Rabieinejad, A. Yazdinejad, A. Dehghantanha, R. M. Parizi, and G. Srivastava, “Secure
AI and blockchain-enabled framework in smart vehicular networks,” in Proc. IEEE Globecom
Workshops (GC Wkshps), Dec. 2021, pp. 1–6.
[194] G. Raja, K. Kottursamy, K. Dev, R. Narayanan, A. Raja, and K. B. V. Karthik,
“Blockchain-integrated multiagent deep reinforcement learning for securing cooperative
adaptive cruise control,” IEEE Trans. Intell. Transp. Syst., vol. 23, no. 7, pp. 9630–9639, Jul.
2022.
[195] Y. Qian, Y. Jiang, L. Hu, M. S. Hossain, M. Alrashoud, and M. Al-Hammadi,
“Blockchain-based privacy-aware content caching in cognitive Internet of Vehicles,” IEEE Netw.,
vol. 34, no. 2, pp. 46–51, Mar. 2020.
[196] S. K. Lo et al., “Towards trustworthy AI: Blockchain-based architecture design for
accountability and fairness of federated learning systems,” IEEE Internet Things J., early
access, Jan. 19, 2022, doi: 10.1109/JIOT.2022.3144450.
[197] H. Chai, S. Leng, Y. Chen, and K. Zhang, “A hierarchical blockchainenabled federated
learning algorithm for knowledge sharing in internet of vehicles,” IEEE Trans. Intell. Transp.
Syst., vol. 22, no. 7, pp. 3975–3986, Jul. 2021.
[198] D. Zhang, W. Shi, M. St-Hilaire, and R. Yang, “Multiaccess edge integrated networking for
Internet of Vehicles: A blockchain-based deep compressed cooperative learning approach,”
IEEE Trans. Intell. Transp. Syst., vol. 23, no. 11, pp. 21593–21607, Nov. 2022.
[199] P. K. Sharma, D. Vohra, and S. Rathore, “Security and privacy in V2X communications:
How can collaborative learning improve cybersecurity?” IEEE Netw., vol. 36, no. 3, pp. 32–39,
May 2022.
42
[200] Y. He, K. Huang, G. Zhang, F. R. Yu, J. Chen, and J. Li, “Bift: A blockchain-based
federated learning system for connected and autonomous vehicles,” IEEE Internet Things J.,
vol. 9, no. 14, pp. 12311–12322, Jul. 2022.
[201] H. Liu et al., “Blockchain and federated learning for collaborative intrusion detection in
vehicular edge computing,” IEEE Trans. Veh. Technol., vol. 70, no. 6, pp. 6073–6084, Jun.
2021.
[202] M. Abdel-Basset, N. Moustafa, H. Hawash, I. Razzak, K. M. Sallam, and O. M. Elkomy,
“Federated intrusion detection in blockchain-based smart transportation systems,” IEEE Trans.
Intell. Transp. Syst., vol. 23, no. 3, pp. 2523–2537, Mar. 2022.
[203] A. A. Khan, M. M. Khan, K. M. Khan, J. Arshad, and F. Ahmad, “A blockchain-based
decentralized machine learning framework for collaborative intrusion detection within UAVs,”
Comput. Netw., vol. 196, Sep. 2021, Art. no. 108217.
[204] D. Jadav, M. S. Obaidiat, S. Tanwar, R. Gupta, and K.-F. Hsiao, “Amalgamation of
blockchain and AI to classify malicious behavior of autonomous vehicles,” in Proc. Int. Conf.
Comput., Inf. Telecommun. Syst. (CITS), Nov. 2021, pp. 1–5.
[205] D. Patel et al., “Deep learning and blockchain-based framework to detect malware in
autonomous vehicles,” in Proc. Int. Wireless Commun. Mobile Comput. (IWCMC), May 2022,
pp. 278–283.
[206] H. Moniz, “The Istanbul BFT consensus algorithm,” 2020, arXiv:2002.03613.
[207] J. Khamar and H. Patel, “An extensive survey on consensus mechanisms for blockchain
technology,” in Data Science and Intelligent Applications. Cham, Switzerland: Springer, 2021,
pp. 363–374.
[208] Y. Fu, F. R. Yu, C. Li, T. H. Luan, and Y. Zhang, “Vehicular blockchainbased collective
learning for connected and autonomous vehicles,” IEEE Wireless Commun., vol. 27, no. 2, pp.
197–203, Apr. 2020.
[209] Y. Lu, X. Huang, K. Zhang, S. Maharjan, and Y. Zhang, “Blockchain empowered
asynchronous federated learning for secure data sharing in Internet of Vehicles,” IEEE Trans.
Veh. Technol., vol. 69, no. 4, pp. 4298–4311, Apr. 2020.
[210] I. Aliyu, M. C. Feliciano, S. van Engelenburg, D. O. Kim, and C. G. Lim, “A
blockchain-based federated forest for SDN-enabled invehicle network intrusion detection
system,” IEEE Access, vol. 9, pp. 102593–102608, 2021.
[211] B. K. Mohanta, D. Jena, U. Satapathy, and S. Patnaik, “Survey on IoT security: Challenges
and solution using machine learning, artificial intelligence and blockchain technology,” Internet
Things, vol. 11, Sep. 2020, Art. no. 100227.
[212] K. Salah, M. Rehman, N. Nizamuddin, and A. Al-Fuqaha, “Blockchain for AI: Review and
open research challenges,” IEEE Access, vol. 7, pp. 10127–10149, 2019.
[213] K. Khacef, S. Benbernou, M. Ouziri, and M. Younas, “Trade-off between security and
scalability in blockchain design: A dynamic sharding approach,” in Proc. Int. Conf. Deep Learn.,
Big Data Blockchain. Cham, Switzerland: Springer, 2021, pp. 77–90.
[214] M. H. Nasir, J. Arshad, M. M. Khan, M. Fatima, K. Salah, and R. Jayaraman, “Scalable
blockchains—A systematic review,” Future Gener. Comput. Syst., vol. 126, pp. 136–162, Jan.
2022.
43
[215] S. Terzi, C. Savvaidis, K. Votis, D. Tzovaras, and I. Stamelos, “Securing emission data of
smart vehicles with blockchain and selfsovereign identities,” in Proc. IEEE Int. Conf. Blockchain
(Blockchain), Nov. 2020, pp. 462–469.
[216] Y. Xu, G. Wang, J. Yang, J. Ren, Y. Zhang, and C. Zhang, “Towards secure network
computing services for lightweight clients using blockchain,” Wireless Commun. Mobile
Comput., vol. 2018, pp. 1–12, Nov. 2018.
[217] R. Gupta, A. Kumari, and S. Tanwar, “A taxonomy of blockchain envisioned
edge-as-a-connected autonomous vehicles,” Trans. Emerg. Telecommun. Technol., vol. 32, no.
6, Jun. 2021, Art. no. e4009.
[218] L. Creutz, J. Schneider, and G. Dartmann, “Fides: Distributed cyberphysical contracts,” in
Proc. 3rd IEEE Int. Conf. Trust, Privacy Secur. Intell. Syst. Appl. (TPS-ISA), Dec. 2021, pp.
51–60.
[219] S. Lockey et al., “A review of trust in artificial intelligence: Challenges, vulnerabilities and
future directions,” in Proc. Annu. Hawaii Int. Conf. Syst. Sci. Hawaii Int. Conf. Syst. Sci., 2021,
5463–5472.
[220] A. R. Singh, H. Singh, and A. Anand, “Vulnerability assessment, risk, and challenges
associated with automated vehicles based on artificial intelligence,” in Advances in
Communication and Computational Technology. Cham, Switzerland: Springer, 2021, pp.
1323–1337.
[221] T. Evas. European Framework on Ethical Aspects of Artificial Intelligence, Robotics and
Related Technologies. Accessed: Jan. 14, 2022. [Online]. Available: shorturl.at/filqK
[222] M. Scalas and G. Giacinto, “On the role of explainable machine learning for secure smart
vehicles,” in Proc. AEIT Int. Conf. Electr. Electron. Technol. Automot. (AEIT AUTOMOTIVE),
Nov. 2020, pp. 1–6.
[223] M. H. Kabir, K. F. Hasan, M. K. Hasan, and K. Ansari, “Explainable artificial intelligence for
smart city application: A secure and trusted platform,” 2021, arXiv:2111.00601.
[224] M. Mongelli, “Design of countermeasure to packet falsification in vehicle platooning by
explainable artificial intelligence,” Comput. Commun., vol. 179, pp. 166–174, Nov. 2021.
[225] F. Costantini, N. Thomopoulos, F. Steibel, A. Curl, G. Lugano, and T. Kováˇciková,
“Autonomous vehicles in a GDPR era: An international comparison,” in Advances in Transport
Policy and Planning, vol. 5. Amsterdam, The Netherlands: Elsevier, 2020, pp. 191–213.
[226] V. Ilkova and A. Ilka, “Legal aspects of autonomous vehicles—An overview,” in Proc. 21st
Int. Conf. Process Control (PC), Jun. 2017, pp. 428–433.
[227] A European Approach to Artificial Intelligence. Accessed: Jan. 28, 2022. [Online].
Available: https://digital-strategy.ec.europa.
eu/en/policies/european-approach-artificial-intelligence
[228] Blockchain Strategy. Accessed: Jan. 28, 2022. [Online]. Available:
https://digital-strategy.ec.europa.eu/en/policies/blockchain-strategy
[229] A. B. Arrieta et al., “Explainable artificial intelligence (XAI): Concepts, taxonomies,
opportunities and challenges toward responsible AI,” Inf. Fusion, vol. 58, pp. 82–115, Jun. 2020.
[230] I. Bashir, “Quantum consensus,” in Blockchain Consensus. Cham, Switzerland: Springer,
2022, pp. 377–409.
44
TABLE II
EXAMPLES OF RECENT BC-BASED SOLUTIONS RELATED TO AVS SECURITY AND
PRIVACY
TABLE III
EXAMPLES OF RECENT AI-BASED SOLUTIONS RELATED TO AVS SECURITY AND
PRIVACY
TABLE IV
DIFFERENT ASPECTS BETWEEN AI AND BLOCKCHAIN [184]
TABLE V
DEFENSE RESEARCH RELATED AVS SECURITY AND PRIVACY USING BOTH BC AND AI
TECHNIQUES