Cybersecurity of Autonomous Vehicles — A Detailed Research Paper
Abstract
Autonomous vehicles (AVs) combine advanced sensing, machine learning, networking, and control so tightly that cyber vulnerabilities can directly translate into physical harm. This paper surveys the current state of AV cybersecurity: system architecture and attack surface, threat taxonomy (including remote attacks, sensor manipulation, adversarial machine-learning attacks, and supply-chain risks), representative incidents, standards and regulatory responses, defenses at hardware/software/operations levels, open research problems, and actionable recommendations for industry and regulators. Key load-bearing facts—standards (ISO/SAE 21434, UNECE WP.29), NHTSA guidance, real-world safety incidents involving ADAS/Autopilot, and the prevalence of adversarial/physical attacks on perception—are documented and cited. ScienceDirect+4ISO+4UNECE+4
References
• Durlik, I. (2024). Cybersecurity in Autonomous Vehicles—Are We Ready for Full Deployment? Electronics, 13(13), 2654. MDPI
• Iqbal, T., Islam, T., & others. (2023). A review of cyber attacks on sensors and perception systems in autonomous vehicles. ScienceDirect / Transportation Research (survey). ScienceDirect
• ISO/SAE. (2021). ISO/SAE 21434: Road vehicles — Cybersecurity engineering. International Organization for Standardization / SAE International. ISO
• NHTSA. (2016). Cybersecurity Best Practices for Modern Vehicles. National Highway Traffic Safety Administration (Voluntary Guidance). NHTSA
• NHTSA. (ongoing). Automated Vehicle Safety resources and guidance. National Highway Traffic Safety Administration. NHTSA
• Qiu, H., et al. (2024). Adversarial attacks on autonomous driving systems in the physical world: survey & defenses. IEEE Transactions on Intelligent Vehicles / arXiv preprint. arXiv+1
• ITU. (2023). Security requirements for categorized data in vehicle-to-everything (V2X) communication. International Telecommunication Union. ITU
• UNECE WP.29. (n.d.). Automotive regulations and WP.29 introductions. United Nations Economic Commission for Europe. UNECE+1
• The Verge. (2024). FCC passes auto safety spectrum rules for C-V2X. The Verge
• Wouters, L. / Wired. (2019). This Bluetooth Attack Can Steal a Tesla Model X in Minutes. (Demonstration of keyless entry and firmware / pairing vulnerabilities.) WIRED
• AP News. (2024). Biden administration seeks to ban Chinese, Russian tech in US autonomous vehicles (coverage of proposed rules addressing supply-chain and national-security concerns).