Smart Car Privacy: Survey of Attacks and Privacy Issues
- URL: http://arxiv.org/abs/2508.03413v1
- Date: Tue, 05 Aug 2025 12:59:17 GMT
- Title: Smart Car Privacy: Survey of Attacks and Privacy Issues
- Authors: Akshay Madhav Deshmukh,
- Abstract summary: Vehicular Ad hoc Networks (VANETs) are emerging mobile ad hoc network technologies.<n>Security and privacy are the major concerns in VANETs due to the mobility of the vehicles.<n>This paper provides an overview of various vehicular network architectures.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Automobiles are becoming increasingly important in our day to day life. Modern automobiles are highly computerized and hence potentially vulnerable to attack. Providing many wireless connectivity for vehicles enables a bridge between vehicles and their external environments. Such a connected vehicle solution is expected to be the next frontier for automotive revolution and the key to the evolution to next generation intelligent transportation systems. Vehicular Ad hoc Networks (VANETs) are emerging mobile ad hoc network technologies incorporating mobile routing protocols for inter-vehicle data communications to support intelligent transportation systems. Thus security and privacy are the major concerns in VANETs due to the mobility of the vehicles. Thus designing security mechanisms to remove adversaries from the network remarkably important in VANETs. This paper provides an overview of various vehicular network architectures. The evolution of security in modern vehicles. Various security and privacy attacks in VANETs with their defending mechanisms with examples and classify these mechanisms. It also provides an overview of various privacy implication that a vehicular network possess.
Related papers
- Cybersecurity for Autonomous Vehicles [0.0]
The increasing adoption of autonomous vehicles is bringing a major shift in the automotive industry.<n>As these vehicles become more connected, cybersecurity threats have emerged as a serious concern.<n>This paper discusses major cybersecurity challenges like vulnerabilities in software and hardware, risks from wireless communication, and threats through external interfaces.
arXiv Detail & Related papers (2025-04-28T18:31:37Z) - Physical Backdoor Attack can Jeopardize Driving with Vision-Large-Language Models [53.701148276912406]
Vision-Large-Language-models (VLMs) have great application prospects in autonomous driving.
BadVLMDriver is the first backdoor attack against VLMs for autonomous driving that can be launched in practice using physical objects.
BadVLMDriver achieves a 92% attack success rate in inducing a sudden acceleration when coming across a pedestrian holding a red balloon.
arXiv Detail & Related papers (2024-04-19T14:40:38Z) - Differentiated Security Architecture for Secure and Efficient Infotainment Data Communication in IoV Networks [55.340315838742015]
Negligence on the security of infotainment data communication in IoV networks can unintentionally open an easy access point for social engineering attacks.
In particular, we first classify data communication in the IoV network, examine the security focus of each data communication, and then develop a differentiated security architecture to provide security protection on a file-to-file basis.
arXiv Detail & Related papers (2024-03-29T12:01:31Z) - Reinforcement Learning based Cyberattack Model for Adaptive Traffic
Signal Controller in Connected Transportation Systems [61.39400591328625]
In a connected transportation system, adaptive traffic signal controllers (ATSC) utilize real-time vehicle trajectory data received from vehicles to regulate green time.
This wirelessly connected ATSC increases cyber-attack surfaces and increases their vulnerability to various cyber-attack modes.
One such mode is a'sybil' attack in which an attacker creates fake vehicles in the network.
An RL agent is trained to learn an optimal rate of sybil vehicle injection to create congestion for an approach(s)
arXiv Detail & Related papers (2022-10-31T20:12:17Z) - Anomaly Detection in Intra-Vehicle Networks [0.0]
Modern vehicles are connected to a range of networks, including intra-vehicle networks and external networks.
With the loopholes in the existing traditional protocols, cyber-attacks on the vehicle network are rising drastically.
This paper discusses the security issues of the CAN bus protocol and proposes an Intrusion Detection System (IDS) that detects known attacks.
arXiv Detail & Related papers (2022-05-07T03:38:26Z) - COOPERNAUT: End-to-End Driving with Cooperative Perception for Networked
Vehicles [54.61668577827041]
We introduce COOPERNAUT, an end-to-end learning model that uses cross-vehicle perception for vision-based cooperative driving.
Our experiments on AutoCastSim suggest that our cooperative perception driving models lead to a 40% improvement in average success rate.
arXiv Detail & Related papers (2022-05-04T17:55:12Z) - A Transfer Learning and Optimized CNN Based Intrusion Detection System
for Internet of Vehicles [10.350337750192997]
In this paper, a transfer learning and ensemble learning-based IDS is proposed for Internet of Vehicles (IoV) systems.
The proposed IDS has demonstrated over 99.25% detection rates and F1-scores on two public benchmark IoV security datasets.
This shows the effectiveness of the proposed IDS for cyber-attack detection in both intra-vehicle and external vehicular networks.
arXiv Detail & Related papers (2022-01-27T21:24:09Z) - Roadmap for Cybersecurity in Autonomous Vehicles [3.577310844634503]
We discuss major automotive cyber-attacks over the past decade and present state-of-the-art solutions that leverage artificial intelligence (AI)
We propose a roadmap towards building secure autonomous vehicles and highlight key open challenges that need to be addressed.
arXiv Detail & Related papers (2022-01-19T16:42:18Z) - Cybersecurity Threats in Connected and Automated Vehicles based
Federated Learning Systems [7.979659145328856]
Federated learning (FL) aims at training an algorithm across decentralized entities holding their local data private.
Most cyber defense techniques depend on highly reliable and connected networks.
This paper explores falsified information attacks, which target the FL process that is ongoing at the RSU.
arXiv Detail & Related papers (2021-02-26T01:39:16Z) - Fine-Grained Vehicle Perception via 3D Part-Guided Visual Data
Augmentation [77.60050239225086]
We propose an effective training data generation process by fitting a 3D car model with dynamic parts to vehicles in real images.
Our approach is fully automatic without any human interaction.
We present a multi-task network for VUS parsing and a multi-stream network for VHI parsing.
arXiv Detail & Related papers (2020-12-15T03:03:38Z) - Local Differential Privacy based Federated Learning for Internet of
Things [72.83684013377433]
Internet of Vehicles (IoV) simulates a large variety of crowdsourcing applications such as Waze, Uber, and Amazon Mechanical Turk, etc.
Users of these applications report the real-time traffic information to the cloud server which trains a machine learning model based on traffic information reported by users for intelligent traffic management.
In this paper, we propose to integrate federated learning and local differential privacy (LDP) to facilitate the crowdsourcing applications to achieve the machine learning model.
arXiv Detail & Related papers (2020-04-19T14:03:10Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.