Connected and Exposed: Cybersecurity Risks, Regulatory Gaps, and Public Perception in Internet-Connected Vehicles
- URL: http://arxiv.org/abs/2508.15306v1
- Date: Thu, 21 Aug 2025 06:51:54 GMT
- Title: Connected and Exposed: Cybersecurity Risks, Regulatory Gaps, and Public Perception in Internet-Connected Vehicles
- Authors: Henrietta Hegyi, Laszlo Erdodi,
- Abstract summary: This paper explores the evolving threat landscape associated with connected vehicles.<n>It focuses on risks such as unauthorized remote access and the potential leakage of personal data.<n>To assess the current state of protection, we conducted a comprehensive analysis of 16 international standards and regulations.<n>We also carried out a user-focused survey designed to map consumer attitudes toward smart cars.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: The rapid advancement of Internet-connected vehicle technologies has introduced a new era of smart mobility, while simultaneously raising significant cybersecurity and privacy concerns. This paper explores the evolving threat landscape associated with connected vehicles, focusing on risks such as unauthorized remote access and the potential leakage of personal data. To assess the current state of protection, we conducted a comprehensive analysis of 16 international standards and regulations, evaluating them from multiple perspectives including regulatory strength, technical specificity, treatment of supply chain risks, and approaches to personal data handling. In parallel, we carried out a user-focused survey designed to map consumer attitudes toward smart cars. The survey investigated which types of vehicles users trust and prefer, the reasons behind rejecting certain car types, their awareness of data-related risks, and whether they feel adequately informed about how their vehicles handle data. By combining regulatory analysis with user perception insights, this study aims to contribute to a more holistic understanding of the challenges and expectations surrounding connected vehicle ecosystems.
Related papers
- How Safe Is Your Data in Connected and Autonomous Cars: A Consumer Advantage or a Privacy Nightmare ? [21.526036185120287]
Vehicle-to-Everything (V2X) communication enables autonomous cars to generate and exchange substantial amounts of data with real-world entities.<n>This review paper explores the multifaceted nature of data sharing in CAVs, analyzing its contributions to innovation and its associated vulnerabilities.<n>It emphasizes the urgent need for robust policies and ethical data management practices.
arXiv Detail & Related papers (2026-01-18T06:45:21Z) - Showcasing standards and approaches for cybersecurity, safety, and privacy issues in connected and autonomous vehicles [0.24475591916185502]
This paper aims to bridge cybersecurity, safety, and privacy concerns in Connected and Autonomous Vehicles (CAV) with respect to Risk Assessment (RA) and Threat Modelling (TM)<n>We highlight latest standards and approaches in RA and TM research to tackle complex attack surfaces as the ones posed by automotive settings.
arXiv Detail & Related papers (2025-08-02T05:45:50Z) - Investigating Vulnerabilities of GPS Trip Data to Trajectory-User Linking Attacks [49.1574468325115]
We propose a novel attack to reconstruct user identifiers in GPS trip datasets consisting of single trips.<n>We show that the risk of re-identification is significant even when personal identifiers have been removed.<n>Further investigations indicate that users who frequently visit locations that are only visited by a small number of others tend to be more vulnerable to re-identification.
arXiv Detail & Related papers (2025-02-12T08:54:49Z) - Open Problems in Machine Unlearning for AI Safety [61.43515658834902]
Machine unlearning -- the ability to selectively forget or suppress specific types of knowledge -- has shown promise for privacy and data removal tasks.<n>In this paper, we identify key limitations that prevent unlearning from serving as a comprehensive solution for AI safety.
arXiv Detail & Related papers (2025-01-09T03:59:10Z) - VMGuard: Reputation-Based Incentive Mechanism for Poisoning Attack Detection in Vehicular Metaverse [52.57251742991769]
vehicular Metaverse guard (VMGuard) protects vehicular Metaverse systems from data poisoning attacks.<n>VMGuard implements a reputation-based incentive mechanism to assess the trustworthiness of participating SIoT devices.<n>Our system ensures that reliable SIoT devices, previously missclassified, are not barred from participating in future rounds of the market.
arXiv Detail & Related papers (2024-12-05T17:08:20Z) - Contextualizing Security and Privacy of Software-Defined Vehicles: State of the Art and Industry Perspectives [7.160802183553593]
Survey explores the cybersecurity and privacy challenges posed by Software-Defined Vehicles (SDVs)<n>SDVs increasingly integrate features like Over-the-Air (OTA) updates and Vehicle-to-Everything (V2X) communication.<n>Transition to SDVs also raises significant privacy concerns, with vehicles collecting vast amounts of sensitive data.
arXiv Detail & Related papers (2024-11-15T22:30:07Z) - Traffic and Safety Rule Compliance of Humans in Diverse Driving Situations [48.924085579865334]
Analyzing human data is crucial for developing autonomous systems that replicate safe driving practices.
This paper presents a comparative evaluation of human compliance with traffic and safety rules across multiple trajectory prediction datasets.
arXiv Detail & Related papers (2024-11-04T09:21:00Z) - Securing Tomorrow's Smart Cities: Investigating Software Security in Internet of Vehicles and Deep Learning Technologies [1.0377683220196872]
Integrating Deep Learning (DL) techniques in the Internet of Vehicles (IoV) introduces many security challenges and issues that require thorough examination.
This literature review delves into the inherent vulnerabilities and risks associated with DL in IoV systems, shedding light on the multifaceted nature of security threats.
arXiv Detail & Related papers (2024-07-23T11:56:33Z) - Leveraging Driver Field-of-View for Multimodal Ego-Trajectory Prediction [69.29802752614677]
RouteFormer is a novel ego-trajectory prediction network combining GPS data, environmental context, and the driver's field-of-view.<n>To tackle data scarcity and enhance diversity, we introduce GEM, a dataset of urban driving scenarios enriched with synchronized driver field-of-view and gaze data.
arXiv Detail & Related papers (2023-12-13T23:06:30Z) - Why Autonomous Vehicles Are Not Ready Yet: A Multi-Disciplinary Review of Problems, Attempted Solutions, and Future Directions [43.389650174195914]
The present review adopts an integrative and multidisciplinary approach to investigate the major challenges faced by the automative sector.<n>The review examines the limitations and risks associated with current technologies and the most promising solutions devised by the researchers.
arXiv Detail & Related papers (2023-11-15T16:41:18Z) - Autonomous Vehicles an overview on system, cyber security, risks,
issues, and a way forward [0.0]
This chapter explores the complex realm of autonomous cars, analyzing their fundamental components and operational characteristics.
The primary focus of this investigation lies in the realm of cybersecurity, specifically in the context of autonomous vehicles.
A comprehensive analysis will be conducted to explore various risk management solutions aimed at protecting these vehicles from potential threats.
arXiv Detail & Related papers (2023-09-25T15:19:09Z) - The Integration of Prediction and Planning in Deep Learning Automated Driving Systems: A Review [43.30610493968783]
We review state-of-the-art deep learning-based planning systems, and focus on how they integrate prediction.
We discuss the implications, strengths, and limitations of different integration principles.
arXiv Detail & Related papers (2023-08-10T17:53:03Z) - Location Privacy Threats and Protections in 6G Vehicular Networks: A Comprehensive Review [23.901688216192397]
Location privacy is critical in vehicular networks, where drivers' trajectories and personal information can be exposed.<n>This survey reviews comprehensively different localization techniques, including sensing infrastructure-based, optical vision-based, and cellular radio-based localization.<n>We classify Location Privacy Preserving Mechanisms (LPPMs) into user-side, server-side, and user-server-interface-based, and evaluate their effectiveness.
arXiv Detail & Related papers (2023-05-08T06:55:35Z) - Camera-Radar Perception for Autonomous Vehicles and ADAS: Concepts,
Datasets and Metrics [77.34726150561087]
This work aims to carry out a study on the current scenario of camera and radar-based perception for ADAS and autonomous vehicles.
Concepts and characteristics related to both sensors, as well as to their fusion, are presented.
We give an overview of the Deep Learning-based detection and segmentation tasks, and the main datasets, metrics, challenges, and open questions in vehicle perception.
arXiv Detail & Related papers (2023-03-08T00:48:32Z) - Federated Deep Learning Meets Autonomous Vehicle Perception: Design and
Verification [168.67190934250868]
Federated learning empowered connected autonomous vehicle (FLCAV) has been proposed.
FLCAV preserves privacy while reducing communication and annotation costs.
It is challenging to determine the network resources and road sensor poses for multi-stage training.
arXiv Detail & Related papers (2022-06-03T23:55:45Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.