Analysis on Attack Scenarios and Countermeasures for Self-driving Car and Its Infrastructures

  • Dohyun Lim
  • Kitaek Park
  • Dongjun Choi
  • Jungtaek SeoEmail author
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 2)


Autonomous vehicles collect and process information required for driving autonomously and apply the processed result for vehicle driving thereby driving vehicles automatically by identifying road situations without additional control of brakes, handling, and acceleration pedal by drivers. Since self-driving cars collect information from various sensors and communication is done between various sensors and devices over the infrastructure, they are vulnerable to unexpected accidents due to malicious hacking attacks if self-driving cars are commercialized without ensuring security technologies and establishment of security systems. In particular, securing safety is highly emphasized due to automobile technology that is directly related to human lives and safety. In the present paper, security threats against self-driving cars and infrastructures are analyzed and possible attack scenarios are developed to predict the impact. Furthermore, the current status on research and development of security technology is analyzed and items of technology development to ensure cyber security of self-driving cars and infrastructures as well as R&D strategies are presented for future research.


Home Network Electronic Control Unit Malicious Code Attack Scenario Security Technology 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Collaboration of Related Ministries, Support Measures for Commercialization Self-driving Cars, Ministry of Land, Infrastructure and Transport (2015)Google Scholar
  2. 2.
    Lee, Jeonghoon; Kim, Hyunyong, Electricity flows in car. The Collaboration, eBEST INVESTMENT SECURITIES Co., Ltd (2015)Google Scholar
  3. 3.
    Korea communications Agency, Current trend of technologies and prospects of security technology for vehicle communication used in intelligent road systems No. 59 (2014)Google Scholar
  4. 4.
    Shin, Younoh, Precision Map, V2X Self-driving car without road infrastructure, Can it be run well? e4ds News (2016)Google Scholar
  5. 5.
    Hyundai Motor Company, Press release of the current trend on technological development of self-driving cars (2016)Google Scholar
  6. 6.
    Oh, Hyunseo, Technological trend of cooperative driving via V2X communication ETRI (2015) 33-36Google Scholar
  7. 7.
    Kim, Sangguk, Autonomous driving functional systems, Industrial Information Analysis Department (2015)Google Scholar
  8. 8.
    Policy Research Center, V2X communication, Rising core technology for intelligent traffic system, Trend Focus (2014) 45-46Google Scholar
  9. 9.
    Ministry of Land, Infrastructure and Transport, Report on the current trend of standardization on ITS in overseas Vol. 2(2014)Google Scholar
  10. 10.
    Lee, Donghoon, Technology fusion of vehicle and ICT and current trend of security technology, TTA Journal. Vol. 153 (2014)Google Scholar
  11. 11.
    Sohn, Gyungho, ETRI Privacy technology, ISO standard adoption, ZDNet Korea (2013)Google Scholar
  12. 12.
    Lee, Yuji, Launching of technology development for V2X integrated security for safe autonomous driving era, BYLINE NETWORK (2016)Google Scholar
  13. 13.
    Idan, E.: ProtectivX Hacker Detection System Helps Reduce the Threat of a Collision Caused by Hackers. PR Newswire (2016)Google Scholar
  14. 14.
    Norbert, B., Sebastian, M., Jonathan P., Mirko, L., Martin, M., Daniel, E., Michel, S., Michael, F., Rim, M., Marcello, L., Frank, K.:V2X Security Architecture V2. Vol. 1. PERSERVE (2014)Google Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  • Dohyun Lim
    • 1
  • Kitaek Park
    • 1
  • Dongjun Choi
    • 1
  • Jungtaek Seo
    • 1
    Email author
  1. 1.Department of Information Security EngineeringSoonchunhyang UniversityAsanSouth Korea

Personalised recommendations