Cyber Security Analytics: Human Vulnerability to Cyber Attack Attempts When Using Autonomous Vehicles

Find Similar History 33 Claim Ownership Request Data Change Add Favourite

Title
Cyber Security Analytics: Human Vulnerability to Cyber Attack Attempts When Using Autonomous Vehicles

CoPED ID
d0036c10-0b25-4f62-93e6-f1ab85aad788

Status
Active

Funders

Value
No funds listed.

Start Date
Sept. 30, 2021

End Date
March 30, 2025

Description

More Like This


Autonomous vehicles (AVs) promise huge benefits from improved road safety to reduced carbon emission. To reap the full benefit of such technology, future AVs have been envisioned to be "connected" in the sense that they will be able to communicate with each other and the external infrastructure through shared wireless networks so that optimisation of collective decision making can be achieved. This introduces new threats of cyber-attacks which could lead to severe disruptions to system operation and potentially cause catastrophic incidents.
The most common infiltration/attack techniques (e.g., propagating malware across the entire network using spamming, malicious messaging and update requests) usually rely on the "cooperation" of the user of a terminal computer (e.g., accepting a request), which makes the human potentially the weakest link of the system if they succumb to such malicious attempts with data showing human error can be responsible for up to 95% of cyber security breaches. Human-factor-dependent cyber security vulnerabilities can be exacerbated in the context of autonomous driving - the low cognitive demand from the driving task may cause a lowered situation awareness and trigger an automatic, heuristic-driven cognitive processing style, which could make AV users more susceptible to falling victim of malicious spamming, as research shows.

Phillip Morgan SUPER_PER
Jacob Bretherick STUDENT_PER

Subjects by relevance
  1. Data security
  2. Safety and security
  3. Wireless technology
  4. Optimisation
  5. Autonomous cars
  6. Automation
  7. Pre-emption
  8. Emissions
  9. Infrastructures
  10. Data communications networks
  11. Cooperation (general)
  12. Technological development
  13. Cyber security
  14. Malware
  15. Information technology

Extracted key phrases
  1. Cyber Attack Attempts
  2. Cyber Security Analytics
  3. Human Vulnerability
  4. Autonomous Vehicles
  5. Av user
  6. Autonomous driving
  7. Future av
  8. Dependent cyber security vulnerability
  9. Huge benefit
  10. Improved road safety
  11. Cyber security breach
  12. Malicious messaging
  13. Malicious attempt
  14. Low cognitive demand
  15. Malicious spamming

Related Pages

UKRI project entry

UK Project Locations