The purpose of this project is to provide cybersecurity professionals and the law enforcement agencies with information on autonomous vehicles, discuss the vulnerability and exploits with recommendations for mitigating threats. The commercial,automotive manufacturers,have indicated that fully autonomous vehicles will be available to the public by 2030. The preference for autonomous vehicles supports by the anticipation of enhancing driver safety features as well as the increased mobility for the young, elderly and disabled; decrease traffic congestion, emissions, and fuel consumption. Conversely, the anticipated advantages of autonomous vehicles take precedence over the vulnerability of the network connectivity that creates the opportunity and the likelihood of cyber-attacks. The information comes from the scholarly literature on the vulnerabilities of autonomous vehicles retrieved from electronic databases. The findings reinforced the vulnerabilities within autonomous vehicles include the sensors; adaptive algorithms; and V2V, V2I, or V2X communications. The recommended techniques for decreasing the vulnerabilities include routine penetration testing, forming diligent,cooperative relationships with automotive industries concerning threats to increasing awareness while cultivating a cybersecurity culture, managing security updates, conducting digital forensic, securing information sharing, providing incident report and recovery, investing in artificial intelligence detection, and taking advantage of bug bounty programs. This project provides essential information that can be used by anyone working within the autonomous vehicle industry including cybersecurity professionals, law enforcement, policymakers, and manufacturers consulting on the mitigation of vulnerabilities in autonomous vehicles.
|Advisor:||Giordano, Jaclyn V., Mullinix, Michelle D.|
|School Location:||United States -- New York|
|Source:||MAI 58/06M(E), Masters Abstracts International|
|Keywords:||Autonomous vehicles, Exploits, Hacking, Incident response, Malware, Penetration testing|
Copyright in each Dissertation and Thesis is retained by the author. All Rights Reserved
The supplemental file or files you are about to download were provided to ProQuest by the author as part of a
dissertation or thesis. The supplemental files are provided "AS IS" without warranty. ProQuest is not responsible for the
content, format or impact on the supplemental file(s) on our system. in some cases, the file type may be unknown or
may be a .exe file. We recommend caution as you open such files.
Copyright of the original materials contained in the supplemental file is retained by the author and your access to the
supplemental files is subject to the ProQuest Terms and Conditions of use.
Depending on the size of the file(s) you are downloading, the system may take some time to download them. Please be