Cybersecurity framework for connected and automated vehicles: A modelling perspective

被引:1
|
作者
Khan, Shah Khalid [1 ,2 ]
Shiwakoti, Nirajan [2 ]
Stasinopoulos, Peter [2 ]
Chen, Yilun [3 ]
Warren, Matthew [1 ,4 ,5 ]
机构
[1] RMIT Univ, Ctr Cyber Secur Res & Innovat, Melbourne, Australia
[2] RMIT Univ Melbourne, Sch Engn, Melbourne 3000, Australia
[3] Transport New South Wales, Simulat & Modelling Team, Sydney, Australia
[4] RMIT Univ Australia, Melbourne, Australia
[5] Univ Johannesburg, Johannesburg, South Africa
关键词
MANAGEMENT-TECHNIQUES; AUTONOMOUS VEHICLES; CYBER SECURITY; INNOVATION; DYNAMICS; CLASSIFICATION; SIMULATION; HACKERS; SYSTEMS; IMPACT;
D O I
10.1016/j.tranpol.2024.11.019
中图分类号
F [经济];
学科分类号
02 ;
摘要
Connected and Automated Vehicles (CAVs) cybersecurity is an inherently complex, multi-dimensional issue that goes beyond isolated hardware or software vulnerabilities, extending to human threats, network vulnerabilities, and broader system-level risks. Currently, no formal, comprehensive tool exists that integrates these diverse dimensions into a unified framework for CAV cybersecurity assessment. This study addresses this challenge by developing a System Dynamics (SD) model for strategic cybersecurity assessment that considers technological challenges, human threats, and public cybersecurity awareness during the CAV rollout. Specifically, the model incorporates a novel SD-based Stock-and-Flow Model (SFM) that maps six key parameters influencing cyberattacks at the system level. These parameters include CAV communication safety, user adoption rates, log file management, hacker capabilities, understanding of hacker motivations (criminology theory maturity), and public awareness of CAV cybersecurity. The SFM's structure and behaviour were rigorously tested and then used to analyse five plausible scenarios: i) Baseline (Technological Focus Only), ii) Understanding Hacker Motivations, iii) CAV User and OEM Education, iv) CAV Penetration Rate Increase, and v) CAV Penetration Rate Increase with Human behaviour Analysis. Four metrics are used to benchmark CAV cybersecurity: communication safety, probability of hacking attempts, probability of successful defence, and number of CAV adopters. The results indicate that while baseline technological advancements strengthen communication framework robustness, they may also create new vulnerabilities that hackers could exploit. Conversely, a deeper understanding of hacker motivations (Criminology Theory Maturity) effectively reduces hacking attempts. It fosters a more secure environment for early CAV adopters. Additionally, educating CAV users and OEM increases the probability of defending against cyberattacks. While CAV penetration increases the likelihood of hack defence due to a corresponding rise in attempts, there is a noticeable decrease in hacking attempts with CAV penetration when analysing human behaviour. These findings, when translated into policy instruments, can pave the way for a more optimised and resilient cyber-safe ITS.
引用
收藏
页码:47 / 64
页数:18
相关论文
共 50 条
  • [31] Automated/connected vehicles and the environment
    Zhang, Wenwen
    Zhang, Kai
    Transportation Research Part D: Transport and Environment, 2022, 102
  • [32] Automated/connected vehicles and the environment
    Zhang, Wenwen
    Zhang, Kai
    TRANSPORTATION RESEARCH PART D-TRANSPORT AND ENVIRONMENT, 2022, 102
  • [33] Developments in connected and automated vehicles
    Yang, C. Y. David
    Ozbay, Kaan
    Ban, Xuegang
    JOURNAL OF INTELLIGENT TRANSPORTATION SYSTEMS, 2017, 21 (04) : 251 - 254
  • [34] Developments in connected and automated vehicles
    Ozbay, Kaan
    Ban, Xuegang
    Yang, C. Y. David
    JOURNAL OF INTELLIGENT TRANSPORTATION SYSTEMS, 2018, 22 (03) : 187 - 189
  • [35] Security of connected and automated vehicles
    Chowdhury, Mashrur
    Islam, Mhafuzul
    Khan, Zadid
    Bridge, 2019, 49 (03) : 46 - 56
  • [36] Artificial Intelligence and Vehicles [Connected and Automated Vehicles]
    Sjoberg, Katrin
    IEEE VEHICULAR TECHNOLOGY MAGAZINE, 2024, 19 (01): : 103 - 105
  • [37] Modelling the road network capacity considering residual queues and connected automated vehicles
    Zhang, Peng
    Yue, Hao
    Shao, Chunfu
    Zhang, Xu
    Ran, Bin
    IET INTELLIGENT TRANSPORT SYSTEMS, 2022, 16 (04) : 543 - 570
  • [38] Guest Editorial: Modelling, operation and management of traffic mixed with connected and automated vehicles
    Zong, Fang
    Zhong, Renxin
    Ma, Wei
    Yang, Dujuan
    Pu, Ziyuan
    Dong, Ngoduy
    He, Zhengbing
    IET INTELLIGENT TRANSPORT SYSTEMS, 2024, 18 (03) : 433 - 435
  • [39] Modelling and simulation of mixed traffic flow with dedicated lanes for connected automated vehicles
    Xiong, Zhuozhi
    Hu, Pei
    Li, Ni
    Chen, Xu
    Chen, Wang
    Wang, Hao
    Xie, Ning
    Li, Ye
    Dong, Changyin
    EXPERT SYSTEMS WITH APPLICATIONS, 2025, 274
  • [40] DRIVING WITH SHARKS Rethinking Connected Vehicles with Vehicle Cybersecurity
    Eiza, Mahmoud Hashem
    Ni, Qiang
    IEEE VEHICULAR TECHNOLOGY MAGAZINE, 2017, 12 (02): : 45 - 51