"Protecting Connected, Self-Driving Vehicles From Hackers"

A study led by the University of Michigan found that emerging self-driving vehicle networks that collaborate and communicate with one another or with infrastructure to make decisions are vulnerable to data fabrication attacks. The Vehicle-to-Everything (V2X) network of collaboration and communication is still in development as many countries are still testing it on a small scale. Information sharing among vehicles allows hackers to introduce fake objects or remove real objects from perception data, potentially causing vehicles to brake hard or crash. To gain further insights into security vulnerabilities faced by self-driving vehicles, the researchers administered falsified LiDAR-based 3D sensor data that appears realistic to the system but has been maliciously modified via physical access to the hardware and software system. They used zero-delay attack scheduling, which involves precise timing to quickly introduce malicious data. This article continues to discuss the study "On Data Fabrication in Collaborative Vehicular Perception: Attacks and Countermeasures."

The University of Michigan reports "Protecting Connected, Self-Driving Vehicles From Hackers"

Submitted by grigby1

Submitted by Gregory Rigby on