Cybersecurity Risks in Driverless Cars and the Aviation Industry

Verified

Added on  2023/04/11

|10
|2028
|287
Report
AI Summary
This report investigates the potential cybersecurity threats facing both the driverless car and aviation industries. It begins with an executive summary highlighting the key concerns around cyber-attacks and the risks associated with data disclosure due to weak security. The introduction defines these technologies and outlines the scope of the study, which is to identify potential vulnerabilities. The report then delves into the possibility of cyber-attacks on driverless cars, detailing ways in which they are susceptible to hackers, including the exploitation of data processing, cloud computing, and communication devices. It also addresses the potential for terrorists to exploit these vulnerabilities. The report then shifts its focus to the aviation industry, examining the use of digital technologies and the increasing reliance on Wi-Fi, which creates opportunities for hacking. The report notes the concerns of airline CEOs regarding data theft and the added threats that come with integrating flight operation systems. The Next Generation Air Transportation System (NextGen) is also discussed as a potential area of vulnerability. The conclusion emphasizes the increasing complexity and interconnectedness of these industries, highlighting the need for continuous efforts to secure roads and air from cyber threats. The report is supported by a list of relevant references.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: NATIONAL DATA INFRASTUCTRE SECURITY
NATIONAL DATA INFRASTUCTRE SECURITY
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
NATIONAL DATA INFRASTUCTRE SECURITY 1
Executive Summary:
The purpose of this study is to find the possibility of cyber-attack in driverless car as well as
in the aviation industry. Because, cyber-attack is going to be a key concern for both aviation
industry and driverless cars and there have been risks that associated with inadvertent
information discloser through weak cyber security. the driverless cars and aircrafts both can
be evolved in complexity and the hierarchized environments where so many of the
stakeholders have been involved. They are the by-products of so many years of the
technological prowess also have facilitated the daily life of people greatly.
Document Page
2NATIONAL DATA INFRASTUCTRE SECURITY
Table of Contents
Introduction:...............................................................................................................................3
Possibility of cyber-attack in Driverless Car:............................................................................3
Driverless cart security:..........................................................................................................3
Some ways self-driving cars are susceptible to hackers:.......................................................5
Possibility of cyber-attack in aviation industry:.........................................................................6
Conclusion:................................................................................................................................7
References:.................................................................................................................................8
Document Page
3NATIONAL DATA INFRASTUCTRE SECURITY
Introduction:
A driverless car also known as an autonomous car, robot car or a self-driving car is a
kind of vehicle which has the capability of the environment outside and moving without
human input. The driverless cars are a combination of different types of sensors for perceive
the surroundings like sonar, odometry, gps, lider, rader and inertial measurement units. On
the other hand, air transport or Aviation refers to the surrounding activities of the mechanical
flight as well as the aircraft industry. The aircraft includes rotary wings and fixed wings
types, lifting body having no wings, morphable wings and also lighter than the air craft like
airships and balloons. The purpose of this study is to find the possibility of cyber-attack in
driverless car as well as in the aviation industry. Because, cyber attack is going to be a key
concern for both aviation industry and driverless cars and there have been risks that
associated with inadvertent information discloser through weak cyber security.
Possibility of cyber-attack in Driverless Car:
There could be a number of reasons to motivate Hacking. A hacker may demand a
seeking or ransom for taking control in a domestic or personal situation. It is also known
from the terrorism events happened recently that the driverless cars can be used for harming
people or property.
Driverless cart security:
With the capabilities of self driving becoming closer to the reality for the vehicles that
are private as well as the public transit alike, it is a natural thing to think about the security
and safety of this new technology. As the FBI highlighted some security issues related to
driver less cars in their recent report (Abueh & Liu, 2016). The report concluded that by
equipping a car having the autonomous technologies, could make a potential weapon for the
terrorist. As the terrorism is a concern, the terrorists might pack a car having autonomous
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4NATIONAL DATA INFRASTUCTRE SECURITY
technologies with huge number of explosives to turn that vehicle into driverless bomb by
controlling the vehicle remotely from a safe location.
The concerns or issues are just more than hypothetical. The hackers known as white
hat hackers are demonstrating the flaws of security from years by illustrating that how
difficult it is for seizing the control over several systems even by exploiting the cars that are
non autonomous. The concerns are exacerbated only with the cars that can be controlled by
the internet, where all or many of the systems of the vehicles have been controlled by the
computers as well as therefore open to attack. Even the advanced Autopilot system by Tesla
can be easily tricked fairly. On June 30th 2016, a Tesla self-drive car user was killed when
the system failed to detect a turning truck (Coppola & Morisio, 2016).
The problem with the driverless cars is not the process of manufacturing itself, but the
probable outcomes volume could arise even from the smallest of miscalculations. However,
the manufacturers and the governments have to more worry about the manufacturing defects.
As the IOT (Internet of things) is a feature that is embedded, can help the vehicles of the
future to navigate through the crowded busy roads, to make decision within a split of second
(Wyglinski et al., 2013). The driverless cars are already facing controversy growing about the
safety of it as well as the capabilities to make decision that are ethical. It has been warned by
the critics that the autonomous cars would face faults over the ethical testing in different
scenarios. During the phase of testing, some driverless cars got involved into collisions as
well as for making moral poor decisions (Eiza & Ni, 2017). Hence, a growing concern is also
there over the policy of structing as well as the legislation for accommodating actions leally
against the vehicles which can de independently driven.
A possible challenge that is discussed widely, is whether the automated vehicles will
be having cyber security that is fortified for keeping the cyber criminals at a bay. Each and
Document Page
5NATIONAL DATA INFRASTUCTRE SECURITY
every major companies are completing for manufacturing the exceptional most driverless car.
If the security issues are not tackled properly, then the automated vehicles will be faced
failure for delivering results.
Some ways self-driving cars are susceptible to hackers:
With involving so many data processing, the malicious hackers can exploit some of
the vulnerabilities. As an example, it an be said that, a hacker would need only to hack one of
the entry points. The database of cloud computing or communication device of the vehicles,
for accessing the large amount of data which can be used for manipulating the vehicles
(Knowles et al., 2015). But if the safety features could switch off somehow by the user, then
so many problems will be occurred there even in a perfectly safe vehicle. Also, the constantly
transferred information cannot be encrypted highly which will be an open path for the
hackers to break the security of the cars,
Each of the manufacturers have different types of coding system which need to be
aligned for making the transmissions of information compatible with the other components.
As a huge number of variables are involved there, it will be so challenging to identify the
weak links, that the manufactures could overlook (Yağdereli Gemci & Aktaş, 2015). For the
cybercriminals it would be a great opportunity for exploiting the weakness of security.
By collaborating two of the manufacturing companies, it should mean a better
resource for developing a technology that is resilient, which can improve the security of the
cars and might able to keep the hackers away from the driver less cars. The resources that
will be shared between the companies will also make improvement in testing vulnerabilities
of the vehicles. Therefor the manufacturers of automated vehicles need to make collaboration
in between each other instead of competing for improvement in implications of the
cybersecurity in driverless cars.
Document Page
6NATIONAL DATA INFRASTUCTRE SECURITY
Possibility of cyber-attack in aviation industry:
The air traffic management uses digital technologies in the airports for efficiencies.
Threats from the cyber attackers are not visible as well as evolving always. WIFI is on the air
craft is offered increasing as it provides entertainment as well as a communication method to
the customers in the air (Johnson, 2013). However, the provided WIFI on the plane is not so
secure that means anything that is done on a phone or laptop by using the network of aircraft
could be hacked potentially.
According to a survey, 85 percent of the CEOs of the airlines expressed their concern
about the risks in aviator industry versus the 62 percent CEOs of the other industries, there
has a 23 percentages points of difference (Gramatica et al., 2015). As in the other industries,
most of the airlines are concerned with the fear of being theft of important data of the
company or sensitive customers.
However, there is an added threat for the aviator industry is that for the improvement of the
connectivity in operation systems of the flights with traffic systems o airline and ground
views, the airlines companies are using technologies (Gopalakrishnan et al., 2013) While this
integrations and enhanced communication is essential for the improvement of operational and
financial performance. For exploiting those advantages more opportunities have been
provided by it for these seeking. So, as the airlines are adopting the advanced technologies
increasingly, the security procedures must need to be upgraded for allowing the safe
innovation. Overall, the procedures of security to date have been so effective and integrating
safely the many advantages related to technology that was introduced to airlines and aircraft
(Zanero, 2017). Although, the aviator industry continues to look at the primary technological
advantages which contribute in complexity of protecting assets and data. Two of them are
installation of in-flight entertainment and the tablet based electronic flight bags as well the
system of Wi-Fi connectivity.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7NATIONAL DATA INFRASTUCTRE SECURITY
Another cyber issue that is potential for the aviator industry is the Federal Aviation
Administration’s (FAA), notably the Next Generation Air Transportation System (NextGen).
The current system uses in the aviator industry is 40 years old that provides connectivity
which is limited. The NextGen is seeking for improving the efficiency of the network by
using global positioning system (GPS) which is actually based on software based as well as
connected to Internet (Elmaghraby & Losavio2014). While it is accepted widely that the
transmission is needed for modernizing the systems of air traffic control, the office of the
general accounting has voiced issue that implement a system having the connectivity brings
with the greater security of it.
Conclusion:
Thus, it can be concluded that the driverless cars and aircrafts both cn be evolved in
complexity and the hierarchized environments where so many of the stakeholders have been
involved. They are the by products of so many years of the technological prowess also have
facilitated the daily life of people greatly. Unfortunately, this advanced technology and this
network of stakeholders have failed in protecting the people from the cybersecurity related
attacks in the recent years. It is conducted by the investigation so far that may point out to a
failure related to technology and a crime that was not intended. However, the accidents that
was happened does illustrate the threat occurs in lives of the human in the case of a cyber
malicious attack on the connected cars planes. It can be assumed that all the actors in both
industries will continue the efforts of them for making roads as well as the air free from the
hackers.
Document Page
8NATIONAL DATA INFRASTUCTRE SECURITY
References:
Abueh, Y. J., & Liu, H. (2016, May). Message authentication in driverless cars. In 2016
IEEE Symposium on Technologies for homeland security (HST) (pp. 1-6). IEEE.
Coppola, R., & Morisio, M. (2016). Connected car: technologies, issues, future trends. ACM
Computing Surveys (CSUR), 49(3), 46.
De Gramatica, M., Massacci, F., Shim, W., Tedeschi, A., & Williams, J. (2015). IT
interdependence and the economic fairness of cybersecurity regulations for civil
aviation. IEEE Security & Privacy, 13(5), 52-61.
Eiza, M. H., & Ni, Q. (2017). Driving with sharks: Rethinking connected vehicles with
vehicle cybersecurity. IEEE Vehicular Technology Magazine, 12(2), 45-51.
Elmaghraby, A. S., & Losavio, M. M. (2014). Cyber security challenges in Smart Cities:
Safety, security and privacy. Journal of advanced research, 5(4), 491-497.
Gopalakrishnan, K., Govindarasu, M., Jacobson, D. W., & Phares, B. M. (2013). Cyber
security for airports. International Journal for Traffic and Transport
Engineering, 3(4), 365-376.
Johnson, D. P. (2013). Civil Aviation and CyberSecurity. Pobrane z: http://sites.
nationalacademies. org/cs/groups/depssite/documents/webpage/deps_084768. pdf.
Knowles, W., Prince, D., Hutchison, D., Disso, J. F. P., & Jones, K. (2015). A survey of
cyber security management in industrial control systems. International journal of
critical infrastructure protection, 9, 52-80.
Document Page
9NATIONAL DATA INFRASTUCTRE SECURITY
Wyglinski, A. M., Huang, X., Padir, T., Lai, L., Eisenbarth, T. R., & Venkatasubramanian, K.
(2013). Security of autonomous systems employing embedded computing and
sensors. IEEE micro, 33(1), 80-86.
Yağdereli, E., Gemci, C., & Aktaş, A. Z. (2015). A study on cyber-security of autonomous
and unmanned vehicles. The Journal of Defense Modeling and Simulation, 12(4),
369-381.
Zanero, S. (2017). Cyber-physical systems. Computer, 50(4), 14-16.
chevron_up_icon
1 out of 10
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]