fusion, localization, planning and control, utilizing
deep learning and other AI based algorithms. The
software architecture typically based on Service
Oriented Architecture (SOA) (Rumez, 2020) to
provide layered, modular, scalable support for higher
level ADAS/AD functions and applications
development. This is also critical to develop large
scale software engineering project, especially to
support L3+ level automations.
The other significant characteristics of modern
autonomous vehicles is that huge amount of data is
constantly generated and collected from the vehicles,
usually in the level of terabytes per hour. These data
are generated from multiple sources, such as from
vehicle powertrains, from ADAS/AD sensors, from
deep learning algorithms, from applications as well as
from the cockpit where driver related data are
generated. These data are highly heterogeneous in
nature, they can be structured or un-structured, they
also have different processing and performance
requirements. For example, the data collected by
cameras, radar, lidar and other sensors are upload to
cloud platforms where they are used for continuous
deep learning model training and optimization;
vehicle runtime data collected are used by OEMs in
their vehicle network operational centers.
2 SECURITY RISKS ON
AUTONUMOS DRIVING
VEHICLE
The complexity of modern autonomous driving
vehicles has increased dramatically in both hardware
and software architectures, the amount of
heterogeneous data generated, complexity of ADAS
algorithms and applications, the data processing
pipeline, V2X networking and vehicle cloud
collaborations etc. The amount of software codes also
increased dramatically, this complexity in software
can introduce more vulnerabilities and security risks.
In recent years, hacking and malicious attacks
toward autonomous vehicles and vehicle networks
rose dramatically. In one report by Automotive
Management Online, attacks on connected cars rose
by a staggering 99% (lhpes, 2022). In another report
by China Software Testing Centre, 60% of the
vehicles have various security risks, from physical
interfaces to web browsers that could allow hackers
or malicious attacks to infiltrate and install malwares
or viruses to steal sensitive data. Today information
security on autonomous vehicles including network
security, data security has become the must-have
requirements for auto manufacturers and their
suppliers imposed by government and industry
regulations (Data Security Law, 2021) (Data Security
WP, 2020) (am-online, 2020). There are several
major industry standards and regulations focusing on
automotive functional and information security. For
example, ISO/SAE 21434, a drafted standard on
engineering requirements for cybersecurity risk
management. On the other hand, common automotive
operating system software or middleware like ROS2,
AUTOSAR have also added stronger security
implementations in their newer releases
(AUTOSAR,2020) (ROS2, 2019).
In summary, the complexity of hardware and
software of modern autonomous vehicles introduce
more security vulnerabilities, exposing more
attacking points and larger attacking surface.
Information and data security are critical for
autonomous vehicles and vehicle networks to be
widely adopted.
2.1 Data Security Risks
On average, a self-driving car can generate 100GB of
data per second, with L4-L5 of autonomous level and
with more cars are connected, that amount will go
even higher. These data are generated and collected
from within different vehicle domains including
vehicle platform control, ADAS/AD, and cockpit
domains. These data are valuable assets for
automakers, service providers, and consumers.
Here we focus on the data generated and collected
from ADAS/AD domain. For higher level of
automation support, multiple cameras, radars, lidar,
IMU, GNSS, HDMap and other sensors collect large
amount of raw data constantly. These raw data are
stored in the memory and feed into deep learning
algorithms for object detection, traffic sign detection,
lane detection and other AI based perception
algorithms. During perception, fusion, localization
and planning stages, intermediate results are
produced and used as inputs for computations of next
stage in the pipeline.
Hackers or attackers can infiltrate into these data
processing stages and conduct malicious activities.
This not only can potentially cause driving safety
issues, but it can also impose state security issues as
the external environmental data, geographic location
data, landmark data as well as vehicle runtime data
are constantly collected, processed, and uploaded to
the cloud platform in real time, the data collected and
uploaded could include sensitive information under
certain circumstances. To be able to control and