| Literature DB >> 31130903 |
Václav Linkov1, Petr Zámečník1, Darina Havlíčková1, Chih-Wei Pai2.
Abstract
The cybersecurity of autonomous vehicles (AVs) is an important emerging area of research in traffic safety. Because human failure is the most common reason for a successful cyberattack, human-factor researchers and psychologists might improve AV cybersecurity by researching how to decrease the probability of a successful attack. We review some areas of research connected to the human factor in cybersecurity and find many potential issues. Psychologists might research the characteristics of people prone to cybersecurity failure, the types of scenarios they fail in and the factors that influence this failure or over-trust of AV. Human behavior during a cyberattack might be researched, as well as how to educate people about cybersecurity. Multitasking has an effect on the ability to defend against a cyberattack and research is needed to set the appropriate policy. Human-resource researchers might investigate the skills required for personnel working in AV cybersecurity and how to detect potential defectors early. The psychological profile of cyber attackers should be investigated to be able to set policies to decrease their motivation. Finally, the decrease of driver's driving skills as a result of using AV and its connection to cybersecurity skills is also worth of research.Entities:
Keywords: autonomous vehicle; cyberattack; cybersecurity; hackers; human factor
Year: 2019 PMID: 31130903 PMCID: PMC6509749 DOI: 10.3389/fpsyg.2019.00995
Source DB: PubMed Journal: Front Psychol ISSN: 1664-1078
How might human factor researchers improve the cybersecurity of autonomous vehicles (AV).
| Security vulnerability | Research goal | Benefit |
|---|---|---|
| Characteristics of people who are vulnerable to AV cybersecurity failure is unknown | Identify groups of people who are likely to perform badly in an AV cybersecurity scenario | Vulnerable groups may be targeted by a promotional campaign |
| Factors that influence human AV cybersecurity performance are not completely known | Identify factors that enhance AV cybersecurity performance | Possible to set policy to increase these factors |
| Over-trust of AV | Identify groups of people likely to over-trust AV security | Vulnerable groups may be targeted by an educational campaign |
| AV cybersecurity is problematic and not correctly understood by laypeople | Identify effective ways to explain AV cybersecurity | Educational campaign will increase knowledge |
| Acceptable multitasking is unknown | Identify acceptable level of multitasking to be able to react to an AV cybersecurity breach | Possible to set policies regarding multitasking for AV |
| Time when AV cybersecurity defense capability decreases is unknown | Identify period needed to review information about AV cybersecurity | Possible to remind driver after this period |
| How people behave during specific AV cyberattacks | Understand weak points of people’s reactions to cyberattacks | Develop techniques to help laymen during an attack |
| People working in AV cybersecurity should be able to work in a demanding job | Understand requirements of AV cybersecurity jobs | Develop strategies to correctly select employees for AV cybersecurity |
| Employees in AV cybersecurity might become attackers or help attackers | Identify detectable behavior changes typical for renegades | Possible to remove risky employees |
| Characteristics of AV attackers are unknown | Identify who attacks AV and why | Set policies to decrease the motivation of attackers |
Priority of different human-factor-research related issues in AV cybersecurity in various levels of AV automation as defined by SAE International (2014).
| SAE level of automation | (0) No automation | (1) Driver assistance | (2) Partial automation | (3) Conditional automation | (4) High automation | (5) Full automation |
|---|---|---|---|---|---|---|
| Cybersecurity failure prone people’s characteristics | Small | Small | Middle | High | High | Middle |
| Ways to increase cybersecurity performance | Small | Small | Small | High | High | High |
| Overtrust to AV | Small | Middle | Middle | High | High | High |
| Laypeople education | Middle | Middle | Middle | Middle | Middle | Middle |
| Multitasking acceptability | Small | Middle | Middle | High | High | Small |
| Cybersecurity defense capability decrease | Small | Small | Middle | High | High | High |
| Behavior during cyberattacks | Small | Small | High | High | High | High |
| AV infrastructure companies job requirements | Small | Small | Small | High | High | High |
| Characteristics of AV cyberattackers | Small | Small | Middle | High | High | High |