1. Introduction
Road accidents continue to be a major cause of fatalities and serious injuries globally, driven by increasing traffic density and distractions while driving. To combat this critical issue, it is vital to develop and implement technological solutions that significantly enhance vehicle safety. Among the most promising advancements in this domain is the autonomous emergency braking AEB system, which is designed to automatically prevent or mitigate collisions, thereby reducing the risk of accidents and saving lives.
To ensure reliability and security in AEB systems, thorough validation is required to ensure that every single component operates correctly under diverse conditions. These systems rely on the complex interaction of advanced sensors, data fusion algorithms, decision-making processes, and actuator controls. Given the stringent reliability standards and the growing architectural complexity of AEB systems, sophisticated testing methodologies—such as functional testing, HIL simulations, and scenario-based evaluations—are essential. These methodologies are crucial for identifying and addressing potential vulnerabilities before vehicles are brought to the market, thereby ensuring the reliability of AEB systems. Moreover, tire slip control is another critical topic in vehicle dynamic control, being the basis of systems, including the AEB system, as shown by Meléndez-Useros et al. [
1]. Another typical application in research regards platooning techniques, as demonstrated by Viadero-Monasterio et al. [
2], which underline the need for a more secure and standard-compliant solution, particularly in the context of AEB, which is crucial when taking into account the challenges coming from smart intersections, as discussed by Gao et al. [
3].
As AEB systems increasingly integrate with other automotive technologies, they face heightened exposure to cyber threats, making cybersecurity a paramount concern. It is imperative to implement robust cybersecurity measures to protect data integrity, ensure secure communications, and enable real-time threat detection. An integrated approach that combines comprehensive testing protocols with advanced cybersecurity measures is essential for ensuring the safety and resilience of AEB systems in contemporary vehicles.
To standardize quality and security assessments for manufactured vehicles, the International Organization for Standardization ISO and the Society of Automotive Engineers Society of Automotive Engineers SAE have proposed several standards. Notably, ISO/SAE 21434 [
4] provides a comprehensive framework for cybersecurity and quality checks aimed at original equipment manufacturers (OEMs) and suppliers. Additionally, ISO 24089 [
5] enhances this framework by emphasizing information-sharing and impact analysis, thereby strengthening the overall security posture. The importance of AEB systems is further highlighted by their alignment with these standards, which collectively facilitate a thorough evaluation of systems’ architecture and hardware security.
This paper analyzes the critical components of typical AEB systems in accordance with the ISO/SAE 21434 standard. To deepen the understanding of their functionality and security, an architecture is developed to identify threats, as outlined by ISO 21434, and the STRIDE methodology is applied to assess these vulnerabilities.
The primary contributions of the present paper are outlined as follows:
Analysis of AEB Architecture Components: this work provides an extensive examination of the essential components that constitute a typical AEB architecture.
Security Evaluation of AEB Architectures Utilizing ISO/SAE 21434: The ISO/SAE 21434 standard, a recognized cybersecurity framework specifically tailored for automotive systems, is implemented to perform a thorough security evaluation of AEB architectures. By applying this structured methodology, the rigor of the security assessment is enhanced, providing actionable insights for improving AEB system resilience.
In-Depth Analysis and Countermeasures for High-Risk AEB Threats: This investigation delves into the root causes and potential impacts of high-risk threats targeting AEB systems. Through detailed analysis, critical vulnerabilities are identified, and effective countermeasures are developed to address these threats. This proactive examination not only strengthens the security posture of AEB systems but also contributes to the broader discourse on safeguarding automotive safety technologies against emerging cyber threats.
To establish a clear and coherent manuscript, this document is structured into nine distinct sections:
Section 2 reviews related work pertinent to AEB and threat analysis within the automotive domain.
Section 3 outlines the research methodology employed, emphasizing the objectives of this study and the research questions addressed.
Section 4 details the main features encountered in the literature, focusing on threat modeling based on the selected architecture. It includes an in-depth description of each AEB system component, a data flow diagram, and a system design diagram illustrating the AEB architecture.
Section 5 presents an overview of the TARA methodology used for the security evaluation of the chosen architecture.
Section 6 presents the findings of the risk analysis, providing an overview of all risk levels along with associated threats. Following this, an in-depth examination of the critical and high-risk levels is conducted, focusing on potential attacks on the architecture and corresponding mitigation strategies. Additionally, this section includes a comprehensive cybersecurity analysis of potential attacks targeting each component within the system.
Section 7 discusses improvements to the architecture, proposing enhanced security measures for the involved components, and provides a comprehensive perspective on the context and considerations for implementing cybersecurity measures.
Section 8 concludes with a summary of the research findings.
2. Related Work
Recent studies have focused on enhancing the safety and reliability of ADAS in vehicles. Notably, research has been conducted on the AEB system, a crucial safety feature designed to prevent or mitigate collisions. However, many of these studies lack alignment with ISO standards, limiting their applicability within standardized frameworks. In Ye et al. [
6] and Kim et al. [
7], the authors explore various aspects of AEB systems, including collision threat assessment models, actuator control mechanisms, and testing methodologies.
One study presents an improved TTC model that incorporates relative acceleration, enhancing accuracy in predicting potential collisions, as discussed by Ye et al. [
6]. While this ETTC model addresses certain limitations in traditional TTC approaches—particularly in scenarios where the target vehicle is decelerating—it does not fully adhere to standardized testing and validation protocols as outlined by ISO standards.
Additionally, Tang et al. [
8] investigate the integration of V2V communication with pedestrian autonomous emergency braking (PAEB) systems to overcome the limitations of onboard sensors and enhance pedestrian safety. Although the V2V-PAEB system enables vehicles to share information about detected pedestrians for a more comprehensive view of the surrounding environment, the study lacks the standardized protocols needed for sensor fusion and interoperability according to ISO guidelines.
Finally, another study by Ye et al. [
6] proposes a real-time automatic test platform for AEB systems with a brake system in the loop. The study underscores the importance of rigorous testing for AEB systems, given the complexity of real-world traffic conditions. Nevertheless, the proposed platform does not fully incorporate the ISO-recommended HARA procedures, leaving room for further investigation into the alignment of such platforms with standardized safety requirements.
Despite novelties introduced by the discussed work, which provides valuable insights into the development, evaluation, and testing of safety-critical systems like AEB in vehicles, it is essential to note that these sources do not explicitly address cybersecurity aspects related to ADAS or the ISO 21434 standard. Therefore, further research and analysis are necessary to explore the cybersecurity implications of these systems and how they align with the requirements outlined in ISO 21434. The authors of this paper primarily chose these references to conduct a study on the AEB architecture, as shown by Kim et al. [
7] and the application of the TARA methodology for cybersecurity.
2.1. Background
2.1.1. AEB Systems
AEB is an advanced driver-assistance system (ADAS) designed to enhance vehicle safety by automatically applying brakes in order to prevent or mitigate collisions. AEB systems employ a variety of sensors, including radar, cameras, and LIDAR, to monitor the vehicle’s surroundings and detect potential collision threats. Upon the detection of a potential collision, the system calculates the requisite braking force and automatically engages the brakes in the event that the driver does not respond in a timely manner. The architecture of AEB systems comprises several critical components, including sensor input, data fusion, decision-making algorithms, and actuator control. It is essential that these components function in a seamless manner to guarantee the system’s effectiveness and reliability.
2.1.2. Security Standard
A comprehensive review of various studies on similar systems highlights a significant lack of discussions or evaluations of AEB security according to established standards. While the literature presents a wide array of approaches, the role of standardization is critical in system analysis. ISO 24089 is a recent standard in the automotive sector, providing guidelines for software update management systems to ensure that vehicle software is securely updated throughout its lifecycle. Despite its relevance in maintaining software integrity, ISO 24089 primarily focuses on the processes for software updates and does not fully address all cybersecurity aspects, as discussed by Agirre et al. [
9].
On the other hand, ISO/SAE 21434 is the foundation of the automotive sector’s solution, which offers a thorough framework for handling cybersecurity threats in every stage of a vehicle’s lifecycle, from conception to decommissioning. It incorporates automotive-specific procedures, such as TARA, to detect, evaluate, and reduce risks. It is consistent with the risk management concepts included in ISO 27001 [
10], as discussed by Lu et al. [
11], which are specifically aimed at automotive cybersecurity, offering a framework to evaluate and mitigate potential security risks. This allows for the development of safer, more secure mobility solutions, as shown by Ariyanto et al. [
12]. In the context of AEB systems, the integration of ISO/SAE 21434 standards is essential for comprehensive security assessment. While ISO 24089 ensures secure software update management, ISO/SAE 21434 addresses broader cybersecurity concerns, together providing a holistic view of both the safety and security of AEB systems. As outlined in
Table 1, these standards, although complementary, still leave some gaps in accounting for external environmental factors.
The primary references selected for this study, particularly [
7], as shown in
Table 1, were chosen to conduct a comprehensive examination of AEB architecture and the application of the TARA methodology for cybersecurity.
3. Research Methodology
This chapter presents the methodological framework utilized for the study of an AEB system. A precise strategy was developed to enhance performance and safety, ensuring a systematic and thorough analysis of potential threats and vulnerabilities. This structured approach facilitated an extensive investigation into the components and effectiveness of AEB systems, providing a robust foundation for selecting an optimal architecture.
The research methodology comprises several distinct phases aimed at systematically analyzing AEB systems in terms of architecture, security, and threat assessment. The workflow, illustrated in
Figure 1, delineates the steps followed in this study.
3.1. Selection of Automotive System
The initial step in this methodological approach involved selecting an automotive system for analysis, balancing technological innovation and industry relevance. Industry experts first compiled a comprehensive list of system features, including advanced driver-assistance systems (ADASs), infotainment systems, driver monitoring systems, predictive maintenance alerts, and autonomous emergency braking.
A field expert then refined this list by selecting the ten most significant features, evaluating them based on their importance and potential impact on the automotive industry. These features were subsequently evaluated through a survey involving 35 researchers, who voted on the technologies they deemed most promising.
After analyzing the survey results, the top three technologies emerged: predictive maintenance alerts, autonomous emergency braking AEB, and driver monitoring systems. Participants were divided into groups, each focused on one of the selected technologies, to proceed with a detailed analysis of threats and vulnerabilities. A group of twelve participants specifically focused on AEB.
This division of labor allowed each group to concentrate on one of the most relevant features, enabling an in-depth analysis aimed at developing effective risk mitigation strategies.
3.2. Research Questions
Formulating the research questions was a crucial step in guiding the analysis and focusing on the autonomous emergency braking AEB system. This process was designed to clearly and precisely define the research objectives and develop specific questions addressing the study goals.
The initial step involved establishing research objectives, focusing on the analysis of AEB systems within the existing literature. The primary objective was to identify the various architectures utilized in AEB systems and to determine the most comprehensive architecture, incorporating all relevant functionalities for safety and effectiveness.
Based on these objectives, research questions were formulated to investigate specific aspects related to the security of AEB systems and to evaluate potential threats. These questions were designed to thoroughly assess the robustness of AEB systems against various threats.
As our objective was to analyze the core components of typical autonomous emergency braking AEB systems and evaluate the security of their architectures, we formulated two key questions to address these goals.
RQ1: Which are the typical components and the connection between these in AEB systems that can be considered possible attack assets?
RQ2: What are the threats and the associated risks of a typical AEB system?
3.3. Exclusion and Inclusion Criteria
Multiple criteria for selecting the research papers were established to ensure a currently relevant literature review aligned with the objectives of this study. The inclusion criteria targeted papers that specifically addressed AEB systems and cybersecurity frameworks such as STRIDE, particularly in the context of automotive safety and ISO standards like ISO 26262 [
13] and ISO/SAE 21434.
Additionally, papers published in peer-reviewed journals or conferences with a clear focus on risk evaluation techniques were prioritized. The exclusion criteria filtered out papers that lacked a direct focus on AEB systems. Those that were not considered scientific approaches and not published in a certified journal or conference, non-English language publications, and papers primarily focused on unrelated automotive systems were also excluded to maintain the relevance of the research. As there are some search engines and web databases focused on scientific research, we used those to extract our papers. Included were Google Scholar, IEEE, SpringerLink, ACM, and Science.gov.
3.4. Study Selection and Data Extraction
AEB systems comprise multiple components that incorporate various technologies for detection, connection, and data processing. A rigorous study selection phase was essential to focus exclusively on the most pertinent and comprehensive works that met our criteria. This research was carried out using electronic databases such as Scopus and Google Scholar, considering documents from 2020 to 2024. Initially, 25 papers were chosen for full-text review. Out of these, only 11 papers were deemed appropriate for the data extraction process. During the data extraction phase, we concentrated on the proposed research questions (RQs) and identified a set of features from each document after a thorough review. These features, relevant to our study, were categorized as follows:
Detection layer—radar, LiDAR, camera, and ultrasonic sensors. Communication layer—vehicle-to-vehicle (V2V), vehicle-to-infrastructure (V2I), and vehicle-to-everything (V2X) GPS. Processing layer—onboard computer, machine learning algorithms, and electronic control units (ECUs).
These features were crucial for addressing the proposed RQs and for identifying the optimal AEB architecture.
3.5. Synthesis
Firstly,
Table 2 presents a comprehensive overview of the features critical to the context of autonomous emergency braking AEB systems within the realm of cybersecurity. To achieve the project objectives, the primary reference selected was [
7], which served as the foundation for developing the architectural prototype and extracting features essential for conducting the threat analysis and risk assessment (TARA) process.
Specifically, Ref. [
14] was highlighted for its focus on mitigating collision risks in hazardous driving situations. The paper details how the system utilizes a controller to engage an electro-hydraulic braking system upon detecting sudden braking by a preceding vehicle, with this information communicated via a Wi-Fi network.
Reference [
8] introduces a simulated system that integrates vehicle-to-vehicle (V2V) communication with pedestrian autonomous emergency braking (PAEB) to enhance pedestrian safety. The V2V-PAEB system enables vehicles to exchange information regarding detected pedestrians, thereby improving their ability to avoid collisions.
Additionally, Ref. [
15] describes the implementation of an AEB system that employs fuzzy logic to recognize and predict traffic light statuses, facilitating autonomous decision-making and the application of various control algorithms. Other studies primarily focus on system simulations and operational mechanisms.
Table 2.
Occurrence of various components and key attributes in existing research papers.
Table 2.
Occurrence of various components and key attributes in existing research papers.
Feature/Reference | [11] | [12] | [6] | [7] | [16] | [14] | [8] | [17] | [18] | [15] | [19] |
---|
Security | ✓ | ✓ | | | ✓ | ✓ | ✓ | | ✓ | ✓ | |
Car Application | ✓ | ✓ | | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
WiFi | | | | | | ✓ | | | | | |
GPS | | | | ✓ | | ✓ | ✓ | | | | |
Machine Learning | | | | | ✓ | | | | | ✓ | |
Camera | | | ✓ | ✓ | | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
V2X | | | | | | ✓ | ✓ | | | | ✓ |
Sensor Fusion | ✓ | ✓ | | ✓ | | | ✓ | ✓ | ✓ | | |
Radar | ✓ | ✓ | | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
WSS | | | | ✓ | | | | | | | |
ADAS | ✓ | | ✓ | ✓ | | ✓ | | ✓ | | ✓ | |
3.6. Threat and Risk Assessment
The threat and risk assessment (TARA) phase aimed to identify and analyze the vulnerabilities of the AEB system and evaluate the risks associated with each identified threat. Initially, the selected architecture components and their interconnections were input into the Medini tool, which automatically generated a list of relevant threats.
These threats were subsequently imported into an Excel file, where a detailed analysis was conducted to assess the risk level of each identified threat. This process adhered to a systematic approach, commencing with the identification of critical system assets and concluding with an evaluation of the feasibility and impact of each threat. Threats were categorized using STRIDE.
For each identified threat, potential attack paths and vectors were analyzed, accompanied by a motivational assessment to understand the rationale behind an attacker’s targeting of specific vulnerabilities. The impact was evaluated across multiple dimensions, including driver safety, financial repercussions, operational implications, and issues related to privacy and regulatory compliance.
Threat severity was assessed using a quantitative scale that integrated impacts on FOPS, where we ultimately focussed on the safety risks. Additionally, the feasibility of attacks was evaluated based on the complexity and resources required to execute an effective attack. These parameters facilitated the calculation of the overall risk level for each threat, enabling the ranking of threats by criticality.
Risk treatment decisions encompassed options such as mitigation, acceptance, avoidance, or transfer, based on the severity and feasibility of each identified threat. Mitigation measures were proposed for the high and severe safety threats to enhance security controls, with each decision documented alongside detailed justifications in the accompanying Excel file.
Throughout this process, Medini Analyze and MTM were employed to visualize system component interactions and potential attack paths. Adhering to the guidelines of ISO/SAE 21434 ensured that all risk assessment procedures aligned with established automotive security standards.
This approach provided a thorough understanding of AEB threats and vulnerabilities, forming the basis for implementing mitigation strategies aimed at reducing risk and enhancing system resilience. Specific mitigation strategies were developed for critical risk threats. These strategies focused on reducing the likelihood of successful attacks while minimizing the impact if they occurred.
5. Threat Analysis and Risk Assessment (TARA)
5.1. TARA-ISO 21434
TARA is a key process in ISO/SAE 21434, focusing on identifying, assessing, and prioritizing cybersecurity risks across a vehicle’s lifecycle. It evaluates threats and vulnerabilities, determines impact, and assesses the probability of exploitation, as shown by Kim et al. [
7]. In the context of ISO 21434, TARA is integral to several phases, including risk assessment, risk treatment, and continuous monitoring, aligning with the standard’s emphasis on a risk-based approach to cybersecurity, as discussed by Tang et al. [
8]. It is the phase for risk identification, which involves identifying assets, threats, and vulnerabilities and establishing the level of risk on a scale based on impact and likelihood. During the risk treatment stage, controls on security are proposed that can reduce such risks to acceptable levels. This study makes propositions for a mitigation strategy without addressing implementation issues for the solution to be globally considered under ISO/SAE 21434 but is in-depth in understanding risks and proposed solutions, thus making proper grounds for future steps toward automotive cybersecurity, as shown by Lu et al. [
11].
5.2. Asset Identification
A thorough analysis was performed of all components within the AEB system architecture to identify those that could lead to a damage scenario if compromised. Each component, port, and connection between ports was evaluated for relevant cybersecurity properties, including confidentiality, integrity, and availability. Additionally, elements such as ECUs and sensors were assigned properties of authenticity, non-repudiability, and authorization.
5.3. Threat Scenario Identification
Threat scenarios were identified using Medini Analyze 2024 R1 software, utilizing the STRIDE model as the foundational framework. This model mapped each cybersecurity property—authenticity, integrity, non-repudiability, confidentiality, availability, and authorization—to its corresponding potential threats: spoofing, tampering, repudiation, information disclosure, DoS, and EoP. For each threat scenario identified, three key elements were detailed: the specific asset at risk, the compromised cybersecurity property affecting that asset, and the root cause of the compromise. To determine the cybersecurity properties relevant to each asset, a manual process was conducted. Following this, the software aided in extracting the related threat scenarios linked to these properties.
5.4. Impact Rating
The evaluation of damage scenarios involved a thorough analysis of their effects on road users. The consequences were categorized into four distinct groups: safety (potential injuries or fatalities), financial (the economic impact on the road user), operational (the loss of or reduction in vehicle functionality), and privacy (the sensitivity of the disclosed user information). For each damage scenario and impact category, an impact rating was assigned. The rating scale included four levels of severity, listed in descending order: severe, major, moderate, and negligible.
5.5. Attack Vector Analysis
The attack vector analysis was conducted for each previously identified threat scenario. This analysis outlined the routes that potential adversaries might take to exploit vulnerabilities. For each threat scenario, one or more specific attack paths were identified, detailing the sequence of actions an attacker could use to navigate through the system’s assets. For example, an attack path might start with physical access to the vehicle’s sensor system, proceed to compromise the electronic control unit (ECU), and ultimately tamper with the braking system.
5.6. Attack Feasibility Rating
The attack feasibility rating could be evaluated using one of three approaches: attack potential-based, Common Vulnerability Scoring System (CVSS)-based, and attack vector-based approaches. Due to the limitations in knowledge about the system elements, technologies, and actors at the time of this research and the unavailability of an advanced system architecture design, the attack vector-based approach was utilized.
Criteria for Evaluation
The attack feasibility rating was determined by assessing the predominant attack vector in the attack path. The scale for ratings considered the following aspects:
Attacker’s Experience: This denotes the level of experience and skill that the attacker possesses. More experienced attackers might find certain vulnerabilities easier to exploit.
The Ease of Reproducing the Attack: This denotes the complexity involved in replicating the attack. Simpler, more straightforward attacks are rated as more feasible.
Approach Used: In this research, the attack vector-based approach was applied. This approach evaluates how accessible the attack vector is, considering whether it is network-based, local, adjacent, or physical.
The Context of the Attack: This rating scale includes the following.
- –
Network: high feasibility, as remote access via the network is easier and less resource-intensive.
- –
Adjacent: medium feasibility, involving access from a nearby network or system.
- –
Local: low feasibility, requiring physical proximity to the asset.
- –
Physical: very low feasibility, necessitating physical access to the asset, which is often more challenging and less desirable for attackers.
5.7. Risk Value Determination
Risk values were analyzed by applying a sequence of risk formulas that combined impact ratings and attack feasibility ratings. For each specific threat scenario, the average of all impact scores was then calculated and multiplied by the feasibility score which was a score according to the attack vector. The resulting scores were transformed into risk values using predefined mapping. The risk values were classified on a scale, ranked in descending order of severity: high, medium, low, and very low. The impact factor (I) was determined for each feature based on four criteria: safety (
S), financial (
F), operational (
O), and privacy (
P), with each having a different weight, with safety being the most influential.
Initially, the potential impact and attack feasibility ratings were converted into corresponding scores. The equation for calculating the risk for each threat scenario is as follows:
Based on ISO 21434, the most important factor is safety; next come financial, operational, and privacy indicators. Such indicators, consistent with the ISO standard, were estimated according to established practices in cybersecurity and safety. Safety was assessed with a surrogate measure that gave a score of possible harm to individuals using methods from the industry standard hazard analysis in order to derive the degree of risk. This approach guaranteed uniformity and consistency in the evaluation of the potential impact and risk for each of the scenarios. The assets were scored according to the table below (
Table 3), taking into account ISO 21434.
5.8. Risk Treatment Descision
The range of potential decisions for risk treatment included mitigation, avoidance, acceptance, and transfer. However, in practice, only mitigation and acceptance were implemented, with avoidance and transfer being excluded from consideration. Avoidance involved abandoning certain essential system features, which were deemed undesirable, while transfer required external entities to manage the risk, a scenario not anticipated. The approach involved mitigating threat scenarios classified as having high and medium risk while accepting those categorized as having low and very low risk. For each identified threat scenario designated for mitigation, a specific set of security measures and corresponding security requirements were developed to reduce or eliminate the associated risk.
6. Risk Analysis
This section presents the findings from the TARA analysis performed of the considered AEB architecture, following the guidelines of the ISO/SAE 21434 standard. As a result, we identified 99 threats distributed across multiple risk levels, as depicted in
Figure 4. The analysis was performed by leveraging the STRIDE threat model;
Figure 5 clearly outlines that the main components were also severely affected by each of the attacks that composed this threat model.
For each level, an initial analysis is provided in
Appendix A.2, detailing associated threats and including significant real-world examples to illustrate potential impacts and implications. Furthermore, the analysis focuses on threats classified within the critical and high-risk levels. In this context, the authors examine the associated security risks and propose effective mitigation measures to address these vulnerabilities. This discussion specifically addresses the threats of tampering, spoofing, and EoP.
Finally, in order to obtain insights about the relevance for the driver and vehicle’s occupants, we also investigated the safety level of these threats.
6.1. Critical-Risk-Level Threats and Mitigation Strategies
After introducing an overview of possible threats in the considered architecture, in this section, we go deeper in discussing a comprehensive examination of the 4.0% of threats classified as critical. Specifically, this analysis focuses on the security risks posed by these threats and the corresponding security measures that can be implemented to mitigate them.
6.1.1. Spoofing of Radar
Security Risk. Spoofing radar poses a critical security vulnerability to AEB systems; it allows attackers to manipulate radar networks by creating phantom objects or masking real ones. This defeats the correct judgment of radars about the environment and hence may lead to hazardous driving conditions, wrong decisions, and accidents. The consequences include damage to vehicles and infrastructure, the disruption of operational vehicles, and safety hazards. Although personal data are not directly impacted, the high potential impact and medium feasibility of such attacks make radar spoofing a critical threat to the integrity and reliability of AEB systems. Security Measures. Key security measures to mitigate radar spoofing risks include performing a risk assessment every month to identify emerging threats and the effectiveness of controls, using strong authentication to block unauthorized access, and checking signal integrity and encryption to verify and protect radar communications. These steps improve the reliability and accuracy of radar systems, ensuring vehicle safety and preventing accidents caused by spoofed data. Together, these strategies greatly reduce the risks of radar spoofing and protect the integrity of AEB systems.
6.1.2. Tampering with EMS/TCU
Security Risk. A lack of protection for the integrity of software in both the EMS/TCU creates significant security vulnerability related to the manipulation of those systems. The nature of this “adjacent” attack vector involves using the OBD port to attack without directly reaching internal systems; an attacker, therefore, may modify critical functions such as the control of the engine and transmission and may thus pose unsafe driving conditions. Although driver privacy remains largely unaffected, the operational, safety, and financial consequences are severe. The overall risk level is assessed as high since the impact is high while the feasibility is medium. Security Measures. Basic forms of security measures regarding EMS/TCU tampering must be implemented to reduce risks. Software updates are required to patch known vulnerabilities that can be used for unauthorized modifications. Monitoring allows the detection of unauthorized changes within the shortest possible time frame to perform corrective actions. In this regard, a quarterly risk review would assess the sufficiency of these measures, adapting them when necessary. Rigorous access control with particular emphasis on critical ports, such as the WSS port, and software integrity checks to allow only authorized modifications prevent tampering with the EMS and TCU. This is all about the security, functionality, and safe operation of the vehicle.
6.1.3. Tampering with WSS_to_ESC_CAN
Security Risks. The manipulation of WSS– and ESC–CAN communication threatens security by tampering with critical vehicle sensors used by safety systems. In general, an attacker physically accesses the vehicle through the OBD connector and can manipulate sensor data, thereby giving wrong information to the ESC system. The AEB system operates in an incorrect manner due to interference and causes accidents or driving in unsafe conditions. The operational impact is severe; vehicle safety is directly compromised, while the privacy concerns are minimal. Due to the potential consequences and medium feasibility of such an attack, the overall risk is classified as high. Ensuring the integrity of WSS and ESC communications is vital for maintaining vehicle safety. Security Measures. Tampering with WSS– and ESC–CAN communication must be minimized through robust security measures regarding the integrity and authenticity of data. The implementation of cryptographic message integrity protection, such as HMAC, ensures that data are not altered without authorization. The strict physical security, for example, of the OBD connector reduces the possibility of unauthorized access, while the auditing of the system and its constant monitoring enable the early detection of tampering. The threat vectors keep evolving with WSS and ESC software updated for the latest threats; quarterly risk reviews should be performed. Software integrity and strict access controls allow only authorized changes to be introduced to these systems.
6.1.4. Elevation of Privilege of EMS/TCU
Security Risk. Performing an elevation-of-privilege attack on the EMS and TCU presents a serious security risk; software vulnerabilities in critical vehicle controls could be exploited for unauthorized access. This is usually accompanied by the extraction of unencrypted data through the ESC system for insight into the operations of the vehicle. An attacker may change the functionality of EMS and TCU once elevated access is granted, which will lead to unsafe driving conditions, system failure, or the total loss of vehicle control, some scenarios that pose grave risks. The financial and operational impact is high in terms of possible repair costs and liabilities. Although privacy concerns are low, overall, the risk is high because of the severe consequences and medium feasibility of these kinds of attacks. Security Measures. Robust security measures should be implemented to mitigate the risk of elevation-of-privilege attacks against the EMS and TCU. Known vulnerabilities in software and hardware should be patched and updated regularly; privilege separation can prevent unauthorized access to critical vehicle controls. Conducting quarterly risk assessments is helpful in identifying and adapting changes in security measures. Regular software updates, MFA, and encrypted communication channels would provide further protection against unauthorized access. These measures are important for the integrity and security of the EMS and TCU, thus ensuring safe vehicle system operations.
6.2. High-Risk-Level Threats and Mitigation Strategies
This subsequent step involves a thorough examination of the threats classified as having high risk. Specifically, this analysis focuses on the security risks associated with these threats and the corresponding security measures that can be implemented to mitigate them effectively.
6.2.1. Elevation of Privilege of ESC
Security Risks. The ESC system is important for vehicle braking and stability; an elevation-of-privilege attack on it presents a huge security risk. Using software vulnerabilities, an attacker with physical proximity—usually through the OBD connector—could obtain unauthorized control over ESC functions. Such an attack could compromise vehicle safety by manipulating braking and stability systems, leading to hazardous driving conditions and increasing the likelihood of accidents. Although the privacy impact is low, the operational and safety consequences are severe, including financial costs from repairs and possible legal issues. This risk is considered high because of the high impact and medium feasibility. Security Measures. Access controls, including MFA and privileged access management, should be implemented to avoid unauthorized access to the ESC system, which would mitigate the security risks of elevation-of-privilege attacks. Regular risk assessments should be carried out to identify vulnerabilities. The presence of comprehensive logging and monitoring mechanisms would help detect unauthorized access attempts. These measures would safeguard the integrity of the ESC system, ensuring the reliability of vehicle stability and braking functions while preventing the unauthorized manipulation of safety controls.
6.2.2. Tampering with Radar_to_ESC_CAN_3
Security Risk. Due to this, the information exchanged between the radar and the ESC system using the CAN communication channel can develop a very serious security breach, as attackers with physical access to the OBD connector would be able to manipulate the radar data. An “adjacent” attack against the AEB system would eventually destroy the proper operation or result in its failure and increase the chance of accidents due to false data. Although privacy is not directly affected, the operational and safety impacts are severe, potentially making the vehicle unsafe to drive. In general, the risk is considerable given the medium feasibility of the attack and its potentially severe consequences. Security Measures. For risk mitigation in regard to tampering with the radar-to-ESC CAN, cryptographic message integrity checks are required, like HMAC, to ensure the authenticity and integrity of radar data. The regular auditing and monitoring of the communication system would help in response and detection against any type of anomalies or unauthorized activities. These measures would also be important in ensuring the integrity of radar data, the reliable performance of the AEB system, and improving general safety through the prevention of accidents occurring as a result of tampered data.
6.2.3. Tampering with Sensorfusion_to_Cluster_CAN
Security Risk. Tampering with sensor fusion-to-cluster CAN communication is a security risk, since attackers with physical access to the vehicle could manipulate data, usually through the OBD. While the main intent of these data is to provide information for the display of the AEB system, malicious manipulation may mislead the driver into unsafe driving conditions. The financial and privacy impacts are negligible, but the operational impact is high, as it disrupts the function of the vehicle. Medium feasibility and moderate safety concerns set the overall risk as medium. Security Measures. To mitigate the risk of manipulation in sensor fusion-to-cluster CAN communication, secure communication protocols like TLS should be implemented to ensure data’s integrity and confidentiality. The regular monitoring and auditing of communication channels can help detect anomalies or unauthorized access, maintaining the accuracy and reliability of the cluster display and ensuring the safe operation of the vehicle.
6.3. Safety Impact Taxonomy
This chapter provides an in-depth cybersecurity risk analysis of the autonomous emergency braking AEB system using the STRIDE methodology. The analysis evaluates and categorizes each AEB component within severe and major safety impact levels, facilitating a structured approach to identifying and mitigating threats that, while not always classified as high-risk, pose critical implications for vehicle safety. This evaluation underscores the necessity of robust security measures to ensure the AEB system’s reliability and the overall safety of vehicle operations.
As outlined in
Table 4, the most significant safety threats arise from spoofing, tampering, and denial-of-service attacks on critical components. The ESC system is the most vulnerable component, as attacks targeting it can cause the entire system to malfunction, posing a substantial risk to the safety of vehicle occupants. The ESC plays a central role in system operations, making it a critical single point of failure. Similarly, the SAS, which detects the steering wheel’s position, is another highly sensitive component. In the event of spoofing, the SAS may deliver incorrect data to the ESC, while a denial-of-service attack could prevent it from transmitting data altogether. Both scenarios critically compromise vehicle safety, further underscoring the components’ importance.
7. Suggested Improvements
The thorough analysis of the AEB system underscored the necessity of implementing strategic improvements to address critical and high-level cybersecurity threats, which, if left unaddressed, could pose serious risks to human safety. Enhancing system resilience against these threats is not only vital for safeguarding vehicle functionality but also for ensuring the protection of end users.
In this section, we outline the main improvements that should be taken into account when developing an AEB system. These recommendations are grouped into three categories: physical security, software advancements, and compliance with standards.
7.1. Physical Security
The physical security of components within the ACU is critical to prevent unauthorized tampering and maintain system integrity. Measures such as restricting access to the ACU and OBD connectors and using tamper-evident seals help mitigate physical attack risks. Additionally, a comprehensive physical security approach includes integrating a gateway to manage and secure communications within the AEB system. The gateway centralizes the management of CAN frames, enforces security policies, and monitors for communication anomalies, ensuring secure interactions between components.
Furthermore, the incorporation of an HSM significantly enhances the security of AEB systems. HSMs provide a secure environment for storing and processing cryptographic keys, thereby protecting the communication between AEB components, as discussed by Pethö et al. [
21]. They can be utilized for several critical security functions:
Robust Authentication: HSMs can manage and protect keys used to authenticate messages between AEB components, ensuring that only trusted sources can send commands. This authentication mechanism is crucial for maintaining the integrity and reliability of the AEB system.
Data Encryption: HSMs can encrypt sensitive data transmitted between components, making them unreadable to potential attackers intercepting communications. This encryption ensures that even if data are intercepted, they cannot be used maliciously.
By implementing these physical security measures, we can significantly enhance the resilience of the AEB system against physical attacks. Restricting access, using tamper-evident seals, integrating a secure gateway, and utilizing HSMs collectively form a robust physical security framework that safeguards critical components and ensures the overall integrity of the AEB system.
7.2. Software Advancements
One of the key enhancements in software approaches is the usage of an Intrusion Detection System (IDS), as shown by Piątek et al. [
20]. It can monitor network traffic in real time for suspicious activities, such as unauthorized access attempts or data manipulation.
Anomaly Detection: the IDS can be trained to recognize normal traffic patterns for the AEB system and alert it to deviations that might indicate an attack.
Rapid Response: in the event of malicious activity detection, the IDS can trigger rapid response measures, such as isolating compromised components or halting suspicious communications.
Other approaches aimed at enhancing the overall security of AEB system components, such as the Electronic Stability Control ESC and Engine Management System EMS are related to regular software updates to patch known vulnerabilities.
Secure Update Mechanisms: this involves implementing secure update mechanisms to ensure that software updates come from trusted sources and are not tampered with.
Thorough Testing: this involves rigorously testing software updates before deployment to avoid compatibility issues or new vulnerabilities.
Controlled Communication: The gateway can facilitate controlled communication by managing the CAN frames sent between AEB components, ensuring that only authorized and properly formatted messages are transmitted. This prevents unauthorized devices from injecting malicious frames into the network.
Traffic Monitoring: By monitoring the CAN traffic passing through the gateway, potential threats can be detected early. The gateway can analyze frame patterns and identify anomalies, such as unexpected frame types or transmission rates, enabling prompt action to mitigate risks.
Protocol Translation: The gateway can support different communication protocols, including the CAN, to ensure seamless interoperability between various components. It can convert CAN frames to other protocols used in the architecture, allowing diverse components to communicate effectively while maintaining the integrity of the data.
Error Handling and Frame Validation: The gateway can implement error handling mechanisms to ensure the reliability of communication. It can validate incoming CAN frames against predefined criteria, rejecting frames that do not meet security or functional requirements.
Logging and Auditing: The gateway can log all CAN traffic for auditing purposes, providing a record of communication events. These data can be used to analyze potential security incidents or to verify compliance with established protocols.
7.3. Compliance with ISO/SAE 21434 and ISO 24089 Standards
Achieving and maintaining adherence to ISO/SAE 21434 and ISO 24089 is essential for automotive cybersecurity, as these standards provide a framework to manage cyber risks across a vehicle’s lifecycle. This requires integrating security measures into every phase of vehicle system design, development, and maintenance to ensure the safety and resilience of automotive systems [
5].
Lifecycle-Based Cybersecurity Management
To comply with ISO/SAE 21434, manufacturers must implement a structured, lifecycle-oriented approach to cybersecurity management. This entails integrating cybersecurity objectives and threat modeling from the concept phase and refining them throughout the design, development, production, operation, and decommissioning phases. Each phase should include specific cybersecurity assessments and documented security objectives tailored to its unique risks. This approach not only facilitates traceability and accountability but also enhances the overall resilience of vehicles against evolving cybersecurity threats.
Risk Assessment and Mitigation Planning
An ongoing and thorough risk assessment is crucial for identifying cybersecurity vulnerabilities and ensuring compliance with ISO/SAE 21434 [
4]. Manufacturers should conduct regular evaluations for each vehicle component, such as AEB systems and infotainment units, to assess their security impact. A continuously updated, component-specific threat model should incorporate new risks, field data, and changes in the threat landscape. Effective mitigation planning involves implementing prioritized preventive and corrective actions, ensuring that the cybersecurity framework adapts to technological advancements and enhances vehicle resilience.
Secure Software Update Mechanisms
ISO 24089 emphasizes the importance of securing software updates for automotive cybersecurity. Manufacturers must implement reliable update mechanisms for both OTA and in-dealership updates, utilizing encryption, cryptographic authentication, and verification protocols to prevent unauthorized access or tampering. Compliance with ISO 24089 requires that only authorized and authenticated updates are deployed, effectively blocking unauthorized code or malicious modifications. This process should be rigorously tested and integrated into the overall cybersecurity strategy to enhance the vehicle’s security framework [
5].
Component-Level Cybersecurity Practices
Manufacturers must perform regular vulnerability testing and validation for each component to ensure compliance with security standards. This includes both automated and manual methods, such as penetration testing, static and dynamic analysis, and component-specific threat modeling. The early identification of vulnerabilities allows for risk mitigation before integration into the larger system. Additionally, ensuring that each component meets security requirements reinforces the overall cybersecurity posture of the AEB system, contributing to the vehicle’s integrity.
Compliance Audits and Continuous Monitoring
Compliance audits should systematically assess adherence to ISO/SAE 21434 and ISO 24089 standards, focusing on system integrity, update mechanisms, and incident response protocols. Conducting these audits regularly—such as quarterly or bi-annually—enables manufacturers to track compliance status and identify improvement areas. Continuous monitoring involves deploying real-time surveillance mechanisms to detect potential threats and vulnerabilities. This proactive strategy allows for the early identification of anomalies, facilitating prompt responses to security issues. Manufacturers should leverage automated monitoring tools and threat intelligence feeds to ensure that their systems are aligned with the evolving threat landscape.
Collaborative Development of Security Protocols
Automotive manufacturers should facilitate collaboration between software developers, hardware engineers, and cybersecurity experts in the implementation of ISO standards during the whole lifecycle of the vehicle. The early involvement of cybersecurity professionals ensures the integration of security measures and the identification of vulnerabilities. Standardized protocols for data handling, access control, and encryption, such as RBAC, are important. Regular feedback loops and updates of protocols improve security and address emerging threats, enhancing risk mitigation.
Training and Skill Development in Cybersecurity Standards
Manufacturers have to invest in target training in software, hardware, and cybersecurity teams regarding ISO/SAE 21434 and ISO 24089 [
4,
5] Training on threat modeling, secure software development, incident response planning, and regular workshops with current security practices or certifications are important. This is where collaboration on certifications with cybersecurity organizations validate the employees. This also creates a culture of compliance wherein proactive steps to improve the security posture of an organization are taken.
Metrics and Benchmarking for Security Performance
Establishing KPIs is essential for assessing the effectiveness of cybersecurity practices in accordance with ISO standards. Manufacturers should define metrics that track security incidents, vulnerability remediation times, and employee training participation. Regular assessments enable benchmarking against industry standards, helping to identify gaps and areas for improvement. By utilizing these metrics, manufacturers can refine their cybersecurity strategies, enhancing compliance with ISO standards and fostering a resilient cybersecurity framework that adapts to the evolving automotive landscape.
By applying these structured approaches to cybersecurity management, software update mechanisms, and ongoing compliance evaluation, the automotive sector can achieve consistent and thorough adherence to ISO/SAE 21434 and ISO 24089, thus building a robust foundation for secure AEB and other safety-critical automotive systems.
8. Conclusions
This security analysis of the AEB system reveals critical insights into the cybersecurity challenges and considerations associated with this advanced safety technology. As AEB systems become increasingly integral to modern vehicles, understanding their security threats and implementing effective security measures against those threats is essential to ensuring the security and safety of road vehicle users.
To answer the first research question, the analysis identifies the core components of a typical AEB system. The components that are included in the architecture are the AEB cluster, radar, camera, sensor fusion, EMS/TCU, SAS, ACU, WSS, ESC, vehicle lamp, and brake system. These components are interconnected through various communication channels, including in-vehicle networks such as the CAN and hardwired connection, which facilitate the transfer of information required for real-time decision-making. Precisely, in our scenario, we have a hardwired connection between the EMS and WSS and the same for the vehicle lamp. Enhanced encryption for data transmission, secure coding practices, and robust access controls is required to address several security threats and risks effectively. However, even with these measures, some low-level residual risks remain, mainly due to a lack of resources, indicating the need for the ongoing surveillance and iterative improvement of security strategies.
Moreover, as discussed in
Section 7, implementing the suggested improvements will enable the development of a real architecture that further enhances the security posture of AEB systems; by incorporating these enhancements, future designs can mitigate residual risks more effectively and ensure a higher level of safety and reliability for all road vehicle users.