Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
Review
. 2025 Apr 20;25(8):2605.
doi: 10.3390/s25082605.

Revisiting Wireless Cyberattacks on Vehicles

Affiliations
Review

Revisiting Wireless Cyberattacks on Vehicles

Roberto Gesteira-Miñarro et al. Sensors (Basel). .

Abstract

The automotive industry has been a prime target for cybercriminals for decades, with attacks becoming more sophisticated as vehicles integrate advanced digital technologies. In response, new standards and regulations have been introduced, requiring manufacturers to implement robust cybersecurity measures to obtain necessary certifications. Modern vehicles have an extensive attack surface due to the increasing number of interconnected electronic components and wireless communication features. While new technologies improve connectivity, automation, and comfort, they also introduce new vulnerabilities that can be exploited by attackers. This paper presents a comprehensive analysis of the attack surface of modern vehicles, focusing on the security risks associated with wireless communication technologies. Each technology is examined in detail, highlighting existing research, known vulnerabilities, and potential countermeasures. Furthermore, this study identifies key research gaps in the field, providing insights into critical areas that require further investigation. This work aims to guide future research efforts in order to enhance vehicle cybersecurity in the evolving landscape of smart, autonomous, and connected vehicles.

Keywords: cyberattacks; radio frequency; vehicles; wireless.

PubMed Disclaimer

Conflict of interest statement

The authors declare no conflicts of interest.

Figures

Figure 1
Figure 1
Operation of rolling codes.
Figure 2
Figure 2
A RollJam attack scenario on an RKE system.
Figure 3
Figure 3
RKE and PKES message flows.
Figure 4
Figure 4
Relay attack scenario on a PKES system.

References

    1. UNECE . UN Regulation No. 155—Cyber Security and Cyber Security Management System. UNECE; Geneva, Switzerland: 2021.
    1. UNECE . UN Regulation No. 156—Software Update and Software Update Management System. UNECE; Geneva, Switzerland: 2021.
    1. Girdhar M., Hong J., Moore J. Cybersecurity of Autonomous Vehicles: A Systematic Literature Review of Adversarial Attacks and Defense Models. IEEE Open J. Veh. Technol. 2023;4:417–437. doi: 10.1109/OJVT.2023.3265363. - DOI
    1. Car Hacking Village. [(accessed on 22 January 2025)]. Available online: https://www.carhackingvillage.com.
    1. Enabling Positive Security Solutions for the Automotive Market. [(accessed on 22 January 2025)]. Available online: https://asrg.io.

LinkOut - more resources