Conceptualizing and Modeling Communication-Based Cyberattacks on Automated Vehicles Article Swipe
YOU?
·
· 2025
· Open Access
·
· DOI: https://doi.org/10.48550/arxiv.2510.02364
Adaptive Cruise Control (ACC) is rapidly proliferating across electric vehicles (EVs) and internal combustion engine (ICE) vehicles, enhancing traffic flow while simultaneously expanding the attack surface for communication-based cyberattacks. Because the two powertrains translate control inputs into motion differently, their cyber-resilience remains unquantified. Therefore, we formalize six novel message-level attack vectors and implement them in a ring-road simulation that systematically varies the ACC market penetration rates (MPRs) and the spatial pattern of compromised vehicles. A three-tier risk taxonomy converts disturbance metrics into actionable defense priorities for practitioners. Across all simulation scenarios, EV platoons exhibit lower velocity standard deviation, reduced spacing oscillations, and faster post-attack recovery compared to ICE counterparts, revealing an inherent stability advantage. These findings clarify how controller-to-powertrain coupling influences vulnerability and offer quantitative guidance for the detection and mitigation of attacks in mixed automated traffic.
Related Topics
- Type
- preprint
- Language
- en
- Landing Page
- http://arxiv.org/abs/2510.02364
- https://arxiv.org/pdf/2510.02364
- OA Status
- green
- OpenAlex ID
- https://openalex.org/W4416368047
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4416368047Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.48550/arxiv.2510.02364Digital Object Identifier
- Title
-
Conceptualizing and Modeling Communication-Based Cyberattacks on Automated VehiclesWork title
- Type
-
preprintOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2025Year of publication
- Publication date
-
2025-09-28Full publication date if available
- Authors
-
Tianyu Liu, Yuanyuan YangList of authors in order
- Landing page
-
https://arxiv.org/abs/2510.02364Publisher landing page
- PDF URL
-
https://arxiv.org/pdf/2510.02364Direct link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
greenOpen access status per OpenAlex
- OA URL
-
https://arxiv.org/pdf/2510.02364Direct OA link when available
- Cited by
-
0Total citation count in OpenAlex
Full payload
| id | https://openalex.org/W4416368047 |
|---|---|
| doi | https://doi.org/10.48550/arxiv.2510.02364 |
| ids.doi | https://doi.org/10.48550/arxiv.2510.02364 |
| ids.openalex | https://openalex.org/W4416368047 |
| fwci | |
| type | preprint |
| title | Conceptualizing and Modeling Communication-Based Cyberattacks on Automated Vehicles |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | |
| biblio.first_page | |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| language | en |
| locations[0].id | pmh:oai:arXiv.org:2510.02364 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4306400194 |
| locations[0].source.issn | |
| locations[0].source.type | repository |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | |
| locations[0].source.is_core | False |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | arXiv (Cornell University) |
| locations[0].source.host_organization | https://openalex.org/I205783295 |
| locations[0].source.host_organization_name | Cornell University |
| locations[0].source.host_organization_lineage | https://openalex.org/I205783295 |
| locations[0].license | |
| locations[0].pdf_url | https://arxiv.org/pdf/2510.02364 |
| locations[0].version | submittedVersion |
| locations[0].raw_type | text |
| locations[0].license_id | |
| locations[0].is_accepted | False |
| locations[0].is_published | False |
| locations[0].raw_source_name | |
| locations[0].landing_page_url | http://arxiv.org/abs/2510.02364 |
| locations[1].id | doi:10.48550/arxiv.2510.02364 |
| locations[1].is_oa | True |
| locations[1].source.id | https://openalex.org/S4306400194 |
| locations[1].source.issn | |
| locations[1].source.type | repository |
| locations[1].source.is_oa | True |
| locations[1].source.issn_l | |
| locations[1].source.is_core | False |
| locations[1].source.is_in_doaj | False |
| locations[1].source.display_name | arXiv (Cornell University) |
| locations[1].source.host_organization | https://openalex.org/I205783295 |
| locations[1].source.host_organization_name | Cornell University |
| locations[1].source.host_organization_lineage | https://openalex.org/I205783295 |
| locations[1].license | |
| locations[1].pdf_url | |
| locations[1].version | |
| locations[1].raw_type | article |
| locations[1].license_id | |
| locations[1].is_accepted | False |
| locations[1].is_published | |
| locations[1].raw_source_name | |
| locations[1].landing_page_url | https://doi.org/10.48550/arxiv.2510.02364 |
| indexed_in | arxiv, datacite |
| authorships[0].author.id | https://openalex.org/A5100379423 |
| authorships[0].author.orcid | https://orcid.org/0000-0001-8929-6634 |
| authorships[0].author.display_name | Tianyu Liu |
| authorships[0].author_position | last |
| authorships[0].raw_author_name | Liu, Tianyu |
| authorships[0].is_corresponding | False |
| authorships[1].author.id | https://openalex.org/A5100638446 |
| authorships[1].author.orcid | https://orcid.org/0000-0001-7296-9222 |
| authorships[1].author.display_name | Yuanyuan Yang |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Yang, Yicheng |
| authorships[1].is_corresponding | False |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://arxiv.org/pdf/2510.02364 |
| open_access.oa_status | green |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Conceptualizing and Modeling Communication-Based Cyberattacks on Automated Vehicles |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-28T12:18:52.224293 |
| primary_topic | |
| cited_by_count | 0 |
| locations_count | 2 |
| best_oa_location.id | pmh:oai:arXiv.org:2510.02364 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4306400194 |
| best_oa_location.source.issn | |
| best_oa_location.source.type | repository |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | arXiv (Cornell University) |
| best_oa_location.source.host_organization | https://openalex.org/I205783295 |
| best_oa_location.source.host_organization_name | Cornell University |
| best_oa_location.source.host_organization_lineage | https://openalex.org/I205783295 |
| best_oa_location.license | |
| best_oa_location.pdf_url | https://arxiv.org/pdf/2510.02364 |
| best_oa_location.version | submittedVersion |
| best_oa_location.raw_type | text |
| best_oa_location.license_id | |
| best_oa_location.is_accepted | False |
| best_oa_location.is_published | False |
| best_oa_location.raw_source_name | |
| best_oa_location.landing_page_url | http://arxiv.org/abs/2510.02364 |
| primary_location.id | pmh:oai:arXiv.org:2510.02364 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4306400194 |
| primary_location.source.issn | |
| primary_location.source.type | repository |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | |
| primary_location.source.is_core | False |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | arXiv (Cornell University) |
| primary_location.source.host_organization | https://openalex.org/I205783295 |
| primary_location.source.host_organization_name | Cornell University |
| primary_location.source.host_organization_lineage | https://openalex.org/I205783295 |
| primary_location.license | |
| primary_location.pdf_url | https://arxiv.org/pdf/2510.02364 |
| primary_location.version | submittedVersion |
| primary_location.raw_type | text |
| primary_location.license_id | |
| primary_location.is_accepted | False |
| primary_location.is_published | False |
| primary_location.raw_source_name | |
| primary_location.landing_page_url | http://arxiv.org/abs/2510.02364 |
| publication_date | 2025-09-28 |
| publication_year | 2025 |
| referenced_works_count | 0 |
| abstract_inverted_index.A | 74 |
| abstract_inverted_index.a | 55 |
| abstract_inverted_index.EV | 91 |
| abstract_inverted_index.an | 110 |
| abstract_inverted_index.in | 54, 133 |
| abstract_inverted_index.is | 4 |
| abstract_inverted_index.of | 71, 131 |
| abstract_inverted_index.to | 106 |
| abstract_inverted_index.we | 44 |
| abstract_inverted_index.ACC | 62 |
| abstract_inverted_index.ICE | 107 |
| abstract_inverted_index.all | 88 |
| abstract_inverted_index.and | 11, 51, 67, 101, 122, 129 |
| abstract_inverted_index.for | 26, 85, 126 |
| abstract_inverted_index.how | 117 |
| abstract_inverted_index.six | 46 |
| abstract_inverted_index.the | 23, 30, 61, 68, 127 |
| abstract_inverted_index.two | 31 |
| abstract_inverted_index.flow | 19 |
| abstract_inverted_index.into | 36, 81 |
| abstract_inverted_index.risk | 76 |
| abstract_inverted_index.that | 58 |
| abstract_inverted_index.them | 53 |
| abstract_inverted_index.(ACC) | 3 |
| abstract_inverted_index.(EVs) | 10 |
| abstract_inverted_index.(ICE) | 15 |
| abstract_inverted_index.These | 114 |
| abstract_inverted_index.lower | 94 |
| abstract_inverted_index.mixed | 134 |
| abstract_inverted_index.novel | 47 |
| abstract_inverted_index.offer | 123 |
| abstract_inverted_index.rates | 65 |
| abstract_inverted_index.their | 39 |
| abstract_inverted_index.while | 20 |
| abstract_inverted_index.(MPRs) | 66 |
| abstract_inverted_index.Across | 87 |
| abstract_inverted_index.Cruise | 1 |
| abstract_inverted_index.across | 7 |
| abstract_inverted_index.attack | 24, 49 |
| abstract_inverted_index.engine | 14 |
| abstract_inverted_index.faster | 102 |
| abstract_inverted_index.inputs | 35 |
| abstract_inverted_index.market | 63 |
| abstract_inverted_index.motion | 37 |
| abstract_inverted_index.varies | 60 |
| abstract_inverted_index.Because | 29 |
| abstract_inverted_index.Control | 2 |
| abstract_inverted_index.attacks | 132 |
| abstract_inverted_index.clarify | 116 |
| abstract_inverted_index.control | 34 |
| abstract_inverted_index.defense | 83 |
| abstract_inverted_index.exhibit | 93 |
| abstract_inverted_index.metrics | 80 |
| abstract_inverted_index.pattern | 70 |
| abstract_inverted_index.rapidly | 5 |
| abstract_inverted_index.reduced | 98 |
| abstract_inverted_index.remains | 41 |
| abstract_inverted_index.spacing | 99 |
| abstract_inverted_index.spatial | 69 |
| abstract_inverted_index.surface | 25 |
| abstract_inverted_index.traffic | 18 |
| abstract_inverted_index.vectors | 50 |
| abstract_inverted_index.Adaptive | 0 |
| abstract_inverted_index.compared | 105 |
| abstract_inverted_index.converts | 78 |
| abstract_inverted_index.coupling | 119 |
| abstract_inverted_index.electric | 8 |
| abstract_inverted_index.findings | 115 |
| abstract_inverted_index.guidance | 125 |
| abstract_inverted_index.inherent | 111 |
| abstract_inverted_index.internal | 12 |
| abstract_inverted_index.platoons | 92 |
| abstract_inverted_index.recovery | 104 |
| abstract_inverted_index.standard | 96 |
| abstract_inverted_index.taxonomy | 77 |
| abstract_inverted_index.traffic. | 136 |
| abstract_inverted_index.vehicles | 9 |
| abstract_inverted_index.velocity | 95 |
| abstract_inverted_index.automated | 135 |
| abstract_inverted_index.detection | 128 |
| abstract_inverted_index.enhancing | 17 |
| abstract_inverted_index.expanding | 22 |
| abstract_inverted_index.formalize | 45 |
| abstract_inverted_index.implement | 52 |
| abstract_inverted_index.revealing | 109 |
| abstract_inverted_index.ring-road | 56 |
| abstract_inverted_index.stability | 112 |
| abstract_inverted_index.translate | 33 |
| abstract_inverted_index.vehicles, | 16 |
| abstract_inverted_index.vehicles. | 73 |
| abstract_inverted_index.Therefore, | 43 |
| abstract_inverted_index.actionable | 82 |
| abstract_inverted_index.advantage. | 113 |
| abstract_inverted_index.combustion | 13 |
| abstract_inverted_index.deviation, | 97 |
| abstract_inverted_index.influences | 120 |
| abstract_inverted_index.mitigation | 130 |
| abstract_inverted_index.priorities | 84 |
| abstract_inverted_index.scenarios, | 90 |
| abstract_inverted_index.simulation | 57, 89 |
| abstract_inverted_index.three-tier | 75 |
| abstract_inverted_index.compromised | 72 |
| abstract_inverted_index.disturbance | 79 |
| abstract_inverted_index.penetration | 64 |
| abstract_inverted_index.post-attack | 103 |
| abstract_inverted_index.powertrains | 32 |
| abstract_inverted_index.differently, | 38 |
| abstract_inverted_index.quantitative | 124 |
| abstract_inverted_index.counterparts, | 108 |
| abstract_inverted_index.cyberattacks. | 28 |
| abstract_inverted_index.message-level | 48 |
| abstract_inverted_index.oscillations, | 100 |
| abstract_inverted_index.proliferating | 6 |
| abstract_inverted_index.unquantified. | 42 |
| abstract_inverted_index.vulnerability | 121 |
| abstract_inverted_index.practitioners. | 86 |
| abstract_inverted_index.simultaneously | 21 |
| abstract_inverted_index.systematically | 59 |
| abstract_inverted_index.cyber-resilience | 40 |
| abstract_inverted_index.communication-based | 27 |
| abstract_inverted_index.controller-to-powertrain | 118 |
| cited_by_percentile_year | |
| countries_distinct_count | 0 |
| institutions_distinct_count | 2 |
| citation_normalized_percentile |