Addressing security vulnerabilities in autonomous vehicles through resilient frameworks and robust cyber defense systems
DOI:
https://doi.org/10.51594/gjabr.v3i3.114Abstract
The rapid advancement of autonomous vehicle (AV) technology has introduced significant security vulnerabilities that pose risks to passenger safety, system integrity, and public trust. This paper investigates the critical security challenges facing AVs, including sensor spoofing, GPS jamming, adversarial machine learning attacks, and communication network breaches. Through an extensive review of recent cyber threats, the study highlights the increasing sophistication of cyber-attacks targeting AV ecosystems and the potential consequences of security breaches. To address these vulnerabilities, the paper explores the implementation of resilient frameworks and robust cyber defense systems. Specifically, it examines the role of artificial intelligence-driven anomaly detection, blockchain-based secure communication, encryption techniques, and intrusion detection and prevention systems in mitigating security risks. Additionally, it evaluates the effectiveness of cybersecurity-by-design approaches, emphasizing proactive security measures in AV development.Key findings indicate that a multi-layered security approach integrating real-time threat detection, automated response mechanisms, and continuous system monitoring is essential for enhancing AV resilience. Furthermore, collaboration between industry stakeholders, policymakers, and cybersecurity experts is crucial in developing standardized security protocols and regulatory frameworks. The study underscores the necessity of adopting an adaptive and resilient security architecture to safeguard AVs against evolving cyber threats. By implementing robust cyber defense mechanisms and fostering a security-conscious AV ecosystem, the risks associated with autonomous vehicle operations can be significantly reduced, ensuring safer and more reliable transportation systems.
Keywords: Autonomous Vehicles, Cybersecurity, Security Vulnerabilities, Resilient Frameworks, Cyber Defense Mechanisms, Machine Learning Security, AI-driven Automation, Vehicle-to-Vehicle Communication.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Olanrewaju Oluwaseun Ajayi, Abiodun Sunday Adebayo, Naomi Chukwurah

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
FE Gulf has chosen to apply for the Creative Common Attribution Noncommercial 4.0 Licence (CC BY) license on our published work. Authors who wish to publish their manuscript in our journal agree on the following terms:
1. Authors retain the copyright and grant us (FE Gulf and its subsidiary journals) the right for first publication with the work licensed under a Creative Commons Attribution (CC BY) License which permits others to share the work with an acknowledgment of the work’s authorship and initial publication in this journal. Under this license, author retains the ownership of the copyright of their content, but anyone is allowed to download, reuse, reprint, modify, distribute, and/or copy the contents as long as the original authors and source are cited. No permission is required from the publishers or authors.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal’s published version of the work (for example, publishing it as a book or submitting it to an institutional repository), with an acknowledgment of its initial publication in FE Gulf owned journals.
3. We encourage our authors/contributors to post their work online (such as posting it on their website or some institutional repositories) prior to and during the submission process since it produces scholarly exchange and greater and earlier citation of published work.