{"id":4869,"date":"2025-12-23T12:57:38","date_gmt":"2025-12-23T12:57:38","guid":{"rendered":"https:\/\/tttp-au.com\/?p=4869"},"modified":"2025-12-23T14:48:56","modified_gmt":"2025-12-23T14:48:56","slug":"cyber-attacks-on-autonomous-vehicles-in-the-vanet-computer-network-attacks-and-protection","status":"publish","type":"post","link":"https:\/\/tttp-au.com\/index.php\/2025\/12\/23\/cyber-attacks-on-autonomous-vehicles-in-the-vanet-computer-network-attacks-and-protection\/","title":{"rendered":"Cyber attacks on autonomous vehicles in the VANET computer network (attacks and protection)"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"4869\" class=\"elementor elementor-4869\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e232701 elementor-section-height-min-height elementor-section-full_width elementor-hidden-tablet elementor-hidden-mobile elementor-section-height-default elementor-section-items-middle wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"e232701\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-cb97594\" data-id=\"cb97594\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a18c791 elementor-widget__width-inherit ha-has-bg-overlay elementor-widget elementor-widget-heading\" data-id=\"a18c791\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Vol. 10 No. 2 (2025): TTTP - APEIRON<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b2fff26 elementor-widget elementor-widget-heading\" data-id=\"b2fff26\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><b>Boris Kova\u010di\u0107, Zoran \u017d. Avramovi\u0107, Ivana Buzdovan\n <\/b><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-52044bb elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"52044bb\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1c82606 elementor-widget elementor-widget-heading\" data-id=\"1c82606\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cyber attacks on autonomous vehicles in the VANET computer network (attacks and protection)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c297c9e elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"c297c9e\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-21d12a9 e-grid e-con-full wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent\" data-id=\"21d12a9\" data-element_type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0209b05 elementor-widget elementor-widget-heading\" data-id=\"0209b05\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Original scientific paper<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fd3ecf0 elementor-widget elementor-widget-heading\" data-id=\"fd3ecf0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">DOI: 10.7251\/JTTTP2502121K<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2f3b63f elementor-align-center elementor-widget elementor-widget-button\" data-id=\"2f3b63f\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/tttp-au.com\/wp-content\/uploads\/2025\/12\/Pages-from-TTTP-Vol-10_No-2_2025-WEB-8.pdf\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download Article PDF<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cb7c4cb elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"cb7c4cb\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Abstract<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-61aebe3 elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"61aebe3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Autonomous vehicles represent a revolution in mobility, but they raise the issue of security challenges. With their appearance and the introduction of the 5G network, traffic systems are becoming increasingly dependent on digital communication and real-time data processing. Connectivity through 5G networks and ad-hoc communication protocols makes them vulnerable to various forms of cyber attacks, which can threaten lives, property and public safety. The paper analyzes the threats to which autonomous vehicles are exposed within the VANET network (a specialized class of ad-hoc networks in which vehicles function as nodes in the communication network) in a 5G environment. The consequences of an attack can be: complete disabling of the operation of one or more vehicles in the system, traffic accidents due to false data or errors in algorithms, compromising the privacy of passengers and vehicle owners, disruption of traffic infrastructure, as well as loss of public trust. Special emphasis in the paper is placed on the consequences for traffic safety and potential protection measures.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5c5f19e elementor-widget elementor-widget-heading\" data-id=\"5c5f19e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Keywords: autonomous vehicles, cyber attack, VANET computer network, 5G network, IEEE standards, communications: V2V, V2I i V2X.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6dd494a wpr-logo-position-center elementor-widget elementor-widget-wpr-logo\" data-id=\"6dd494a\" data-element_type=\"widget\" data-widget_type=\"wpr-logo.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\n\t\t\t<div class=\"wpr-logo elementor-clearfix\">\n\n\t\t\t\t\t\t\t\t<picture class=\"wpr-logo-image\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/tttp-au.com\/wp-content\/uploads\/2024\/03\/cc-by-1.png\" alt=\"\">\n\n\t\t\t\t\t\t\t\t\t\t\t<a class=\"wpr-logo-url\" rel=\"home\" aria-label=\"\" href=\"https:\/\/tttp-au.com\/\"><\/a>\n\t\t\t\t\t\t\t\t\t<\/picture>\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<a class=\"wpr-logo-url\" rel=\"home\" aria-label=\"\" href=\"https:\/\/tttp-au.com\/\"><\/a>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cb049d1 elementor-widget elementor-widget-shortcode\" data-id=\"cb049d1\" data-element_type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\"><div class=\"post-views content-post post-4869 entry-meta load-static\">\r\n\t\t\t\t<span class=\"post-views-icon dashicons dashicons-chart-bar\"><\/span> <span class=\"post-views-label\">Post Views:<\/span> <span class=\"post-views-count\">123<\/span>\r\n\t\t\t<\/div><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-511d0df elementor-section-height-min-height elementor-section-full_width elementor-hidden-mobile elementor-hidden-desktop elementor-hidden-laptop elementor-section-height-default elementor-section-items-middle wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"511d0df\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0acee9c\" data-id=\"0acee9c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c0e98b3 elementor-widget__width-inherit ha-has-bg-overlay elementor-widget elementor-widget-heading\" data-id=\"c0e98b3\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Vol. 10 No. 2 (2025): TTTP - APEIRON<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7178850 elementor-widget elementor-widget-heading\" data-id=\"7178850\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><b>Boris Kova\u010di\u0107, Zoran \u017d. Avramovi\u0107, Ivana Buzdovan\n <\/b><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-68f1849 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"68f1849\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-186a6b2 elementor-widget elementor-widget-heading\" data-id=\"186a6b2\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cyber attacks on autonomous vehicles in the VANET computer network (attacks and protection)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7b2f501 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"7b2f501\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5027126 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"5027126\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Original scientific paper<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a5312c elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"4a5312c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">DOI: 10.7251\/JTTTP2502121K<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8d7a912 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"8d7a912\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/tttp-au.com\/wp-content\/uploads\/2025\/12\/Pages-from-TTTP-Vol-10_No-2_2025-WEB-8.pdf\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download Article PDF<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-580ffd3 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"580ffd3\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Abstract<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-211717e elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"211717e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Autonomous vehicles represent a revolution in mobility, but they raise the issue of security challenges. With their appearance and the introduction of the 5G network, traffic systems are becoming increasingly dependent on digital communication and real-time data processing. Connectivity through 5G networks and ad-hoc communication protocols makes them vulnerable to various forms of cyber attacks, which can threaten lives, property and public safety. The paper analyzes the threats to which autonomous vehicles are exposed within the VANET network (a specialized class of ad-hoc networks in which vehicles function as nodes in the communication network) in a 5G environment. The consequences of an attack can be: complete disabling of the operation of one or more vehicles in the system, traffic accidents due to false data or errors in algorithms, compromising the privacy of passengers and vehicle owners, disruption of traffic infrastructure, as well as loss of public trust. Special emphasis in the paper is placed on the consequences for traffic safety and potential protection measures.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-62b72c3 elementor-widget elementor-widget-heading\" data-id=\"62b72c3\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Keywords: autonomous vehicles, cyber attack, VANET computer network, 5G network, IEEE standards, communications: V2V, V2I i V2X.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f4dcd16 wpr-logo-position-center elementor-widget elementor-widget-wpr-logo\" data-id=\"f4dcd16\" data-element_type=\"widget\" data-widget_type=\"wpr-logo.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\n\t\t\t<div class=\"wpr-logo elementor-clearfix\">\n\n\t\t\t\t\t\t\t\t<picture class=\"wpr-logo-image\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/tttp-au.com\/wp-content\/uploads\/2024\/03\/cc-by-1.png\" alt=\"\">\n\n\t\t\t\t\t\t\t\t\t\t\t<a class=\"wpr-logo-url\" rel=\"home\" aria-label=\"\" href=\"https:\/\/tttp-au.com\/\"><\/a>\n\t\t\t\t\t\t\t\t\t<\/picture>\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<a class=\"wpr-logo-url\" rel=\"home\" aria-label=\"\" href=\"https:\/\/tttp-au.com\/\"><\/a>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0f73093 elementor-widget elementor-widget-shortcode\" data-id=\"0f73093\" data-element_type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\"><div class=\"post-views content-post post-4869 entry-meta load-static\">\r\n\t\t\t\t<span class=\"post-views-icon dashicons dashicons-chart-bar\"><\/span> <span class=\"post-views-label\">Post Views:<\/span> <span class=\"post-views-count\">123<\/span>\r\n\t\t\t<\/div><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2d980b8 elementor-section-height-min-height elementor-section-full_width elementor-hidden-tablet elementor-hidden-desktop elementor-hidden-laptop elementor-section-height-default elementor-section-items-middle wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"2d980b8\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d772afa\" data-id=\"d772afa\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5597455 elementor-widget__width-inherit elementor-widget-mobile__width-inherit ha-has-bg-overlay elementor-widget elementor-widget-heading\" data-id=\"5597455\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Vol. 10 No. 2 (2025): TTTP - APEIRON<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f3e70ee elementor-widget elementor-widget-heading\" data-id=\"f3e70ee\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><b>Boris Kova\u010di\u0107, Zoran \u017d. Avramovi\u0107, Ivana Buzdovan\n <\/b><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b0a72e2 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"b0a72e2\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-87a3678 elementor-widget elementor-widget-heading\" data-id=\"87a3678\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cyber attacks on autonomous vehicles in the VANET computer network (attacks and protection)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-96936f4 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"96936f4\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f04febc elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget elementor-widget-heading\" data-id=\"f04febc\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Original scientific paper<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-389228b elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget elementor-widget-heading\" data-id=\"389228b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">DOI: 10.7251\/JTTTP2502121K<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-73b8917 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"73b8917\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/tttp-au.com\/wp-content\/uploads\/2025\/12\/Pages-from-TTTP-Vol-10_No-2_2025-WEB-8.pdf\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download Article PDF<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-80faf79 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"80faf79\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Abstract<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8cefffd elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"8cefffd\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Autonomous vehicles represent a revolution in mobility, but they raise the issue of security challenges. With their appearance and the introduction of the 5G network, traffic systems are becoming increasingly dependent on digital communication and real-time data processing. Connectivity through 5G networks and ad-hoc communication protocols makes them vulnerable to various forms of cyber attacks, which can threaten lives, property and public safety. The paper analyzes the threats to which autonomous vehicles are exposed within the VANET network (a specialized class of ad-hoc networks in which vehicles function as nodes in the communication network) in a 5G environment. The consequences of an attack can be: complete disabling of the operation of one or more vehicles in the system, traffic accidents due to false data or errors in algorithms, compromising the privacy of passengers and vehicle owners, disruption of traffic infrastructure, as well as loss of public trust. Special emphasis in the paper is placed on the consequences for traffic safety and potential protection measures.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0c5e44b elementor-widget elementor-widget-heading\" data-id=\"0c5e44b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Keywords: autonomous vehicles, cyber attack, VANET computer network, 5G network, IEEE standards, communications: V2V, V2I i V2X.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dee52ab wpr-logo-position-center elementor-widget elementor-widget-wpr-logo\" data-id=\"dee52ab\" data-element_type=\"widget\" data-widget_type=\"wpr-logo.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\n\t\t\t<div class=\"wpr-logo elementor-clearfix\">\n\n\t\t\t\t\t\t\t\t<picture class=\"wpr-logo-image\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/tttp-au.com\/wp-content\/uploads\/2024\/03\/cc-by-1.png\" alt=\"\">\n\n\t\t\t\t\t\t\t\t\t\t\t<a class=\"wpr-logo-url\" rel=\"home\" aria-label=\"\" href=\"https:\/\/tttp-au.com\/\"><\/a>\n\t\t\t\t\t\t\t\t\t<\/picture>\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<a class=\"wpr-logo-url\" rel=\"home\" aria-label=\"\" href=\"https:\/\/tttp-au.com\/\"><\/a>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5cb9871 elementor-widget elementor-widget-shortcode\" data-id=\"5cb9871\" data-element_type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\"><div class=\"post-views content-post post-4869 entry-meta load-static\">\r\n\t\t\t\t<span class=\"post-views-icon dashicons dashicons-chart-bar\"><\/span> <span class=\"post-views-label\">Post Views:<\/span> <span class=\"post-views-count\">123<\/span>\r\n\t\t\t<\/div><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Vol. 10 No. 2 (2025): TTTP &#8211; APEIRON Boris Kova\u010di\u0107, Zoran \u017d. Avramovi\u0107, Ivana Buzdovan Cyber attacks on autonomous vehicles in the VANET computer network (attacks and protection) Original scientific paper DOI: 10.7251\/JTTTP2502121K Download Article PDF Abstract Autonomous vehicles represent a revolution in mobility, but they raise the issue of security challenges. With their appearance and the introduction of the 5G network, traffic systems are becoming increasingly dependent on digital communication and real-time data processing. Connectivity through 5G networks and ad-hoc communication protocols makes them vulnerable to various forms of cyber attacks, which can threaten lives, property and public safety. The paper analyzes the threats to which autonomous vehicles are exposed within the VANET network (a specialized class of ad-hoc networks in which vehicles function as nodes in the communication network) in a 5G environment. The consequences of an attack can be: complete disabling of the operation of one or more vehicles in the system, traffic accidents due to false data or errors in algorithms, compromising the privacy of passengers and vehicle owners, disruption of traffic infrastructure, as well as loss of public trust. Special emphasis in the paper is placed on the consequences for traffic safety and potential protection measures. Keywords: autonomous vehicles, cyber attack, VANET computer network, 5G network, IEEE standards, communications: V2V, V2I i V2X. Vol. 10 No. 2 (2025): TTTP &#8211; APEIRON Boris Kova\u010di\u0107, Zoran \u017d. Avramovi\u0107, Ivana Buzdovan Cyber attacks on autonomous vehicles in the VANET computer network (attacks and protection) Original scientific paper DOI: 10.7251\/JTTTP2502121K Download Article PDF Abstract Autonomous vehicles represent a revolution in mobility, but they raise the issue of security challenges. With their appearance and the introduction of the 5G network, traffic systems are becoming increasingly dependent on digital communication and real-time data processing. Connectivity through 5G networks and ad-hoc communication protocols makes them vulnerable to various forms of cyber attacks, which can threaten lives, property and public safety. The paper analyzes the threats to which autonomous vehicles are exposed within the VANET network (a specialized class of ad-hoc networks in which vehicles function as nodes in the communication network) in a 5G environment. The consequences of an attack can be: complete disabling of the operation of one or more vehicles in the system, traffic accidents due to false data or errors in algorithms, compromising the privacy of passengers and vehicle owners, disruption of traffic infrastructure, as well as loss of public trust. Special emphasis in the paper is placed on the consequences for traffic safety and potential protection measures. Keywords: autonomous vehicles, cyber attack, VANET computer network, 5G network, IEEE standards, communications: V2V, V2I i V2X. Vol. 10 No. 2 (2025): TTTP &#8211; APEIRON Boris Kova\u010di\u0107, Zoran \u017d. Avramovi\u0107, Ivana Buzdovan Cyber attacks on autonomous vehicles in the VANET computer network (attacks and protection) Original scientific paper DOI: 10.7251\/JTTTP2502121K Download Article PDF Abstract Autonomous vehicles represent a revolution in mobility, but they raise the issue of security challenges. With their appearance and the introduction of the 5G network, traffic systems are becoming increasingly dependent on digital communication and real-time data processing. Connectivity through 5G networks and ad-hoc communication protocols makes them vulnerable to various forms of cyber attacks, which can threaten lives, property and public safety. The paper analyzes the threats to which autonomous vehicles are exposed within the VANET network (a specialized class of ad-hoc networks in which vehicles function as nodes in the communication network) in a 5G environment. The consequences of an attack can be: complete disabling of the operation of one or more vehicles in the system, traffic accidents due to false data or errors in algorithms, compromising the privacy of passengers and vehicle owners, disruption of traffic infrastructure, as well as loss of public trust. Special emphasis in the paper is placed on the consequences for traffic safety and potential protection measures. Keywords: autonomous vehicles, cyber attack, VANET computer network, 5G network, IEEE standards, communications: V2V, V2I i V2X.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"elementor_header_footer","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-4869","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cyber attacks on autonomous vehicles in the VANET computer network (attacks and protection) - TTTP Traffic and Transport Theory and Practice Journal<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/tttp-au.com\/index.php\/2025\/12\/23\/cyber-attacks-on-autonomous-vehicles-in-the-vanet-computer-network-attacks-and-protection\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber attacks on autonomous vehicles in the VANET computer network (attacks and protection) - TTTP Traffic and Transport Theory and Practice Journal\" \/>\n<meta property=\"og:description\" content=\"Vol. 10 No. 2 (2025): TTTP &#8211; APEIRON Boris Kova\u010di\u0107, Zoran \u017d. Avramovi\u0107, Ivana Buzdovan Cyber attacks on autonomous vehicles in the VANET computer network (attacks and protection) Original scientific paper DOI: 10.7251\/JTTTP2502121K Download Article PDF Abstract Autonomous vehicles represent a revolution in mobility, but they raise the issue of security challenges. With their appearance and the introduction of the 5G network, traffic systems are becoming increasingly dependent on digital communication and real-time data processing. Connectivity through 5G networks and ad-hoc communication protocols makes them vulnerable to various forms of cyber attacks, which can threaten lives, property and public safety. The paper analyzes the threats to which autonomous vehicles are exposed within the VANET network (a specialized class of ad-hoc networks in which vehicles function as nodes in the communication network) in a 5G environment. The consequences of an attack can be: complete disabling of the operation of one or more vehicles in the system, traffic accidents due to false data or errors in algorithms, compromising the privacy of passengers and vehicle owners, disruption of traffic infrastructure, as well as loss of public trust. Special emphasis in the paper is placed on the consequences for traffic safety and potential protection measures. Keywords: autonomous vehicles, cyber attack, VANET computer network, 5G network, IEEE standards, communications: V2V, V2I i V2X. Vol. 10 No. 2 (2025): TTTP &#8211; APEIRON Boris Kova\u010di\u0107, Zoran \u017d. Avramovi\u0107, Ivana Buzdovan Cyber attacks on autonomous vehicles in the VANET computer network (attacks and protection) Original scientific paper DOI: 10.7251\/JTTTP2502121K Download Article PDF Abstract Autonomous vehicles represent a revolution in mobility, but they raise the issue of security challenges. With their appearance and the introduction of the 5G network, traffic systems are becoming increasingly dependent on digital communication and real-time data processing. Connectivity through 5G networks and ad-hoc communication protocols makes them vulnerable to various forms of cyber attacks, which can threaten lives, property and public safety. The paper analyzes the threats to which autonomous vehicles are exposed within the VANET network (a specialized class of ad-hoc networks in which vehicles function as nodes in the communication network) in a 5G environment. The consequences of an attack can be: complete disabling of the operation of one or more vehicles in the system, traffic accidents due to false data or errors in algorithms, compromising the privacy of passengers and vehicle owners, disruption of traffic infrastructure, as well as loss of public trust. Special emphasis in the paper is placed on the consequences for traffic safety and potential protection measures. Keywords: autonomous vehicles, cyber attack, VANET computer network, 5G network, IEEE standards, communications: V2V, V2I i V2X. Vol. 10 No. 2 (2025): TTTP &#8211; APEIRON Boris Kova\u010di\u0107, Zoran \u017d. Avramovi\u0107, Ivana Buzdovan Cyber attacks on autonomous vehicles in the VANET computer network (attacks and protection) Original scientific paper DOI: 10.7251\/JTTTP2502121K Download Article PDF Abstract Autonomous vehicles represent a revolution in mobility, but they raise the issue of security challenges. With their appearance and the introduction of the 5G network, traffic systems are becoming increasingly dependent on digital communication and real-time data processing. Connectivity through 5G networks and ad-hoc communication protocols makes them vulnerable to various forms of cyber attacks, which can threaten lives, property and public safety. The paper analyzes the threats to which autonomous vehicles are exposed within the VANET network (a specialized class of ad-hoc networks in which vehicles function as nodes in the communication network) in a 5G environment. The consequences of an attack can be: complete disabling of the operation of one or more vehicles in the system, traffic accidents due to false data or errors in algorithms, compromising the privacy of passengers and vehicle owners, disruption of traffic infrastructure, as well as loss of public trust. Special emphasis in the paper is placed on the consequences for traffic safety and potential protection measures. Keywords: autonomous vehicles, cyber attack, VANET computer network, 5G network, IEEE standards, communications: V2V, V2I i V2X.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/tttp-au.com\/index.php\/2025\/12\/23\/cyber-attacks-on-autonomous-vehicles-in-the-vanet-computer-network-attacks-and-protection\/\" \/>\n<meta property=\"og:site_name\" content=\"TTTP Traffic and Transport Theory and Practice Journal\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-23T12:57:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-23T14:48:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/tttp-au.com\/wp-content\/uploads\/2024\/03\/cc-by-1.png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/tttp-au.com\/index.php\/2025\/12\/23\/cyber-attacks-on-autonomous-vehicles-in-the-vanet-computer-network-attacks-and-protection\/\",\"url\":\"https:\/\/tttp-au.com\/index.php\/2025\/12\/23\/cyber-attacks-on-autonomous-vehicles-in-the-vanet-computer-network-attacks-and-protection\/\",\"name\":\"Cyber attacks on autonomous vehicles in the VANET computer network (attacks and protection) - TTTP Traffic and Transport Theory and Practice Journal\",\"isPartOf\":{\"@id\":\"https:\/\/tttp-au.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/tttp-au.com\/index.php\/2025\/12\/23\/cyber-attacks-on-autonomous-vehicles-in-the-vanet-computer-network-attacks-and-protection\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/tttp-au.com\/index.php\/2025\/12\/23\/cyber-attacks-on-autonomous-vehicles-in-the-vanet-computer-network-attacks-and-protection\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/tttp-au.com\/wp-content\/uploads\/2024\/03\/cc-by-1.png\",\"datePublished\":\"2025-12-23T12:57:38+00:00\",\"dateModified\":\"2025-12-23T14:48:56+00:00\",\"author\":{\"@id\":\"https:\/\/tttp-au.com\/#\/schema\/person\/c930194f3a6209b815064c0f1d7cd68b\"},\"breadcrumb\":{\"@id\":\"https:\/\/tttp-au.com\/index.php\/2025\/12\/23\/cyber-attacks-on-autonomous-vehicles-in-the-vanet-computer-network-attacks-and-protection\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/tttp-au.com\/index.php\/2025\/12\/23\/cyber-attacks-on-autonomous-vehicles-in-the-vanet-computer-network-attacks-and-protection\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tttp-au.com\/index.php\/2025\/12\/23\/cyber-attacks-on-autonomous-vehicles-in-the-vanet-computer-network-attacks-and-protection\/#primaryimage\",\"url\":\"https:\/\/tttp-au.com\/wp-content\/uploads\/2024\/03\/cc-by-1.png\",\"contentUrl\":\"https:\/\/tttp-au.com\/wp-content\/uploads\/2024\/03\/cc-by-1.png\",\"width\":403,\"height\":141},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/tttp-au.com\/index.php\/2025\/12\/23\/cyber-attacks-on-autonomous-vehicles-in-the-vanet-computer-network-attacks-and-protection\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/tttp-au.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber attacks on autonomous vehicles in the VANET computer network (attacks and protection)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/tttp-au.com\/#website\",\"url\":\"https:\/\/tttp-au.com\/\",\"name\":\"TTTP Traffic and Transport Theory and Practice Journal\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/tttp-au.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/tttp-au.com\/#\/schema\/person\/c930194f3a6209b815064c0f1d7cd68b\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tttp-au.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/fb1767673e75e9127846ff73b2b9e96214fba2d4675dc6799cec11e9b4380ca2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/fb1767673e75e9127846ff73b2b9e96214fba2d4675dc6799cec11e9b4380ca2?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/tttp-au.com\"],\"url\":\"https:\/\/tttp-au.com\/index.php\/author\/jita-au-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber attacks on autonomous vehicles in the VANET computer network (attacks and protection) - TTTP Traffic and Transport Theory and Practice Journal","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/tttp-au.com\/index.php\/2025\/12\/23\/cyber-attacks-on-autonomous-vehicles-in-the-vanet-computer-network-attacks-and-protection\/","og_locale":"en_US","og_type":"article","og_title":"Cyber attacks on autonomous vehicles in the VANET computer network (attacks and protection) - TTTP Traffic and Transport Theory and Practice Journal","og_description":"Vol. 10 No. 2 (2025): TTTP &#8211; APEIRON Boris Kova\u010di\u0107, Zoran \u017d. Avramovi\u0107, Ivana Buzdovan Cyber attacks on autonomous vehicles in the VANET computer network (attacks and protection) Original scientific paper DOI: 10.7251\/JTTTP2502121K Download Article PDF Abstract Autonomous vehicles represent a revolution in mobility, but they raise the issue of security challenges. With their appearance and the introduction of the 5G network, traffic systems are becoming increasingly dependent on digital communication and real-time data processing. Connectivity through 5G networks and ad-hoc communication protocols makes them vulnerable to various forms of cyber attacks, which can threaten lives, property and public safety. The paper analyzes the threats to which autonomous vehicles are exposed within the VANET network (a specialized class of ad-hoc networks in which vehicles function as nodes in the communication network) in a 5G environment. The consequences of an attack can be: complete disabling of the operation of one or more vehicles in the system, traffic accidents due to false data or errors in algorithms, compromising the privacy of passengers and vehicle owners, disruption of traffic infrastructure, as well as loss of public trust. Special emphasis in the paper is placed on the consequences for traffic safety and potential protection measures. Keywords: autonomous vehicles, cyber attack, VANET computer network, 5G network, IEEE standards, communications: V2V, V2I i V2X. Vol. 10 No. 2 (2025): TTTP &#8211; APEIRON Boris Kova\u010di\u0107, Zoran \u017d. Avramovi\u0107, Ivana Buzdovan Cyber attacks on autonomous vehicles in the VANET computer network (attacks and protection) Original scientific paper DOI: 10.7251\/JTTTP2502121K Download Article PDF Abstract Autonomous vehicles represent a revolution in mobility, but they raise the issue of security challenges. With their appearance and the introduction of the 5G network, traffic systems are becoming increasingly dependent on digital communication and real-time data processing. Connectivity through 5G networks and ad-hoc communication protocols makes them vulnerable to various forms of cyber attacks, which can threaten lives, property and public safety. The paper analyzes the threats to which autonomous vehicles are exposed within the VANET network (a specialized class of ad-hoc networks in which vehicles function as nodes in the communication network) in a 5G environment. The consequences of an attack can be: complete disabling of the operation of one or more vehicles in the system, traffic accidents due to false data or errors in algorithms, compromising the privacy of passengers and vehicle owners, disruption of traffic infrastructure, as well as loss of public trust. Special emphasis in the paper is placed on the consequences for traffic safety and potential protection measures. Keywords: autonomous vehicles, cyber attack, VANET computer network, 5G network, IEEE standards, communications: V2V, V2I i V2X. Vol. 10 No. 2 (2025): TTTP &#8211; APEIRON Boris Kova\u010di\u0107, Zoran \u017d. Avramovi\u0107, Ivana Buzdovan Cyber attacks on autonomous vehicles in the VANET computer network (attacks and protection) Original scientific paper DOI: 10.7251\/JTTTP2502121K Download Article PDF Abstract Autonomous vehicles represent a revolution in mobility, but they raise the issue of security challenges. With their appearance and the introduction of the 5G network, traffic systems are becoming increasingly dependent on digital communication and real-time data processing. Connectivity through 5G networks and ad-hoc communication protocols makes them vulnerable to various forms of cyber attacks, which can threaten lives, property and public safety. The paper analyzes the threats to which autonomous vehicles are exposed within the VANET network (a specialized class of ad-hoc networks in which vehicles function as nodes in the communication network) in a 5G environment. The consequences of an attack can be: complete disabling of the operation of one or more vehicles in the system, traffic accidents due to false data or errors in algorithms, compromising the privacy of passengers and vehicle owners, disruption of traffic infrastructure, as well as loss of public trust. Special emphasis in the paper is placed on the consequences for traffic safety and potential protection measures. Keywords: autonomous vehicles, cyber attack, VANET computer network, 5G network, IEEE standards, communications: V2V, V2I i V2X.","og_url":"https:\/\/tttp-au.com\/index.php\/2025\/12\/23\/cyber-attacks-on-autonomous-vehicles-in-the-vanet-computer-network-attacks-and-protection\/","og_site_name":"TTTP Traffic and Transport Theory and Practice Journal","article_published_time":"2025-12-23T12:57:38+00:00","article_modified_time":"2025-12-23T14:48:56+00:00","og_image":[{"url":"https:\/\/tttp-au.com\/wp-content\/uploads\/2024\/03\/cc-by-1.png","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/tttp-au.com\/index.php\/2025\/12\/23\/cyber-attacks-on-autonomous-vehicles-in-the-vanet-computer-network-attacks-and-protection\/","url":"https:\/\/tttp-au.com\/index.php\/2025\/12\/23\/cyber-attacks-on-autonomous-vehicles-in-the-vanet-computer-network-attacks-and-protection\/","name":"Cyber attacks on autonomous vehicles in the VANET computer network (attacks and protection) - TTTP Traffic and Transport Theory and Practice Journal","isPartOf":{"@id":"https:\/\/tttp-au.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/tttp-au.com\/index.php\/2025\/12\/23\/cyber-attacks-on-autonomous-vehicles-in-the-vanet-computer-network-attacks-and-protection\/#primaryimage"},"image":{"@id":"https:\/\/tttp-au.com\/index.php\/2025\/12\/23\/cyber-attacks-on-autonomous-vehicles-in-the-vanet-computer-network-attacks-and-protection\/#primaryimage"},"thumbnailUrl":"https:\/\/tttp-au.com\/wp-content\/uploads\/2024\/03\/cc-by-1.png","datePublished":"2025-12-23T12:57:38+00:00","dateModified":"2025-12-23T14:48:56+00:00","author":{"@id":"https:\/\/tttp-au.com\/#\/schema\/person\/c930194f3a6209b815064c0f1d7cd68b"},"breadcrumb":{"@id":"https:\/\/tttp-au.com\/index.php\/2025\/12\/23\/cyber-attacks-on-autonomous-vehicles-in-the-vanet-computer-network-attacks-and-protection\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/tttp-au.com\/index.php\/2025\/12\/23\/cyber-attacks-on-autonomous-vehicles-in-the-vanet-computer-network-attacks-and-protection\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tttp-au.com\/index.php\/2025\/12\/23\/cyber-attacks-on-autonomous-vehicles-in-the-vanet-computer-network-attacks-and-protection\/#primaryimage","url":"https:\/\/tttp-au.com\/wp-content\/uploads\/2024\/03\/cc-by-1.png","contentUrl":"https:\/\/tttp-au.com\/wp-content\/uploads\/2024\/03\/cc-by-1.png","width":403,"height":141},{"@type":"BreadcrumbList","@id":"https:\/\/tttp-au.com\/index.php\/2025\/12\/23\/cyber-attacks-on-autonomous-vehicles-in-the-vanet-computer-network-attacks-and-protection\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/tttp-au.com\/"},{"@type":"ListItem","position":2,"name":"Cyber attacks on autonomous vehicles in the VANET computer network (attacks and protection)"}]},{"@type":"WebSite","@id":"https:\/\/tttp-au.com\/#website","url":"https:\/\/tttp-au.com\/","name":"TTTP Traffic and Transport Theory and Practice Journal","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/tttp-au.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/tttp-au.com\/#\/schema\/person\/c930194f3a6209b815064c0f1d7cd68b","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tttp-au.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/fb1767673e75e9127846ff73b2b9e96214fba2d4675dc6799cec11e9b4380ca2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fb1767673e75e9127846ff73b2b9e96214fba2d4675dc6799cec11e9b4380ca2?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/tttp-au.com"],"url":"https:\/\/tttp-au.com\/index.php\/author\/jita-au-com\/"}]}},"_links":{"self":[{"href":"https:\/\/tttp-au.com\/index.php\/wp-json\/wp\/v2\/posts\/4869","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tttp-au.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tttp-au.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tttp-au.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/tttp-au.com\/index.php\/wp-json\/wp\/v2\/comments?post=4869"}],"version-history":[{"count":10,"href":"https:\/\/tttp-au.com\/index.php\/wp-json\/wp\/v2\/posts\/4869\/revisions"}],"predecessor-version":[{"id":4928,"href":"https:\/\/tttp-au.com\/index.php\/wp-json\/wp\/v2\/posts\/4869\/revisions\/4928"}],"wp:attachment":[{"href":"https:\/\/tttp-au.com\/index.php\/wp-json\/wp\/v2\/media?parent=4869"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tttp-au.com\/index.php\/wp-json\/wp\/v2\/categories?post=4869"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tttp-au.com\/index.php\/wp-json\/wp\/v2\/tags?post=4869"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}