Securing the Next Generation of Vehicles: Threats and Countermeasures in SDVs

Authors

  • Suresh Sureddi Senior Technical Program Manager, Harman International. Author

DOI:

https://doi.org/10.63282/3050-9246/ICRTCSIT-127

Keywords:

SDV, cybersecurity, connected vehicles, V2X, OTA updates, AI in automotive, vehicle networks, intrusion detection, cloud security

Abstract

As vehicles evolve into software-defined platforms, the cybersecurity landscape of modern transportation systems is undergoing rapid transformation. This paper examines the heightened risks associated with increased connectivity, complex software architectures, and cloud integration in Software-Defined Vehicles (SDVs). We analyze core threat vectors such as insecure communication protocols, OTA vulnerabilities, and AI-based attacks. Furthermore, we outline a layered cybersecurity framework, practical mitigation strategies, and the role of artificial intelligence in threat detection and prevention. This comprehensive study combines insights from real-world deployments and scholarly research to propose a future-proof approach to automotive cybersecurity

Downloads

Download data is not yet available.

References

[1] R. S. Rathore, C. Hewage, O. Kaiwartya, and J. Lloret, “In-Vehicle Communication Cyber Security: Challenges and Solutions,” Sensors, vol. 22, 2022.

[2] T. Guan, Y. Han, N. Kang, et al., “An Overview of Vehicular Cybersecurity for Intelligent Connected Vehicles,” Sustainability, vol. 14, no. 21, 2022.

[3] M. D. Mwanje, O. Kaiwartya, et al., “Cybersecurity Analysis of Connected Vehicles,” IET Intelligent Transport Systems, vol. 18, no. 1, pp. 10–22, 2024.

[4] VicOne Automotive Threat Intelligence Team, “The State of SDV Cybersecurity,” Whitepaper, 2024.

[5] S. Sureddi, “The Use and Impact of AI in Enhancing Automotive Cyber Protection,” J. Artif Intell Mach Learn & Data Sci, Nov. 2024.

[6] S. Sureddi, “Mitigating Escalating Cybersecurity Threats in Advanced Automotive Systems,” Automotive IQ, Sept. 2024.

[7] S. Sureddi, “Enhancing Cybersecurity in Vehicle Networks,” Automotive IQ, Nov. 2022.

[8] S. Sureddi, “Advancements in V2X Security,” Automotive IQ, Oct. 2023.

[9] A. Humayed, J. Lin, F. Li, and B. Luo, “Cyber-Physical Systems Security—A Survey,” IEEE Internet of Things Journal, vol. 4, no. 6, pp. 1802–1831, Dec. 2017

[10] K. Mahbub, et al., “A Survey of Machine Learning for Secure SDVs,” IEEE Access, vol. 10, pp. 6523–6540, 2022.

[11] K. R. Kotte, L. Thammareddi, D. Kodi, V. R. Anumolu, A. K. K and S. Joshi, "Integration of Process Optimization and Automation: A Way to AI Powered Digital Transformation," 2025 First International Conference on Advances in Computer Science, Electrical, Electronics, and Communication Technologies (CE2CT), Bhimtal, Nainital, India, 2025, pp. 1133-1138, doi: 10.1109/CE2CT64011.2025.10939966.

[12] B. C. C. Marella, G. C. Vegineni, S. Addanki, E. Ellahi, A. K. K and R. Mandal, "A Comparative Analysis of Artificial Intelligence and Business Intelligence Using Big Data Analytics," 2025 First International Conference on Advances in Computer Science, Electrical, Electronics, and Communication Technologies (CE2CT), Bhimtal, Nainital, India, 2025, pp. 1139-1144, doi: 10.1109/CE2CT64011.2025.10939850.

[13] Thirunagalingam, A. (2024). Transforming real-time data processing: the impact of AutoML on dynamic data pipelines. Available at SSRN 5047601.

[14] V. M. Aragani and P. K. Maroju, "Future of blue-green cities emerging trends and innovations in iCloud infrastructure," in Advances in Public Policy and Administration, pp. 223–244, IGI Global, USA, 2024.

[15] Settibathini, V. S., Kothuru, S. K., Vadlamudi, A. K., Thammreddi, L., & Rangineni, S. (2023). Strategic analysis review of data analytics with the help of artificial intelligence. International Journal of Advances in Engineering Research, 26, 1-10.

[16] Sehrawat, S. K. (2023). The role of artificial intelligence in ERP automation: state-of-the-art and future directions. Trans Latest Trends Artif Intell, 4(4).

[17] B. C. C. Marella, “Data Synergy: Architecting Solutions for Growth and Innovation,” International Journal of Innovative Research in Computer and Communication Engineering, vol. 11, no. 9, pp. 10551–10560, Sep. 2023.

[18] Kommineni, M. "Explore Knowledge Representation, Reasoning, and Planning Techniques for Building Robust and Efficient Intelligent Systems." International Journal of Inventions in Engineering & Science Technology 7.2 (2021): 105- 114.

[19] Naga Surya Teja Thallam, 2024/12/30, AI-Powered Cybersecurity: How Machine Learning is Redefining Threat Detection and Prevention, International Journal of Scientific research in Engineering and Management, 8(12).

[20] Reddy, R. R. P. (2024). Enhancing Endpoint Security through Collaborative Zero-Trust Integration: A Multi-Agent Approach. International Journal of Computer Trends and Technology, 72(8), 86-90.

[21] Varinder Kumar Sharma - Zero Trust Architecture for 5G Networks - International Journal of Innovative Research in Engineering & Multidisciplinary Physical Sciences (IJIRMPS) Volume 12, Issue 6, November-December 2024. DOI: https://doi.org/10.37082/IJIRMPS.v12.i6.232707

[22] Amrish Solanki1, ShrikaaJadiga, AI Applications for Improving Transportation and Logistics Operations, International Journal ofINTELLIGENT SYSTEMS AND APPLICATIONS IN ENGINEERING, International Journal of Intelligent Systems and Applications in EngineeringIJISAE, 2024, 12(3), 2607–2617.

Published

2025-10-10

How to Cite

1.
Sureddi S. Securing the Next Generation of Vehicles: Threats and Countermeasures in SDVs. IJETCSIT [Internet]. 2025 Oct. 10 [cited 2025 Nov. 8];:194-7. Available from: https://ijetcsit.org/index.php/ijetcsit/article/view/447

Similar Articles

1-10 of 319

You may also start an advanced similarity search for this article.