Quantum Security Risks in Autonomous Vehicles and Smart Transportation Systems

Authors

  • Amit Awasthi

DOI:

https://doi.org/10.22399/ijcesen.4942

Keywords:

Quantum Computing Threats,, Autonomous Vehicle Security, Post-Quantum Cryptography, Vehicular Communication Authentication, Critical Transportation Infrastructure

Abstract

Self-driving cars and intelligent transport networks face unprecedented security challenges from quantum computing capabilities. Quantum algorithms can efficiently solve mathematical problems underlying current cryptographic architectures that protect vehicular communications, authentication, and software integrity. This article analyzes quantum-specific threat vectors including harvest-now-decrypt-later attacks, authentication forgery enabling safety-critical message spoofing, and long-term integrity attacks on over-the-air updates. Technical solutions include post-quantum cryptographic algorithms, hybrid security models, and crypto-agile architectures. The lifecycle threat model addresses temporal aspects of data sensitivity for vehicles with long operational lifetimes. Policy implications encompass national security, economic competitiveness, regulatory frameworks, and international standards coordination. Quantum-resilient transportation security requires urgent, coordinated efforts from industry, government, and standards organizations.

References

[1] Ari Shaller et al., "Roadmap of Post-Quantum Cryptography Standardization: Side-Channel Attacks and Countermeasures," ScienceDirect, 2023. [Online]. Available: https://www.fau.edu/engineering/directory/faculty/nojoumian/publication/files/pqc.pdf

[2] Michele Mosca, "Cybersecurity in an era with quantum computers: Will we be ready?" [Online]. Available: https://eprint.iacr.org/2015/1075.pdf

[3] Cesar Bernardini et al., "Security and privacy in vehicular communications: Challenges and opportunities," Vehicular Communications, Volume 10, 2017. [Online]. Available: https://www.sciencedirect.com/science/article/abs/pii/S2214209617300803

[4] Jonathan Petit and Steven E. Shladover, "Potential cyberattacks on automated vehicles," ResearchGate, 2014. [Online]. Available: https://www.researchgate.net/publication/266780575_Potential_Cyberattacks_on_Automated_Vehicles

[5] Palo Alto Networks, "Harvest now, decrypt later (HNDL): The Quantum-Era Threat." [Online]. Available: https://www.paloaltonetworks.in/cyberpedia/harvest-now-decrypt-later-hndl

[6] NIST, "Post-quantum cryptography." [Online]. Available: https://csrc.nist.gov/projects/post-quantum-cryptography

[7] Antonios Litke et al., "Blockchains for Supply Chain Management: Architectural Elements and Challenges Towards a Global Scale Deployment," Logistics, 2019. [Online]. Available: https://www.mdpi.com/2305-6290/3/1/5

[8] Stephen Checkoway and colleagues conducted a study titled "Comprehensive Experimental Analyses of Automotive Attack Surfaces." [Online]. Available: https://www.autosec.org/pubs/cars-usenixsec2011.pdf

[9] Andreas Hülsing et al., "SPHINCS+C: Compressing SPHINCS+ With (Almost) No Cost." [Online]. Available: https://csrc.nist.gov/csrc/media/Events/2022/fourth-pqc-standardization-conference/documents/papers/sphincs-plus-c-pqc2022.pdf

[10] Elaine Barker and Allen Roginsky, "Transitioning the Use of Cryptographic Algorithms and Key Lengths," NIST, 2024. [Online]. Available: https://csrc.nist.gov/pubs/sp/800/131/a/r3/ipd

[11] Emily Grumbling and Mark Horowitz, "Quantum computing: Progress and prospects," The National Academies Press, 2018. [Online]. Available: https://cs.brown.edu/courses/csci1800/sources/2018_NAE_QuantumComputing_ProgressAndProspects.pdf

[12] Ralf Küsters et al. discuss the concept of "Accountability," including its definition and relationship to verifiability. [Online]. Available: https://publ.sec.uni-stuttgart.de/kuesterstruderungvogt-tr_accountability_2010.pdf

Downloads

Published

2026-02-21

How to Cite

Amit Awasthi. (2026). Quantum Security Risks in Autonomous Vehicles and Smart Transportation Systems. International Journal of Computational and Experimental Science and Engineering, 12(1). https://doi.org/10.22399/ijcesen.4942

Issue

Section

Research Article