Systems and methods for performing remedial action while a wireless network of a vehicle is compromised

ABSTRACT

Systems and methods are described for receiving a user selection indicating that a wireless network of a vehicle has been compromised; in response to receiving the user selection, causing the vehicle to be disconnected from the compromised wireless network; and while the vehicle is disconnected from the compromised wireless network performing a remedial action to enable the vehicle to navigate from a current location of the vehicle to a safe location.

BACKGROUND

This disclosure is directed to systems and methods for performing aremedial action when a wireless network of a vehicle is compromised. Inparticular, techniques are disclosed for disconnecting a vehicle from awireless network in response to receiving a user selection indicatingthat a wireless network of a vehicle has been compromised, andperforming the remedial action while the vehicle is disconnected fromthe compromised wireless network.

SUMMARY

Many vehicles on the road are capable of connecting to a wirelessnetwork and providing a variety of features to drivers and occupants ofa vehicle using information received via the network. For example, manyautonomous or semi-autonomous vehicles are capable of connecting to awireless network to receive and transmit data in order to enable avehicle to drive at least partially on its own. While network-connectedvehicles offer many benefits, networks are vulnerable to cyberattacks bybad actors, which may compromise the network of the vehicle. If suchnetwork is compromised, there is a risk not only of damage to thevehicle but also of personal harm to occupants of the vehicle andothers.

In one approach, a potential cyberattack may be identified by analyzingnetwork traffic. However, there may be instances where the system doesnot detect any abnormalities in network traffic, but the usernonetheless observes that his or her vehicle is behaving irregularly. Inthis instance, if the user is in a situation where he or she cannoteasily pull over or stop the vehicle, he or she may have no mechanism ofdisconnecting the vehicle from the potentially compromised network andno way to otherwise thwart the cyberattack. Moreover, even if the systemflags network traffic as abnormal, the system may lack the capability orfeatures needed to rectify the situation and effectively communicate tothe user what actions should be taken.

To overcome these problems, systems and methods are provided herein forreceiving a user selection indicating that a wireless network of avehicle has been compromised, and in response to receiving the userselection, causing the vehicle to be disconnected from the compromisedwireless network. While the vehicle is disconnected from the compromisedwireless network, a remedial action to enable the vehicle to navigatefrom a current location of the vehicle to a safe location is performed.

Such aspects provide a user (e.g., a driver or occupant of a vehicle)with a mechanism to proactively communicate to a vehicle that a wirelessnetwork of a vehicle has been compromised. Accordingly, even if thesystem of the vehicle determines that the wireless network of thevehicle is not compromised, the user may initiate remedial action tocause the vehicle to be navigated to a safe location, such as if theuser recognizes that certain components of the vehicle are functioningabnormally, e.g., suggesting a unauthorized entity may be impacting thefunctioning of the vehicle. Thus, a potentially dangerous situation of avehicle being remotely taken over by a bad actor, which may cause harmto occupants of the vehicle, other drivers or pedestrians, can beavoided.

In some embodiments, the user selection corresponds to receiving inputassociated with a physical switch positioned in the vehicle. In someembodiments, the user selection corresponds to receiving inputassociated with a graphical user interface of the vehicle or a graphicaluser interface of a user device.

In some aspects of this disclosure, performing the remedial actioncomprises determining, using locally stored navigation data, a drivingroute from the current location of the vehicle to the safe location, andcausing, using control circuitry disconnected from the compromisedwireless network, the vehicle to travel along the determined drivingroute from the current location to the safe location.

In some embodiments, performing the remedial action comprisescommunicating, over a different network than the compromised wirelessnetwork, with a network-connected device within a predefined vicinity ofthe vehicle to notify the network-connected device that the wirelessnetwork of the vehicle has been compromised, and causing, using controlcircuitry disconnected from the compromised wireless network, thevehicle to navigate from the current location of to the safe locationbased on instructions received from the network-connected device.

In some aspects of this disclosure, the compromised wireless network isone of a plurality of networks associated with the vehicle, andcommunicating, over the different network than the compromised wirelessnetwork, with the network-connected device comprises identifying anetwork of the plurality of networks that is determined to be unlikelyto be compromised, and performing the communicating with thenetwork-connected device over the identified network.

In some embodiments, communicating, over the different network than thecompromised wireless network, with the network-connected device isperformed based on a user profile of a user positioned within thevehicle.

In some aspects of this disclosure, communicating, over the differentnetwork than the compromised wireless network, with thenetwork-connected device is performed with another vehicle.

In some embodiments, the vehicle is in an autonomous driving mode, andperforming the remedial action comprises generating for presentation anotification instructing a user to manually operate the vehicle.

In some aspects of this disclosure, the provided systems and methodsfurther comprise determining that a wireless network of a vehicle hasbeen compromised based on inbound signals from an external networkcausing an unexpected change in functionality of the vehicle, andproviding a notification to the user indicating that the wirelessnetwork of the vehicle has been compromised.

BRIEF DESCRIPTION OF THE DRAWINGS

The present disclosure, in accordance with one or more variousembodiments, is described in detail with reference to the followingfigures. The drawings are provided for purposes of illustration only andmerely depict typical or example embodiments. These drawings areprovided to facilitate an understanding of the concepts disclosed hereinand should not be considered limiting of the breadth, scope, orapplicability of these concepts. It should be noted that for clarity andease of illustration, these drawings are not necessarily made to scale.

FIG. 1 shows an illustrative vehicle interior configured to receive auser selection indicating that a wireless network of a vehicle has beencompromised, in accordance with some embodiments of this disclosure;

FIG. 2 shows an illustrative example of remedial action performed whilea vehicle is disconnected from a compromised wireless network, inaccordance with some embodiments of this disclosure;

FIG. 3 shows an illustrative example of remedial action performed whilea vehicle is disconnected from a compromised wireless network, inaccordance with some embodiments of this disclosure;

FIG. 4 shows an illustrative example of remedial action performed whilea vehicle is disconnected from a compromised wireless network, inaccordance with some embodiments of this disclosure;

FIG. 5 is a diagram of an illustrative system for performing a remedialaction while a vehicle is disconnected from a compromised wirelessnetwork, in accordance with some embodiments of this disclosure.

FIG. 6 is a flowchart of a detailed illustrative process for performinga remedial action while a vehicle is disconnected from a compromisedwireless network, in accordance with some embodiments of thisdisclosure; and

FIG. 7 is a flowchart of a detailed illustrative process for performinga remedial action while a vehicle is disconnected from a compromisedwireless network, in accordance with some embodiments of thisdisclosure.

DETAILED DESCRIPTION

FIG. 1 shows an illustrative interior 102 of a vehicle 100 configured toreceive a user selection indicating that a wireless network of a vehiclehas been compromised, in accordance with some embodiments of thisdisclosure. An interior 102 of vehicle 100 may comprise display 104,front windshield 105, steering wheel 106, driver seat 108, passengerseat 109, and any suitable number of other components. Vehicle 100 maycorrespond to any suitable vehicle, e.g., a car, motorcycle, boat,airplane, helicopter, drone, bus, truck, etc. In some embodiments,vehicle 100 may be capable of operating as an autonomous orsemi-autonomous vehicle, which may be understood as any vehicle that canbe configured to guide itself without human intervention during at leasta portion of a navigation session.

A vehicle security application (e.g., executing on one or moreprocessors located at least in part at vehicle 100; and/or a mobiledevice within a vicinity of vehicle 100; and/or one or more remoteservers, such as in a cloud server configuration, in communication withvehicle 100) may be configured to cause user interface 110 to begenerated for display at display 104. In some embodiments, display 104may be a dashboard display (e.g., provided at a center of vehicle or ina vicinity of driver seat 108) and/or a heads-up display provided atwindshield 105 of vehicle 100. Vehicle 100 may be configured to beconnected to one or more wireless networks (e.g., a cellular network, aWi-Fi network, a satellite network, short-range communication networkssuch as, for example, Bluetooth, NFC, RFID, any suitable RFcommunications protocol, or any combination thereof).

User interface 110 may provide an indication of user profile 112associated with an operator or occupant of vehicle 100, may permitaccess of content (e.g., music, in response to receiving selection ofoption 114; news, in response to receiving selection of option 116;traffic, in response to receiving selection of option 118), and maypermit access to other features provided by vehicle 100, e.g., drivingdirections, accessible by selecting option 120 associated with a GlobalPositioning System (GPS) module.

User interface 110 may comprise a selectable option 122 to enable anoccupant of vehicle 100 to instruct the vehicle security application tocause vehicle 100 to be disconnected from one or more wireless (and/orwired) networks. In some embodiments, selectable option 122 may comprisea plurality of options, for each of the one or more wireless networksthat vehicle 100 is connected to, to selectively disconnect respectivenetworks, and/or an option to disconnect vehicle 100 from all networks.In some embodiments, selectable option 122 may enable an occupant ofvehicle 100 to disconnect vehicle 100 from one or more wireless networksof vehicle 100, such as if the occupant recognizes that vehicle isbehaving abnormally, e.g., the occupant observes that one or more doorsof vehicle 100 cannot be unlocked; the engine cannot be started; audioprovided via an infotainment system of vehicle 100 cannot be raisedabove a certain volume threshold or lowered below a certain volumethreshold; a command to turn on a vehicle air conditioning system actsas a command to turn on a heating system, or vice versa; a vehiclespeedometer is not functioning properly, such as, for example, showingan error message; a change in speed occurs that is not expected by thevehicle operator or occupant, etc. In some embodiments, selectableoption 122 can be a user interface element, or a physical button orswitch or other mechanical component. In some embodiments, selectableoption 122 can correspond to, e.g., a start/stop button, where an SOSmode may be activated by repeatedly pressing the start/stop button for apredefined number of times (e.g., 3 times). In some embodiments, in theSOS mode, the vehicle may be configured to turn on parking lights,hazard lights, etc.

In some embodiments, the vehicle security application may cause awireless network status indicator 124 to be generated for display atuser interface 110, based on a determination (e.g., made by the vehicleby analyzing network traffic) of whether one or more wireless networksof vehicle 100 may be compromised. In some embodiments, wireless networkstatus indicator 124 may comprise a plurality of identifiers for eachrespective wireless network of vehicle 100 and a correspondingindication of whether such wireless network is determined to becurrently compromised. In some embodiments, selectable option 122 and/orstatus indicator 124 may be provided to a user device (e.g., a mobilephone, which may be running a mobile application corresponding to thevehicle security application) of an occupant of vehicle 100,additionally or alternatively to providing selectable option 122 and/orstatus indicator 124 at user interface 110 of interior 102 of vehicle100. In some embodiments, even if status indicator 124 indicates thatthere are no issues with one or more wireless networks of vehicle 100,option 122 may be selected based on the vehicle occupant’s observations,to initiate remedial action by the vehicle security application.

In some embodiments, in determining a status indicator to be specifiedas status indicator 124, the vehicle security application may determinethat one or more wireless networks of vehicle 100 may be compromised,e.g., in response to detecting an irregularity associated with aparticular wireless network, such as, for example, based on comparingcurrent wireless network conditions over a particular network tohistoric wireless network conditions. For example, a table of historicwireless network conditions may be stored in a database (e.g., locallyat vehicle 100 or remote from vehicle 100) in association with whethersuch conditions correspond to an instance of a wireless network beingcompromised. In some embodiments, status indicator 124, as well asoption 122, may be specified at any suitable level of granularity. Forexample, status indicator 124 may indicate that a first wireless network(e.g., cellular network) is compromised, whereas a second wirelessnetwork or technique (e.g., Bluetooth) is not compromised, and userinterface 110 may receive user selection of option 122 to disconnect thefirst network, but may not receive selection of an option to disconnectthe second network.

Status indicator 124 may represent an indication or suggestion to one ormore occupants of vehicle 100 whether to disconnect from one or morewireless networks of vehicle 100 (e.g., whether the occupant shouldselect option 122), or may be used to automatically disconnect fromcertain wireless networks. In some embodiments, such recommendations maybe based, at least in part, on user profile indicated at 112, which maystore an indication of a user’s vehicle model, make, age and/orlocation. The vehicle security application may query a database (e.g.,database 505 of FIG. 5 ) indicating historical instances where a networkwas compromised in a vehicle having similar attributes, and may suggestthe user select option 122 (or automatically cause option 122 to beselected) in response to determining that similar vehicles experienced acyberattack with respect to similar issues that vehicle 100 isexperiencing. The database may comprise a plurality of user profilesindicating instances when other users selected option 122, and baserecommendations made via indicator 124 data contained in such pluralityof other user profiles.

In response to determining that vehicle 100 has been disconnected fromone or more wireless networks (e.g., based on receiving a user selectionof selectable option 122) the vehicle security application may cause oneor more remedial actions to be performed while the vehicle isdisconnected from the compromised wireless network. For example,selection of option 122 may cause vehicle 100 to enter an SOS mode inwhich the vehicle security application enables vehicle 100 to navigatefrom a current location of the vehicle to a safe location. In someembodiments, the remedial action may comprise causing all vehiclecomponents associated with enabling network connectivity of thecompromised wireless network (e.g., wireless transceiver circuitry) tobe disabled. On the other hand, modules of vehicle 100 not associatedwith network connectivity of the compromised wireless network may not beimpacted by such remedial action. In some embodiments, the remedialaction may comprise, e.g., the vehicle security application overriding alocked state of a door in connection with one or doors previously havingbeen unable to be unlocked, or overriding any other suitableirregularity in the functioning of vehicle 100.

In some embodiments, the remedial action may comprise the vehiclesecurity application causing vehicle 100 to operate autonomously tonavigate vehicle 100 from a current location to a safe location, such asshown in connection with illustrated example of FIG. 2 . In someembodiments, the remedial action may comprise the vehicle securityapplication causing a message 304 to be generated for output (e.g., viadisplay and/or audio alerts) instructing a user to manually operatevehicle 100 (e.g., if the vehicle was previously operating in anautonomous manner which may be desirable to exit, or if the vehicle isno longer capable of operating in the autonomous manner now that thewireless network has been disconnected), and may be accompanied byproviding navigation route 302 to the vehicle occupant, such as shown inconnection with illustrated example of FIG. 3 .

In some embodiments, the remedial action may comprise providing anavigation route to navigate vehicle 100 from a current location to asafe location may be provided via user interface 110. In theillustrative example of FIG. 2 , the navigation route indicated at 202on user interface 110 may be the route along which vehicle 100 is to beautonomously navigated to the safe location. In the illustrative exampleof FIG. 3 , the navigation route indicated at 302 on user interface 110is the route along which vehicle 100 may be manually operated to thesafe location. In each of the examples of FIGS. 2 and 3 , the navigationmay be provided and executed without the assistance of the compromised,now-disconnected wireless network. Instead, the vehicle securityapplication may perform such remedial actions based on one or more of alast known location of vehicle 100 (e.g., prior to vehicle 100 beingdisconnected from the compromised wireless network); locally stored(e.g., cached) data (e.g., navigation data, object identification data);local computing modules; data received via an uncompromised wirelessnetwork of vehicle 100; and/or data received via a mobile devicepositioned within vehicle 100. In some embodiments, processing for suchautonomous navigation and/or GPS navigation route may be performedlocally at vehicle 100 by control circuitry having been disconnectedfrom the compromised wireless network as a result of the selection ofoption 122. In some embodiments, a description 204, 304 of the remedialaction being taken may be provided via user interface 110. In someembodiments, the user may be provided with an option to decline toperform the remedial action or override the determination of vehicle 100to perform a certain remedial action, and/or select a different remedialaction to be performed by the vehicle security application.

In performing autonomous or semi-autonomous navigation, vehicle 100 mayutilize any suitable combination of sensors and processing techniques.For example, vehicle 100 may comprise sensors (e.g., cameras, LiDAR,RADARs, ultrasonic, etc.) and employ computer vision techniques to sensean ambient environment surrounding vehicle 100, in order to detectobstacles and identify objects to safely operate vehicle 100. In someembodiments, image processing techniques may be performed on one or moreobjects detected as surrounding the vehicle to extract certain featuresof the one or more objects, and the vehicle security application mayquery a database (e.g., database 505 of FIG. 5 ) of known objects andcorresponding features with such extracted features, to classify thetype of the encountered object (e.g., another vehicle, a pedestrian, aroad sign, an animal, etc.), which may be taken into account indetermining how to navigate vehicle 100. In some embodiments, machinelearning techniques may be employed in which machine learning models maybe trained to detect the presence of, and classify, objects surroundingvehicle 100. In some embodiments, such techniques may be utilized todetermine whether the environment surrounding a current location ofvehicle 100 is dangerous (e.g., the middle of a highway, in the middleof an intersection, etc.) or safe (e.g., a parking lot, a driveway, anopen field, etc.). If the surrounding environment is determined to bedangerous, the remedial action may correspond to enabling vehicle 100 toreach a safe location, whereas if the surrounding environment isdetermined to be safe, vehicle 100 may be immediately disabled or slowlybrought to a stationary position, in response to being disconnected fromthe compromised wireless network.

Under normal circumstances where wireless networks of vehicle 100 arenot compromised, vehicle 100 may be in communication with one or moreremote servers, e.g., vehicle 100 may perform some processing andstorage locally, and transmit data about its environment to the remoteservers for storage and processing, e.g., the remote servers may beconfigured to have more computing power than vehicle 100, to performprocessing-intensive tasks. In some embodiments, when disconnectingvehicle 100 from the compromised wireless network, communication withthe remote servers may be suspended, and vehicle 100 may temporarilyperform processing required for autonomous navigation locally, ratherthan relying on the remote servers such as in normal operatingconditions, since the communication path between vehicle 100 and theremote servers may be compromised.

FIG. 4 shows an illustrative example of remedial action performed whilevehicle 400 is disconnected from a compromised wireless network, inaccordance with some embodiments of this disclosure. Vehicle 400 maycorrespond to vehicle 100. In some embodiments, a remedial actionperformed by the vehicle security application may comprise communicatingover a wireless network (determined not to be compromised, and/or notassociated with the network disconnected in response to receivingselection of option 122) with nearby objects, e.g., vehicle 404,landmarks (e.g., electric grid equipment 406; telecommunicationsequipment 408; building 410, such as, for example a police station;transportation infrastructure 412, such as, for example, a train, traintracks, road sensors, etc.; traffic equipment 414, such as, for example,traffic lights or road signs) or any other suitable device (e.g., amobile device within vehicle 400 or vehicle 404). For example, vehicle400 and 404 may communicate via short-range wireless technique, or anyother suitable technique, based on respective wireless signal 416 (e.g.,an SOS signal) and wireless signal 418 broadcast by vehicles 400 and404, respectively. In some embodiments, an SOS message may be broadcastby vehicle 400 over any suitable communication channel (e.g., to alertnearby vehicles, the authorities, devices at a home of the user ofvehicle 400 or devices of family or friends of the user of vehicle 400)of an ongoing cyberattack of vehicle 400 and a request for assistance.

In some embodiments, a wireless network used to enable communicationbetween vehicle 400 and one or more of vehicle 404 and landmarks 406,408, 410, 412, 414 may be determined based on the indication receivedvia selectable option 122. For example, if the selectable option isassociated with disconnecting a first communication network (e.g.,Wi-Fi) of vehicle 100, a different communications network (e.g.,cellular or short-range communication, vehicle-to-vehiclecommunications) may be utilized for communications between vehicle 400and one or more of vehicle 404 and landmarks 406, 408, 410, 412, 414. Insome embodiments, the vehicle security application may automaticallydetermine which alternative network is suitable for such communication,e.g., by analyzing network traffic over the candidate alternativenetwork to ensure such network is not compromised. In some embodiments,a recommendation may be provided to an occupant of vehicle 400concerning which network to use to carry out communications withexternal devices and/or recommending which external device tocommunicate with, and user selection of a network and/or external devicemay be received. In some embodiments, a selection of a network may bemade at least in part based on user profile 112, which may indicatehistorical data concerning which external devices and/or networks weresuccessfully employed in past instances of similar vehicles and/or in asimilar geographic area to that of the driver occupant.

In some embodiments, the communication between vehicle 400 and one ormore of vehicle 404 and one or more external devices (e.g., landmarks406, 408, 410, 412, 414) may comprise receiving instructions from suchone or more external devices concerning how to navigate vehicle 400 to asafe location, and/or enabling the external device to control navigationof vehicle 400 in order to bring vehicle 400 to a safe location. Forexample, if utilizing local processing techniques to navigate vehicle400 to safety is determined not to be practical, or a bad actor isdetermined to have taken control of such processing via the compromisedwireless network or a user is panicking and unable to take control ofvehicle 400, it may be preferable to enable an external device tocontrol navigation of vehicle 400. In some embodiments, a selectableoption may be provided to enable a vehicle occupant to accept or rejectthe determination to allow an external device to instruct vehicle 400(e.g., provide a navigation route) how to reach a safe location, orotherwise control vehicle 400 to arrive at a safe location. In someembodiments, a mobile device of a user within vehicle 400 and/or vehicle404 may relay instructions to vehicle 400 to enable vehicle 400 tonavigate to a safe location (e.g., over a network determined not to becompromised or associated with selectable option 122 having causedvehicle 400 to be disconnected from the compromised wireless network).

In some embodiments, selectable option 122 may be provided in thecontext of a ridesharing or ridehailing service provider (e.g., via amobile application of the ridesharing company running on a mobile deviceof a passenger of a vehicle associated with the ridesharing orridehailing service provider). For example, if a passenger of theridesharing vehicle observes behavior of the ridesharing vehicleindicative of a cyberattack of the vehicle, the passenger may selectselectable option 122, which may cause the ridesharing vehicle tocommunicate (e.g., over a cellular network) with other nearby vehiclesassociated with the ridesharing or ridehailing service provider, in aneffort to request assistance from, or obtain instructions from, suchvehicles to assist the ridesharing vehicle in reaching a safe location.In some embodiments, a large-scale attack may be detected, e.g., if acertain amount of vehicles being operated by employees of, or otherwiseassociated with, the ridesharing or ridehailing service provider aredetermined to be compromised based on a plurality of indicationsreceived from passengers of such vehicles, to enable the ridesharing orridehailing service provider to take remedial action (e.g., temporarilyshut down servers associated with the ridesharing or ridehailing serviceprovider). In some embodiments, a passenger of the ride-sharing vehiclemay select option 122 to cause the ride-sharing vehicle to bedisconnected from the compromised wireless network.

FIG. 5 is a diagram of an illustrative system 500 for performing aremedial action while a vehicle is disconnected from a compromisedwireless network, in accordance with some embodiments of thisdisclosure. User equipment device 508 (e.g., which may correspond to amobile device of an occupant or operator of vehicle 100 of FIG. 1 andvehicle 400 of FIG. 4 ) may be coupled to communication network 506.Communication network 506 may be one or more networks including theInternet, a mobile phone network, mobile voice or data network (e.g., a5G, 4G, or LTE network), cable network, public switched telephonenetwork, short-range communication network, or other types ofcommunication network or combinations of communication networks. Paths(e.g., depicted as arrows connecting the respective devices to thecommunication network 506) may separately or together include one ormore communications paths, such as a satellite path, a fiber-optic path,a cable path, a path that supports Internet communications (e.g., IPTV),free-space connections (e.g., for broadcast or other wireless signals),or any other suitable wired or wireless communications path orcombination of such paths. Communications with the client devices may beprovided by one or more of these communications paths but are shown as asingle path in FIG. 5 to avoid overcomplicating the drawing. Anysuitable number of additional user equipment devices may be employed(e.g., a user device of an occupant or operator of vehicle 404).

Although communications paths are not drawn between user equipmentdevices, these devices may communicate directly with each other viacommunications paths as well as other short-range, point-to-pointcommunications paths, such as USB cables, IEEE 1394 cables, wirelesspaths (e.g., Bluetooth, infrared, IEEE 702-11x, etc.), or othershort-range communication via wired or wireless paths. The userequipment devices may also communicate with each other directly throughan indirect path via communication network 506.

System 500 may comprise media content source 502 and server 504. In someembodiments, media content source 502 may correspond to server 504and/or media content source 502 may correspond to server 504 may beunder the control of or otherwise associated with a media contentprovider. In addition, there may be more than one of each of mediacontent source 502 and server 504, but only one of each is shown in FIG.5 to avoid overcomplicating the drawing. If desired, media contentsource 502 and server 504 may be integrated as one source device. Insome embodiments, the vehicle security application may be executed atone or more of control circuitry 511 of server 504 and control circuitry532 of vehicle 530 (and/or control circuitry of user equipment device508).

In some embodiments, server 504 may include control circuitry 511 andstorage 514 (e.g., RAM, ROM, Hard Disk, Removable Disk, etc.). Storage514 may store one or more databases. Server 504 may also include aninput/output path 512. I/O path 512 may provide device information, orother data, over a local area network (LAN) or wide area network (WAN),and/or other content and data to control circuitry 511, which mayinclude processing circuitry, and storage 514. Control circuitry 511 maybe used to send and receive commands, requests, and other suitable datausing I/O path 512, which may comprise I/O circuitry. I/O path 512 mayconnect control circuitry 511 (and specifically processing circuitrythereof) to one or more communications paths.

Control circuitry 511 may be based on any suitable control circuitrysuch as one or more microprocessors, microcontrollers, digital signalprocessors, programmable logic devices, field-programmable gate arrays(FPGAs), application-specific integrated circuits (ASICs), etc., and mayinclude a multi-core processor (e.g., dual-core, quad-core, hexa-core,or any suitable number of cores) or supercomputer. In some embodiments,control circuitry 511 may be distributed across multiple separateprocessors or processing units, for example, multiple of the same typeof processing units (e.g., two Intel Core i7 processors) or multipledifferent processors (e.g., an Intel Core i5 processor and an Intel Corei7 processor). In some embodiments, control circuitry 511 executesinstructions for an emulation system application stored in memory (e.g.,the storage 514). Memory may be an electronic storage device provided asstorage 514 that may be part of control circuitry 511.

In some embodiments, server 504 may retrieve guidance data from mediacontent source 502, process the data as will be described in detailbelow, and forward the data to user equipment device 508 and/or vehicle530. Media content source 502 may include one or more types of contentdistribution equipment including a television distribution facility,cable system headend, satellite distribution facility, programmingsources (e.g., television broadcasters, such as NBC, ABC, HBO, etc.),intermediate distribution facilities and/or servers, Internet providers,on-demand media servers, and other content providers. NBC is a trademarkowned by the National Broadcasting Company, Inc., ABC is a trademarkowned by the American Broadcasting Company, Inc., and HBO is a trademarkowned by the Home Box Office, Inc. Media content source 502 may be theoriginator of content (e.g., a television broadcaster, a Webcastprovider, etc.) or may not be the originator of content (e.g., anon-demand content provider, an Internet provider of content of broadcastprograms for downloading, etc.). Media content source 602 may includecable sources, satellite providers, on-demand providers, Internetproviders, over-the-top content providers, or other providers ofcontent. Media content source 502 may also include a remote media serverused to store different types of content (including audio and/or videoand/or audiovisual content selected by a user), in a location remotefrom any of the client devices. Media content source 502 may alsoprovide supplemental content relevant to the metadata of a particularscene of a media asset as described above.

Client devices may operate in a cloud computing environment to accesscloud services. In a cloud computing environment, various types ofcomputing services for content sharing, storage or distribution (e.g.,video sharing sites or social networking sites) are provided by acollection of network-accessible computing and storage resources,referred to as “the cloud.” For example, the cloud can include acollection of server computing devices (such as, e.g., server 504),which may be located centrally or at distributed locations, that providecloud-based services to various types of users and devices connected viaa network such as the Internet via communication network 506. In suchembodiments, user equipment devices may operate in a peer-to-peer mannerwithout communicating with a central server.

User equipment device 508 may be a smartphone device or a usertelevision equipment system or device. In some embodiments, microphone529 may receive voice commands for the vehicle security application. Insome embodiments, display 520 may be a television display or a computerdisplay. In some embodiments, user input interface 518 may be a remotecontrol device. In some embodiments, the circuit boards may includecontrol circuitry, processing circuitry, and storage (e.g., RAM, ROM,hard disk, removable disk, etc.). In some embodiments, the circuitboards may include an input/output path. User equipment device 508 mayreceive content and data via input/output (I/O) path 528. I/O path 528may provide content (e.g., broadcast programming, on-demand programming,Internet content, content available over a local area network (LAN) orwide area network (WAN), and/or other content) and data to controlcircuitry 526, which may comprise processing circuitry 524 and storage522. Control circuitry 526 may be used to send and receive commands,requests, and other suitable data using I/O path 528, which may compriseI/O circuitry. I/O path 528 may connect control circuitry 526 (andspecifically processing circuitry 524) to one or more communicationspaths (described below). I/O functions may be provided by one or more ofthese communications paths, but are shown as a single path in FIG. 5 toavoid overcomplicating the drawing.

Control circuitry 526 may be based on any suitable control circuitrysuch as processing circuitry 524. As referred to herein, controlcircuitry should be understood to mean circuitry based on one or moremicroprocessors, microcontrollers, digital signal processors,programmable logic devices, field-programmable gate arrays (FPGAs),application-specific integrated circuits (ASICs), etc., and may includea multi-core processor (e.g., dual-core, quad-core, hexa-core, or anysuitable number of cores) or supercomputer. In some embodiments, controlcircuitry may be distributed across multiple separate processors orprocessing units, for example, multiple of the same type of processingunits (e.g., two Intel Core i7 processors) or multiple differentprocessors (e.g., an Intel Core i5 processor and an Intel Core i7processor). In some embodiments, control circuitry 526 executesinstructions for the vehicle security application stored in memory(e.g., storage 522). Specifically, control circuitry 526 (and/or controlcircuitry 532 of vehicle 530) may be instructed by the vehicle securityapplication to perform the functions discussed above and below. In someimplementations, processing or actions performed by control circuitry526 may be based on instructions received from the vehicle securityapplication.

In client/server-based embodiments, control circuitry 526 may includecommunications circuitry suitable for communicating with a vehiclesecurity application server or other networks or servers. Theinstructions for carrying out the above mentioned functionality may bestored on a server. Communications circuitry may include a cable modem,an integrated services digital network (ISDN) modem, a digitalsubscriber line (DSL) modem, a telephone modem, Ethernet card, or awireless modem for communications with other equipment, or any othersuitable communications circuitry. Such communications may involve theInternet or any other suitable communication networks or paths. Inaddition, communications circuitry may include circuitry that enablespeer-to-peer communication of user equipment devices, or communicationof user equipment devices in locations remote from each other (describedin more detail below).

Memory may be an electronic storage device provided as storage 522 thatis part of control circuitry 526. As referred to herein, the phrase“electronic storage device” or “storage device” should be understood tomean any device for storing electronic data, computer software, orfirmware, such as random-access memory, read-only memory, hard drives,optical drives, digital video disc (DVD) recorders, compact disc (CD)recorders, BLU-RAY disc (BD) recorders, BLU-RAY 3D disc recorders,digital video recorders (DVR, sometimes called a personal videorecorder, or PVR), solid state devices, quantum storage devices, gamingconsoles, gaming media, or any other suitable fixed or removable storagedevices, and/or any combination of the same. Storage 522 may be used tostore various types of content described herein as well as vehiclesecurity application described above. Nonvolatile memory may also beused (e.g., to launch a boot-up routine and other instructions).Cloud-based storage, described in relation to FIG. 5 , may be used tosupplement storage 522 or instead of storage 522.

Control circuitry 526 may include video generating circuitry and tuningcircuitry, such as one or more analog tuners, one or more MPEG-2decoders or other digital decoding circuitry, high-definition tuners, orany other suitable tuning or video circuits or combinations of suchcircuits. Encoding circuitry (e.g., for converting over-the-air, analog,or digital signals to MPEG signals for storage) may also be provided.Control circuitry 526 may also include scaler circuitry for upconvertingand downconverting content into the preferred output format of userequipment device 508. Control circuitry 526 may also includedigital-to-analog converter circuitry and analog-to-digital convertercircuitry for converting between digital and analog signals. The tuningand encoding circuitry may be used by user equipment device 508 toreceive and to display, to play, or to record content. The tuning andencoding circuitry may also be used to receive guidance data. Thecircuitry described herein, including for example, the tuning, videogenerating, encoding, decoding, encrypting, decrypting, scaler, andanalog/digital circuitry, may be implemented using software running onone or more general purpose or specialized processors. Multiple tunersmay be provided to handle simultaneous tuning functions (e.g., watch andrecord functions, picture-in-picture (PIP) functions, multiple-tunerrecording, etc.). If storage 522 is provided as a separate device fromuser equipment device 508, the tuning and encoding circuitry (includingmultiple tuners) may be associated with storage 522.

Control circuitry 526 may receive instruction from a user by way of userinput interface 518. User input interface 518 may be any suitable userinterface, such as a remote control, mouse, trackball, keypad, keyboard,touch screen, touchpad, stylus input, joystick, voice recognitioninterface, or other user input interfaces. Display 520 may be providedas a stand-alone device or integrated with other elements of each one ofuser equipment device 508. For example, display 520 may be a touchscreenor touch-sensitive display. In such circumstances, user input interface518 may be integrated with or combined with display 512. Display 520 maybe one or more of a monitor, a television, a display for a mobiledevice, or any other type of display. A video card or graphics card maygenerate the output to display 512. The video card may be any controlcircuitry described above in relation to control circuitry 526. Thevideo card may be integrated with control circuitry 526. Speakers 516may be provided as integrated with other elements of each one of userequipment device 508 or may be stand-alone units. The audio component ofvideos and other content displayed on display 520 may be played throughthe speakers 516. In some embodiments, the audio may be distributed to areceiver (not shown), which processes and outputs the audio via speakers516.

The vehicle security application may be implemented using any suitablearchitecture. For example, it may be a stand-alone applicationwholly-implemented on vehicle 530 and/or user equipment device 508. Insuch an approach, instructions of the application are stored locally(e.g., in storage 522), and data for use by the application isdownloaded on a periodic basis (e.g., from an out-of-band feed, from anInternet resource, or using another suitable approach). Controlcircuitry 526 may retrieve instructions of the application from storage522 and process the instructions to provide supplemental content asdiscussed. Based on the processed instructions, control circuitry 526may determine what action to perform when input is received from userinput interface 518. For example, movement of a cursor on a displayup/down may be indicated by the processed instructions when user inputinterface 518 indicates that an up/down button was selected.

In some embodiments, the vehicle security application is aclient/server-based application. Data for use by a thick or thin clientimplemented on each one of user equipment device 508 is retrievedon-demand by issuing requests to a server remote to each one of userequipment device 508. In one example of a client/server-based guidanceapplication, control circuitry 526 runs a web browser that interpretsweb pages provided by a remote server. For example, the remote servermay store the instructions for the application in a storage device. Theremote server may process the stored instructions using circuitry (e.g.,control circuitry 511) to perform the operations discussed in connectionwith FIGS. 1-4 .

In some embodiments, the vehicle security application may be downloadedand interpreted or otherwise run by an interpreter or virtual machine(e.g., run by control circuitry 532 and/or run by control circuitry526). In some embodiments, the vehicle security application may beencoded in the ETV Binary Interchange Format (EBIF), received by controlcircuitry 532 and/or run by control circuitry 526 as part of a suitablefeed, and interpreted by a user agent running on control circuitry 526.For example, the wireless vehicle security application may be an EBIFapplication. In some embodiments, the vehicle security application maybe defined by a series of JAVA-based files that are received and run bya local virtual machine or other suitable middleware executed by controlcircuitry 532 and/or run by control circuitry 526. In some of suchembodiments (e.g., those employing MPEG-2 or other digital mediaencoding schemes), the vehicle security application may be, for example,encoded and transmitted in an MPEG-2 object carousel with the MPEG audioand video packets of a program.

System 500 may comprise one or more vehicles 530 (which may correspondto vehicles 100 of FIG. 1 , vehicle 300 of FIG. 3 ). Vehicle 530 maycomprise control circuitry 532, storage 534, communications circuitry536, vehicle sensors 538, display 539, I/O circuitry 540, GPS module542, speaker 544, and microphone 546. In some embodiments, controlcircuitry 532, storage 534, communications circuitry 536, display 539,I/O circuitry 540, speaker 544, and microphone 546 may be implemented ina similar manner as discussed in connection with correspondingcomponents of server 504 and/or user equipment device 508. In someembodiments, communications circuitry 536 may be suitable forcommunicating with a vehicle security application server or othernetworks or servers or external devices (e.g., via one or more antennasprovided on an exterior or interior of vehicle 530) In some embodiments,communications circuitry 536 may be included as part of controlcircuitry 532. In some embodiments, control circuitry 532 may beconfigured to disconnect vehicle 530 from network 500 in response toreceiving selection of a selectable option (e.g., option 122 of FIG. 1), such as by disabling communications circuitry 536. In someembodiments, portions of communication circuitry 536 enablingcommunication over a first wireless network (e.g., Wi-Fi, which may bedetermined to be compromised) may be disabled while other portions ofcommunication circuitry 536 enabling communications over a secondwireless communication network (e.g., a short-range communicationmethod) may be selectively be determined to remain enabled (e.g., toenable communications with external devices in remediating the networkcompromise). In some embodiments, display 539 may correspond to display104 of FIG. 1 .

In some embodiments, GPS module 542 may be in communication with one ormore satellites or remote servers to enable vehicle 530 to provideupcoming directions, e.g., recited via speaker 544 and/or provided viadisplay 539, to aid in vehicle navigation. In some embodiments, vehicle530 is an autonomous vehicle capable of automatically navigating vehicle530 along a route corresponding to the directions received via GPSmodule 542.

In some embodiments, vehicle sensors 538 may comprise one or more ofproximity sensors, ultrasonic sensors, temperature sensors,accelerometers, gyroscopes, pressure sensors, humidity sensors, etc.,and control circuitry 532 may monitor vehicle operations, such asnavigation, powertrain, braking, battery, generator, climate control,and other vehicle systems. Such communication systems for exchanginginformation with external devices, networks, and systems, such ascellular, Wi-Fi, satellite, vehicle-to-vehicle communications,infrastructure communication systems, and other communicationstechnologies. Such vehicle systems may acquire numerous data points persecond, and from this data may identify or calculate numerous types ofvehicle status data, such as location, navigation, environmentalconditions, velocity, acceleration, change in altitude, direction, andangular velocity. In some embodiments, information collected by vehicle530 may be utilized by vehicle 530 and/or transmitted to server 504 foruse in performing autonomous or semi-autonomous navigation, as well asfor use by the vehicle security application in determining whether aparticular wireless network of vehicle 530 has been compromised.

FIG. 6 is a flowchart of a detailed illustrative process for performinga remedial action while a vehicle is disconnected from a compromisedwireless network, in accordance with some embodiments of thisdisclosure. In various embodiments, the individual steps of process 600may be implemented by one or more components of the devices and systemsof FIGS. 1-5 . Although the present disclosure may describe certainsteps of process 600 (and of other processes described herein) as beingimplemented by certain components of the devices and systems of FIGS.1-5 , this is for purposes of illustration only, and it should beunderstood that other components of the devices and systems of FIGS. 1-5may implement those steps instead.

At 602, control circuitry (e.g., control circuitry 532 of vehicle 530 ofFIG. 5 and/or control circuitry 511 of server 504 of FIG. 5 ) maydetermine whether a user selection has been received indicating that awireless network of a vehicle (e.g., vehicle 100 of FIG. 1 ) has beencompromised. For example, control circuitry 532 of vehicle 530 maydetermine whether a selection of option 122 of FIG. 1 has been receivedvia user interface 110 or via any other suitable input (e.g., voice,tactile, remote control, text-based, etc.), and/or control circuitry 511of server 504 may determine whether an indication from vehicle 530 hasbeen received indicating that option 122 has been selected. In responseto determining that the user selection has been received, processing mayproceed to 604. Otherwise, the control circuitry may continue monitoringfor such user selection. For example, option 122 may be selected where auser observes abnormal behavior in his or her vehicle, even if thevehicle is not providing any notifications to the user that one or morewireless networks of the vehicle are compromised.

At 604, the control circuitry may cause the vehicle (e.g., vehicle 100of FIG. 1 ) to be disconnected from the compromised wireless networkassociated with the selection received at 602. If the vehicle isconnected to only one wireless network at 602, the vehicle may bedisconnected from such network. If the selectable option (e.g., option122 of FIG. 1 ) specifies a particular network (e.g., Wi-Fi or cellularnetwork), the vehicle may be disconnected from the particular networkspecified by such selectable option.

In some embodiments, if the vehicle is connected to multiple networks,the control circuitry may determine whether any of the multiple networksare likely to be compromised, such as by analyzing data packets receivedover each network, and determining whether network traffic is irregularas compared to normal network traffic conditions, where informationconcerning normal network traffic conditions may be stored at storage534 of vehicle 530 and/or server 504. For example, if the controlcircuitry determines that network traffic over a particular wirelessnetwork is associated with an unusually high number of packets from aparticular (e.g., unknown) address and/or an unusually large amount ofoutbound or inbound traffic, or that there is irregular header orpayload information in such packets, that particular wireless networkmay be determined to be likely to be compromised. Conversely, if aparticular wireless network is determined to be exhibiting normalnetwork traffic conditions, such wireless network may be determined notto be compromised, and there may be no need to disconnect the vehicle(e.g., vehicle 100 of FIG. 1 ) from such normally functioning wirelessnetwork.

At 606, while the vehicle (e.g., vehicle 100 of FIG. 1 ) is disconnectedfrom the compromised wireless network, the control circuitry may performone or more remedial actions to enable the vehicle to navigate from acurrent location of the vehicle to a safe location. In some embodiments,the remedial action to be performed may be based on whether the vehicleis determined to currently be in a safe location (e.g., based on a lastknown location of the vehicle prior to disconnecting from the wirelessnetwork and/or based on an indication received from a mobile device ofan occupant of the vehicle over an uncompromised wireless network link).If the vehicle is determined to be in a safe location (e.g., parked, ortraveling off-road on flat terrain) the remedial action may compriseimmobilizing the engine and notifying the user of the remedial actionbeing taken. If the vehicle is determined not to be in a safe location(e.g., in the middle of highway traveling at a relatively fast speed)the remedial action may comprise enabling the vehicle to travel to asafe location.

In some embodiments, the remedial action to be performed to enable thevehicle to reach a safe location may depend on whether the vehicleremains connected to any other (uncompromised) wireless network and/orwhether the vehicle is capable of autonomous operation and/or which datais locally stored by the vehicle and/or local processing capabilities ofthe vehicle. If the disconnection performed at 604 caused vehicle 100 tobe disconnected from all wireless networks, the remedial action maycomprise actions similar to those depicted in FIG. 2 (e.g., performingautonomous operation of the vehicle using local processing moduleshaving been disconnected from the comprised network) or FIG. 3 (e.g.,informing the occupant that he or she should take control of the vehicleto navigate the vehicle along the suggested route to a safe location).For example, certain navigation data received by the vehicle (e.g., GPSmodule 542 of vehicle 500) over communication networks may be cached inlocal memory of the vehicle (e.g., storage 534 of FIG. 5 ) for use oncethe vehicle is disconnected from the wireless network, and one or moreautomotive sensors (e.g., vehicle sensors 538) may locally process dataconcerning the surroundings of the vehicle to assist in the autonomousoperation of the vehicle.

If the disconnection performed at 604 caused vehicle 100 to bedisconnected from one wireless network, but the vehicle is determined tostill be connected to an additional wireless network that is determinednot to be compromised, the remedial action may leverage such additionalwireless network to cause the vehicle to reach a safe location. Forexample, the remedial action depicted in FIGS. 2-3 may be performed,such as, for example, by communicating with the external devices orcomponents as discussed in connection with FIG. 4 .

FIG. 7 is a flowchart of a detailed illustrative process for performinga remedial action while a vehicle is disconnected from a compromisedwireless network, in accordance with some embodiments of thisdisclosure. In various embodiments, the individual steps of process 700may be implemented by one or more components of the devices and systemsof FIGS. 1-5 . Although the present disclosure may describe certainsteps of process 700 (and of other processes described herein) as beingimplemented by certain components of the devices and systems of FIGS.1-5 , this is for purposes of illustration only, and it should beunderstood that other components of the devices and systems of FIGS. 1-5may implement those steps instead.

At 702, the control circuitry (e.g., control circuitry 532 of vehicle530 of FIG. 5 and/or control circuitry 511 of server 504 of FIG. 5 ) maymonitor wireless network traffic associated with the vehicle and maymonitor vehicle components of a vehicle (e.g., vehicle 100 of FIG. 1 ).For example, the control circuitry may monitor behavior of, e.g., doorsof the vehicle, infotainment system of the vehicle, HVAC system of thevehicle, etc., to determine whether one or more components arefunctioning abnormally. Additionally or alternately, the controlcircuitry may monitor wireless network traffic associated with one ormore networks (e.g., cellular, satellite, Wi-Fi, short-rangecommunication, etc.) that the vehicle is connected to.

At 704, the control circuitry may determine whether the monitorednetwork traffic and vehicle components indicate that a wireless networkof a vehicle has been compromised. For example, if the control circuitrydetermines that communications over a particular wireless network areassociated with an unusually high number of packets from a particular(e.g., unknown) address and/or an unusually large amount of outbound orinbound traffic, or that there is irregular header or payloadinformation in such packets, that particular wireless network may bedetermined to be likely to be compromised. Conversely, if a particularwireless network is determined to be exhibiting normal network trafficconditions, such wireless network may be determined not to becompromised and there may be no need to disconnect the vehicle from suchnormally functioning wireless network. Processing may proceed to 706upon determining one or more wireless networks of the vehicle have beencompromised. On the other hand, processing may proceed to 708 upondetermining the one or more wireless networks of the vehicle have notbeen compromised. In some embodiments, processing may proceed to 706even upon determining, at 704, the wireless network is not compromised.

At 706, the control circuitry may provide a notification (e.g.,indicator 124 of user interface 110 of FIG. 1 ) to the user indicatingthat the wireless network of the vehicle has been compromised. In someembodiments, the notification may indicate that the wireless network ofa vehicle has been compromised, based on the determination at 704.

At 708, the control circuitry may determine whether a user selectionindicating that a wireless network of a vehicle has been compromised hasbeen received. 708 may be performed in a similar manner to 602. Theoccupant of the vehicle may evaluate the notification provided at 706and/or visually observe conditions of the vehicle in determining whetherto initiate user selection of the option (e.g., option 122 of userinterface 110 of FIG. 1 ). If no such user selection is received,processing may return to 702. If such user selection is received,processing may proceed to 710. In some embodiments, even if userselection of the option (e.g., option 122 of user interface 110 of FIG.1 ) is not received, the control circuitry may automatically proceed to710, e.g., if the control circuitry determines with a high confidencelevel that a particular vehicle network is compromised.

710 may be performed in a similar manner to 604 of FIG. 6 , todisconnect the vehicle from one or more networks associated with anetwork compromise. At 712, the control circuitry may determine whetherthe vehicle is in an autonomous mode or is capable of operating in theautonomous mode. If so, processing may proceed to 716. Otherwise,processing may proceed to 714.

At 714, the control circuitry may provide a notification to the userinstructing the user to manually operate the vehicle, e.g., notification304 and/or route 302 of FIG. 3 . In some embodiments, such notificationmay be provided even if the vehicle is capable of being in, or is in, anautonomous mode, e.g., since it may be preferable for the user tomanually operate the vehicle in the absence of a wireless networkconnection, even if the vehicle is capable of operating autonomously.

At 716, the control circuitry may determine whether the vehicle (e.g.,vehicle 530) is capable of utilizing locally stored data to navigate tosafety. For example, control circuitry 532 of vehicle 530 may bedisconnected from any wireless network connection, and may check whetherlocally stored data (e.g., cached navigation data and/or stored data toassist in identifying objects along the navigation route and performingappropriate navigation based on the identified objects) and localcomputing modules are sufficiently present at the vehicle to facilitateautonomous navigation of the vehicle, as shown in connection with FIG. 2. Upon determining the vehicle is capable of utilizing the localprocessing to navigate to a safe location, processing may proceed to718. Otherwise, processing may proceed to 720.

At 718, the control circuitry may utilize locally stored data and localcomputing modules to facilitate autonomous navigation of the vehicle, asshown in connection with FIG. 2 . In some embodiments, such localprocessing and locally stored data may be utilized in connection with714, e.g., to provide navigation route 302 of FIG. 3 .

At 720, the control circuitry may communicate with one or more externaldevices (e.g., vehicle 404 and landmarks 406, 408, 410, 412, 414 of FIG.4 ) over a network determined to be an uncompromised wireless network,to enable vehicle to navigate to safety. For example, vehicle 400, atwhich the user selection of 708 may have been received, may beconfigured to communicate with vehicle 404 over short-rangecommunication (e.g., utilizing wireless signals 416 of FIG. 4 tobroadcast an SOS message for assistance, and wireless signals 418 toreceive navigation instructions and/or navigation data), to receivenavigation data from vehicle 404, and/or to enable vehicle 404 toremotely control vehicle 400 to cause vehicle 400 to reach a safelocation. In some embodiments, the control circuitry may reconnect thedisconnected network once the vehicle is in a safe location and upondetermining that the disconnected network is once again secure, and/orin response to receiving input from the user indicating the wirelessnetwork is again secure (e.g., reselection of option 122).

What is claimed is:
 1. A method comprising: receiving a user selection indicating that a wireless network of a vehicle has been compromised; in response to receiving the user selection, causing the vehicle to be disconnected from the compromised wireless network; and while the vehicle is disconnected from the compromised wireless network: performing a remedial action to enable the vehicle to navigate from a current location of the vehicle to a safe location.
 2. The method of claim 1, wherein the user selection corresponds to receiving input associated with a physical switch positioned in the vehicle.
 3. The method of claim 1, wherein the user selection corresponds to receiving input associated with a graphical user interface of the vehicle or a graphical user interface of a user device.
 4. The method of claim 1, wherein performing the remedial action comprises: determining, using locally stored navigation data, a driving route from the current location of the vehicle to the safe location; and causing, using control circuitry disconnected from the compromised wireless network, the vehicle to travel along the determined driving route from the current location to the safe location.
 5. The method of claim 1, wherein performing the remedial action comprises: communicating, over a different network than the compromised wireless network, with a network-connected device within a predefined vicinity of the vehicle to notify the network-connected device that the wireless network of the vehicle has been compromised; and causing, using control circuitry disconnected from the compromised wireless network, the vehicle to navigate from the current location of to the safe location based on instructions received from the network-connected device.
 6. The method of claim 5, wherein: the compromised wireless network is one of a plurality of networks associated with the vehicle; and communicating, over the different network than the compromised wireless network, with the network-connected device comprises: identifying a network of the plurality of networks that is determined to be unlikely to be compromised; and performing the communicating with the network-connected device over the identified network.
 7. The method of claim 5, wherein communicating, over the different network than the compromised wireless network, with the network-connected device is performed based on a user profile of a user positioned within the vehicle.
 8. The method of claim 5, wherein communicating, over the different network than the compromised wireless network, with the network-connected device is performed with another vehicle.
 9. The method of claim 1, wherein: the vehicle is in an autonomous driving mode; and performing the remedial action comprises generating for presentation a notification instructing a user to manually operate the vehicle.
 10. The method of claim 1, further comprising: determining that a wireless network of a vehicle has been compromised based on inbound signals from an external network causing an unexpected change in functionality of the vehicle; and providing a notification to the user indicating that the wireless network of the vehicle has been compromised.
 11. A system comprising: input/output circuitry configured to: receive a user selection indicating that a wireless network of a vehicle has been compromised; control circuitry configured to: in response to receiving the user selection, cause the vehicle to be disconnected from the compromised wireless network; and while the vehicle is disconnected from the compromised wireless network: perform a remedial action to enable the vehicle to navigate from a current location of the vehicle to a safe location.
 12. The system of claim 11, wherein the user selection corresponds to receiving input associated with a physical switch positioned in the vehicle.
 13. The system of claim 11, wherein the user selection corresponds to receiving input associated with a graphical user interface of the vehicle or a graphical user interface of a user device.
 14. The system of claim 11, wherein the control circuitry is configured to perform the remedial action by: determining, using locally stored navigation data, a driving route from the current location of the vehicle to the safe location; and causing, using control circuitry disconnected from the compromised wireless network, the vehicle to travel along the determined driving route from the current location to the safe location.
 15. The system of claim 11, wherein the control circuitry is configured to perform the remedial action by: communicating, over a different network than the compromised wireless network, with a network-connected device within a predefined vicinity of the vehicle to notify the network-connected device that the wireless network of the vehicle has been compromised; and causing, using control circuitry disconnected from the compromised wireless network, the vehicle to navigate from the current location of to the safe location based on instructions received from the network-connected device.
 16. The system of claim 15, wherein: the compromised wireless network is one of a plurality of networks associated with the vehicle; and the control circuitry is configured to communicate, over the different network than the compromised wireless network, with the network-connected device by: identifying a network of the plurality of networks that is determined to be unlikely to be compromised; and performing the communicating with the network-connected device over the identified network.
 17. The system of claim 15, wherein the control circuitry is configured to communicate, over the different network than the compromised wireless network, with the network-connected device based on a user profile of a user positioned within the vehicle.
 18. The system of claim 15, wherein the network-connected device is another vehicle.
 19. The system of claim 11, wherein: the vehicle is in an autonomous driving mode; and wherein the control circuitry is further configured to perform the remedial action by generating for presentation a notification instructing a user to manually operate the vehicle.
 20. The system of claim 11, wherein the control circuitry is further configured to: determine that a wireless network of a vehicle has been compromised based on inbound signals from an external network causing an unexpected change in functionality of the vehicle; and provide a notification to the user indicating that the wireless network of the vehicle has been compromised. 