Cyber security analysis of connected vehicles

被引:1
|
作者
Mwanje, Maria Drolence [1 ]
Kaiwartya, Omprakash [1 ,7 ]
Aljaidi, Mohammad [2 ]
Cao, Yue [3 ]
Kumar, Sushil [4 ]
Jha, Devki Nandan [5 ]
Naser, Abdallah [1 ]
Lloret, Jaime [6 ]
机构
[1] Nottingham Trent Univ, Dept Comp Sci, Nottingham, England
[2] Zarqa Univ, Fac Informat Technol, Comp Sci Dept, Zarqa, Jordan
[3] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan, Peoples R China
[4] Jawaharlal Nehru Univ, Sch Comp & Syst Sci, New Delhi, India
[5] Newcastle Univ, Sch Comp, Newcastle, England
[6] Univ Politeecn Valencia, Res Inst Integrated Management Coastal Areas, Gandia, Spain
[7] Nottingham Trent Univ, Dept Comp Sci, Nottingham NG11 8NS, England
关键词
cyber-physical systems; security of data; vehicle automation and connectivity; vehicular ad hoc networks; NETWORKS; FRAMEWORK; ATTACKS; CLOUD; ARCHITECTURE; PRIVACY; VANET; AUTHENTICATION; BLOCKCHAIN; ISSUES;
D O I
10.1049/itr2.12504
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The sensor-enabled in-vehicle communication and infrastructure-centric vehicle-to-everything (V2X) communications have significantly contributed to the spark in the amount of data exchange in the connected and autonomous vehicles (CAV) environment. The growing vehicular communications pose a potential cyber security risk considering online vehicle hijacking. Therefore, there is a critical need to prioritize the cyber security issues in the CAV research theme. In this context, this paper presents a cyber security analysis of connected vehicle traffic environments (CyACV). Specifically, potential cyber security attacks in CAV are critically investigated and validated via experimental data sets. Trust in V2X communication for connected vehicles is explored in detail focusing on trust computation and trust management approaches and related challenges. A wide range of trust-based cyber security solutions for CAV have been critically investigated considering their strengths and weaknesses. Open research directions have been highlighted as potential new research themes in CAV cyber security area. The paper critically evaluates the CAV structure and component vulnerabilities, validates the identified attacks, and analyzes the trust-based security solutions categorized according to the suggested trust taxonomy. image
引用
收藏
页码:1175 / 1195
页数:21
相关论文
共 50 条
  • [21] Cyber Security for Internet Connected HVAC/R Components
    Ellwein, Christian
    Steinhart, Heinrich
    2018 ASHRAE WINTER CONFERENCE, 2018,
  • [22] Towards a Security Assurance Framework for Connected Vehicles
    Pantazopoulos, Panagiotis
    Haddad, Sammy
    Lambrinoudakis, Costas
    Kalloniatis, Christos
    Maliatsos, Konstantinos
    Kanatas, Athanasios
    Varadi, Andras
    Gay, Matthieu
    Amditis, Angelos
    2018 IEEE 19TH INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS (WOWMOM), 2018,
  • [23] SECURITY STUDY AND CHALLENGES OF CONNECTED AUTONOMOUS VEHICLES
    Meryem, Sghiri
    Mazri, Tomader
    4TH INTERNATIONAL CONFERENCE ON SMART CITY APPLICATIONS (SCA' 19), 2019,
  • [24] Elliptic Curve Cryptography for Security in Connected Vehicles
    Genc, Yasin
    Habek, Muhammed
    Aytas, Nilay
    Akkoc, Ahmet
    Afacan, Erkan
    Yazgan, Erdem
    2022 30TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE, SIU, 2022,
  • [25] Reducing Security Overhead in the Context of Connected Vehicles
    Boutahala, Ramzi
    Ayaida, Marwane
    Fouchal, Hacene
    2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 4304 - 4309
  • [26] Introduction to the Special Section on Cyber Security in Internet of Vehicles
    Hsu, Ching-Hsien
    Alavi, Amir H.
    Dong, Mianxiong
    ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2022, 22 (04)
  • [27] A study on cyber-security of autonomous and unmanned vehicles
    Yagdereli, Eray
    Gemci, Cemal
    Aktas, A. Ziya
    JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS, 2015, 12 (04): : 369 - 381
  • [28] Privacy Impact Assessment of Cyber Attacks on Connected and Autonomous Vehicles
    Panda, Sakshyam
    Panaousis, Emmanouil
    Loukas, George
    Kentrotis, Konstantinos
    18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023, 2023,
  • [29] Connected and autonomous vehicles: A cyber-risk classification framework
    Sheehan, Barry
    Murphy, Finbarr
    Mullins, Martin
    Ryan, Cian
    TRANSPORTATION RESEARCH PART A-POLICY AND PRACTICE, 2019, 124 : 523 - 536
  • [30] Cyber Threats Facing Autonomous and Connected Vehicles: Future Challenges
    Parkinson, Simon
    Ward, Paul
    Wilson, Kyle
    Miller, Jonathan
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2017, 18 (11) : 2898 - 2915