Cyber security analysis of connected vehicles

被引:1
作者
Mwanje, Maria Drolence [1 ]
Kaiwartya, Omprakash [1 ,7 ]
Aljaidi, Mohammad [2 ]
Cao, Yue [3 ]
Kumar, Sushil [4 ]
Jha, Devki Nandan [5 ]
Naser, Abdallah [1 ]
Lloret, Jaime [6 ]
机构
[1] Nottingham Trent Univ, Dept Comp Sci, Nottingham, England
[2] Zarqa Univ, Fac Informat Technol, Comp Sci Dept, Zarqa, Jordan
[3] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan, Peoples R China
[4] Jawaharlal Nehru Univ, Sch Comp & Syst Sci, New Delhi, India
[5] Newcastle Univ, Sch Comp, Newcastle, England
[6] Univ Politeecn Valencia, Res Inst Integrated Management Coastal Areas, Gandia, Spain
[7] Nottingham Trent Univ, Dept Comp Sci, Nottingham NG11 8NS, England
关键词
cyber-physical systems; security of data; vehicle automation and connectivity; vehicular ad hoc networks; NETWORKS; FRAMEWORK; ATTACKS; CLOUD; ARCHITECTURE; PRIVACY; VANET; AUTHENTICATION; BLOCKCHAIN; ISSUES;
D O I
10.1049/itr2.12504
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The sensor-enabled in-vehicle communication and infrastructure-centric vehicle-to-everything (V2X) communications have significantly contributed to the spark in the amount of data exchange in the connected and autonomous vehicles (CAV) environment. The growing vehicular communications pose a potential cyber security risk considering online vehicle hijacking. Therefore, there is a critical need to prioritize the cyber security issues in the CAV research theme. In this context, this paper presents a cyber security analysis of connected vehicle traffic environments (CyACV). Specifically, potential cyber security attacks in CAV are critically investigated and validated via experimental data sets. Trust in V2X communication for connected vehicles is explored in detail focusing on trust computation and trust management approaches and related challenges. A wide range of trust-based cyber security solutions for CAV have been critically investigated considering their strengths and weaknesses. Open research directions have been highlighted as potential new research themes in CAV cyber security area. The paper critically evaluates the CAV structure and component vulnerabilities, validates the identified attacks, and analyzes the trust-based security solutions categorized according to the suggested trust taxonomy. image
引用
收藏
页码:1175 / 1195
页数:21
相关论文
共 50 条
  • [41] Analyzing Behavior in Cyber-Physical Systems in Connected Vehicles: A Case Study
    Beyel, Harry H.
    Makke, Omar
    Gusikhin, Oleg
    van der Aalst, Wil M. P.
    BUSINESS PROCESS MANAGEMENT WORKSHOPS, BPM 2023, 2024, 492 : 92 - 104
  • [42] Position Verification in Connected Vehicles for Cyber Resilience Using Geofencing and Fuzzy Logic
    Drolence Mwanje, Maria
    Kaiwartya, Omprakash
    Naser, Abdallah
    IEEE OPEN JOURNAL OF INTELLIGENT TRANSPORTATION SYSTEMS, 2024, 5 : 540 - 554
  • [43] BTC2PA: A Blockchain-Assisted Trust Computation With Conditional Privacy-Preserving Authentication for Connected Vehicles
    Rawat, Gopal Singh
    Singh, Karan
    Shariq, Mohd
    Das, Ashok Kumar
    Chaudhry, Shehzad Ashraf
    Lorenz, Pascal
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2025, 26 (01) : 1134 - 1148
  • [44] Analysis of Security Threats and Vulnerability for Cyber-physical Systems
    Gao, Yang
    Peng, Yong
    Xie, Feng
    Zhao, Wei
    Wang, Dejin
    Han, Xuefeng
    Lug, Tianbo
    Lie, Zhao
    2013 3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), 2013, : 50 - 55
  • [45] Cyber-physical security for IoT networks: a comprehensive review on traditional, blockchain and artificial intelligence based key-security
    Attkan, Ankit
    Ranga, Virender
    COMPLEX & INTELLIGENT SYSTEMS, 2022, 8 (04) : 3559 - 3591
  • [46] Towards cyber security for low-carbon transportation: Overview, challenges and future directions
    Cao, Yue
    Li, Sifan
    Lv, Chenchen
    Wang, Di
    Sun, Hongjian
    Jiang, Jing
    Meng, Fanlin
    Xu, Lexi
    Cheng, Xinzhou
    RENEWABLE & SUSTAINABLE ENERGY REVIEWS, 2023, 183
  • [47] Security Tradeoffs in Cyber Physical Systems: A Case Study Survey on Implantable Medical Devices
    Altawy, Ham
    Youssef, Amr M.
    IEEE ACCESS, 2016, 4 : 959 - 979
  • [48] Autonomous Vehicles Security: Challenges and Solutions Using Blockchain and Artificial Intelligence
    Bendiab, Gueltoum
    Hameurlaine, Amina
    Germanos, Georgios
    Kolokotronis, Nicholas
    Shiaeles, Stavros
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2023, 24 (04) : 3614 - 3637
  • [49] The Privacy Implications of Cyber Security Systems: A Technological Survey
    Toch, Eran
    Bettini, Claudio
    Shmueli, Erez
    Radaelli, Laura
    Lanzi, Andrea
    Riboni, Daniele
    Lepri, Bruno
    ACM COMPUTING SURVEYS, 2018, 51 (02)
  • [50] Emerging Security Mechanisms for Medical Cyber Physical Systems
    Kocabas, Ovunc
    Soyata, Tolga
    Aktas, Mehmet K.
    IEEE-ACM TRANSACTIONS ON COMPUTATIONAL BIOLOGY AND BIOINFORMATICS, 2016, 13 (03) : 401 - 416