A Review on Security Challenges in V2X Communications Technology for VANETs

被引:2
作者
Farsimadan, Eslam [1 ]
Moradi, Leila [1 ]
Palmieri, Francesco [1 ]
机构
[1] Univ Salerno, Dept Comp Sci, I-84084 Fisciano, Italy
关键词
Vehicle-to-everything; Surveys; Reviews; Communications technology; 6G mobile communication; Safety; Privacy; Vehicular ad hoc networks; VANET; V2X communications; security; privacy; cyberattack; security solutions; cryptography; machine learning; MISBEHAVIOR DETECTION; VEHICULAR NETWORK; TRUST MANAGEMENT; ATTACK DETECTION; AUTHENTICATION; BLOCKCHAIN; PRIVACY; INTELLIGENT; INTERNET; KEY;
D O I
10.1109/ACCESS.2025.3541035
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Vehicular Ad-hoc Network (VANET) is emerging as a new networking/communication model that offers remarkable approaches for controlling and managing vehicular traffic. In this scenario, Virtual traffic light (VTL) techniques, advanced navigation support, and fleet management facilities attempt to handle traffic management and control concerns by leveraging vehicular network communication paradigms. The most important communication models in vehicular networks are characterized as vehicle-to-everything (V2X) communications technology. In V2X communications, security issues, and related countermeasures are crucial, as they are in other wireless technologies. Our survey provides a systematic overview of various research directions by highlighting and investigating the most critical V2X security issues and related countermeasures. First, we discuss the points mentioned in the previous papers, including the architecture, main characteristics, and communication models of the V2X networks. Furthermore, some of the most significant applications of these mission-critical networks reported in the published papers and the main security challenges and requirements will be highlighted. We also arrange corresponding (existing) resources, to investigate different solutions for securing V2X communications. Finally, a few suggestions for future research related to V2X security challenges are presented. In general, this article reviews and summarizes the studies of the last ten years. This survey will help make it easier for scholars studying V2X communication security and related fields to keep track of the academic frontier, by offering a sufficiently clear landscape and a roadmap.
引用
收藏
页码:31069 / 31094
页数:26
相关论文
共 50 条
[21]   Challenges and Solutions for Cellular Based V2X Communications [J].
Gyawali, Sohan ;
Xu, Shengjie ;
Qian, Yi ;
Hu, Rose Qingyang .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2021, 23 (01) :222-255
[22]   Adaptable Safety and Security in V2X Systems [J].
Villarreal-Vasquez, Miguel ;
Bhargava, Bharat ;
Angin, Pelin .
2017 IEEE 2ND INTERNATIONAL CONGRESS ON INTERNET OF THINGS (IEEE ICIOT), 2017, :17-24
[23]   Federated Learning-Based Resource Allocation for V2X Communications [J].
Bhardwaj, Sanjay ;
Kim, Da-Hye ;
Kim, Dong-Seong .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2025, 26 (01) :382-396
[24]   Blockchain for V2X: Applications and Architectures [J].
Meijers, James ;
Michalopoulos, Panagiotis ;
Motepalli, Shashank ;
Zhang, Gengrui ;
Zhang, Shiquan ;
Veneris, Andreas ;
Jacobsen, Hans-Arno .
IEEE OPEN JOURNAL OF VEHICULAR TECHNOLOGY, 2022, 3 :193-209
[25]   V2X security: A case study of anonymous authentication [J].
Yang, Yanjiang ;
Wei, Zhuo ;
Zhang, Youcheng ;
Lu, Haibing ;
Choo, Kim-Kwang Raymond ;
Cai, Haibin .
PERVASIVE AND MOBILE COMPUTING, 2017, 41 :259-269
[26]   Safeguarding the V2X Pathways: Exploring the Cybersecurity Landscape Through Systematic Review [J].
Gularte, Kevin Herman Muraro ;
Vargas, Jose Alfredo Ruiz ;
da Costa, Joao Paulo Javidi ;
da Silva, Antonio Santos ;
Santos, Giovanni Almeida ;
Wang, Yuming ;
Mueller, Christian Alfons ;
Lipps, Christoph ;
de Sousa Junior, Rafael Timoteo ;
Vidal Filho, Walter de Britto ;
Slusallek, Philipp ;
Schotten, Hans Dieter .
IEEE ACCESS, 2024, 12 :72871-72895
[27]   Certificateless Signature Scheme With Batch Verification for Secure and Privacy-Preserving V2V Communications in VANETs [J].
Wu, Qian ;
Zhang, Lei ;
Yang, Yafang ;
Choo, Kim-Kwang Raymond .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2025, 22 (02) :1448-1459
[28]   An IEEE 802.11x Implementation for V2X Communications Towards IoT and Big Data [J].
Serin, Dilara Albayrak ;
Boyaci, Ali ;
Ozpinar, Alper ;
Yarkan, Serhan .
INTERNATIONAL TELECOMMUNICATIONS CONFERENCE, ITELCON 2017, 2019, 504 :177-188
[29]   To Tolerate or To Impute Missing Values in V2X Communications Data? [J].
Razavi-Far, Roozbeh ;
Wan, Daoming ;
Saif, Mehrdad ;
Mozafari, Niloofar .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (13) :11442-11452
[30]   Review on V2X, I2X, and P2X Communications and Their Applications: A Comprehensive Analysis over Time [J].
Lozano Dominguez, Jose Manuel ;
Mateo Sanguino, Tomas Jesus .
SENSORS, 2019, 19 (12)