A fsQCA-Based Framework for Cybersecurity of Connected and Automated Vehicles: Implications for Sustainable Development Goals

被引:1
作者
Karuppiah, Koppiahraj [1 ]
Sankaranarayanan, Bathrinath [2 ]
Ali, Syed Mithun [3 ]
Priyanka, Ramesh [4 ]
机构
[1] Saveetha Inst Med & Tech Sci, Saveetha Sch Engn, Dept Mech Engn, Chennai 602104, India
[2] Kalasalingam Acad Res & Educ, Dept Mech Engn, Krishnankoil 626126, India
[3] Bangladesh Univ Engn & Technol, Dept Ind & Prod Engn, Dhaka 1000, Bangladesh
[4] Kalasalingam Acad Res & Educ, Kalasalingam Business Sch, Krishnankoil 626126, India
来源
VEHICLES | 2024年 / 6卷 / 01期
关键词
connected and automated vehicles; intelligent transportation system; fsQCA; cybersecurity; security attacks; CYBER-ATTACKS; SECURITY; SAFETY;
D O I
10.3390/vehicles6010022
中图分类号
TH [机械、仪表工业];
学科分类号
0802 ;
摘要
Connected and automated vehicles (CAV) are increasingly recognized as a critical component of intelligent transportation systems (ITS), contributing to advances in transportation safety and mobility. However, the implementation of CAV in a real-world environment comes with various threats, and cybersecurity is among the most vulnerable. As the technology becomes more advanced and complex, it is essential to develop a comprehensive cybersecurity framework that can address these concerns. This research proposes a novel framework based on complexity theory and employs the fuzzy set qualitative comparative analysis (fsQCA) technique to identify combinations of security attacks that lead to achieving cybersecurity in CAV. Compared to structural equation modelling (SEM), the fsQCA method offers the advantage of demonstrating all possible ways to achieve the outcome. The study's findings suggest that in-vehicle networks and data storage security are the most crucial factors in ensuring the cybersecurity of CAV. The results can be useful for automotive designers in reducing the potential for attacks while developing secure networks.
引用
收藏
页码:484 / 508
页数:25
相关论文
共 55 条
  • [1] TAAWUN: a Decision Fusion and Feature Specific Road Detection Approach for Connected Autonomous Vehicles
    Alam, Furqan
    Mehmood, Rashid
    Katib, Iyad
    Altowaijri, Saleh M.
    Albeshri, Aiiad
    [J]. MOBILE NETWORKS & APPLICATIONS, 2023, 28 (02) : 636 - 652
  • [2] Cyber security challenges and solutions for V2X communications: A survey
    Alnasser, Aljawharah
    Sun, Hongjian
    Jian, Jing
    [J]. COMPUTER NETWORKS, 2019, 151 : 52 - 67
  • [3] Alsobeh Anas, 2023, Proceedings of the 2023 International Conference on Advances in Computing Research (ACR'23). Lecture Notes in Networks and Systems (700), P533, DOI 10.1007/978-3-031-33743-7_44
  • [4] Alwakeel AM, 2018, IEEE SOUTHEASTCON
  • [5] Security assessment of in-vehicle communication protocols
    Anwar, Akib
    Anwar, Anika
    Moukahal, Lama
    Zulkernine, Mohammad
    [J]. VEHICULAR COMMUNICATIONS, 2023, 44
  • [6] Trusted FPGA-based transport traffic inject, impersonate (I2) attacks beaconing in the Internet of Vehicles
    Appathurai, Ahilan
    Manogaran, Gunasekaran
    Chilamkurti, Naveen
    [J]. IET NETWORKS, 2019, 8 (03) : 169 - 178
  • [7] A survey on security attacks in VANETs: Communication, applications and challenges
    Arif, Muhammad
    Wang, Guojun
    Bhuiyan, Md Zakirul Alam
    Wang, Tian
    Chen, Jianer
    [J]. VEHICULAR COMMUNICATIONS, 2019, 19
  • [8] Bajpai J. N., 2016, URBAN PLANNING TRANS, V4, P83
  • [9] Forecasting Americans' long-term adoption of connected and autonomous vehicle technologies
    Bansal, Prateek
    Kockelman, Kara M.
    [J]. TRANSPORTATION RESEARCH PART A-POLICY AND PRACTICE, 2017, 95 : 49 - 63
  • [10] Automated Mobility-on-Demand vs. Mass Transit: A Multi-Modal Activity-Driven Agent-Based Simulation Approach
    Basu, Rounaq
    Araldo, Andrea
    Akkinepally, Arun Prakash
    Biran, Bat Hen Nahmias
    Basak, Kalaki
    Seshadri, Ravi
    Deshmukh, Neeraj
    Kumar, Nishant
    Azevedo, Carlos Lima
    Ben-Akiva, Moshe
    [J]. TRANSPORTATION RESEARCH RECORD, 2018, 2672 (08) : 608 - 618