424 research outputs found

    A comprehensive survey of V2X cybersecurity mechanisms and future research paths

    Get PDF
    Recent advancements in vehicle-to-everything (V2X) communication have notably improved existing transport systems by enabling increased connectivity and driving autonomy levels. The remarkable benefits of V2X connectivity come inadvertently with challenges which involve security vulnerabilities and breaches. Addressing security concerns is essential for seamless and safe operation of mission-critical V2X use cases. This paper surveys current literature on V2X security and provides a systematic and comprehensive review of the most relevant security enhancements to date. An in-depth classification of V2X attacks is first performed according to key security and privacy requirements. Our methodology resumes with a taxonomy of security mechanisms based on their proactive/reactive defensive approach, which helps identify strengths and limitations of state-of-the-art countermeasures for V2X attacks. In addition, this paper delves into the potential of emerging security approaches leveraging artificial intelligence tools to meet security objectives. Promising data-driven solutions tailored to tackle security, privacy and trust issues are thoroughly discussed along with new threat vectors introduced inevitably by these enablers. The lessons learned from the detailed review of existing works are also compiled and highlighted. We conclude this survey with a structured synthesis of open challenges and future research directions to foster contributions in this prominent field.This work is supported by the H2020-INSPIRE-5Gplus project (under Grant agreement No. 871808), the ”Ministerio de Asuntos Económicos y Transformacion Digital” and the European Union-NextGenerationEU in the frameworks of the ”Plan de Recuperación, Transformación y Resiliencia” and of the ”Mecanismo de Recuperación y Resiliencia” under references TSI-063000-2021-39/40/41, and the CHIST-ERA-17-BDSI-003 FIREMAN project funded by the Spanish National Foundation (Grant PCI2019-103780).Peer ReviewedPostprint (published version

    Towards Cyber Security for Low-Carbon Transportation: Overview, Challenges and Future Directions

    Full text link
    In recent years, low-carbon transportation has become an indispensable part as sustainable development strategies of various countries, and plays a very important responsibility in promoting low-carbon cities. However, the security of low-carbon transportation has been threatened from various ways. For example, denial of service attacks pose a great threat to the electric vehicles and vehicle-to-grid networks. To minimize these threats, several methods have been proposed to defense against them. Yet, these methods are only for certain types of scenarios or attacks. Therefore, this review addresses security aspect from holistic view, provides the overview, challenges and future directions of cyber security technologies in low-carbon transportation. Firstly, based on the concept and importance of low-carbon transportation, this review positions the low-carbon transportation services. Then, with the perspective of network architecture and communication mode, this review classifies its typical attack risks. The corresponding defense technologies and relevant security suggestions are further reviewed from perspective of data security, network management security and network application security. Finally, in view of the long term development of low-carbon transportation, future research directions have been concerned.Comment: 34 pages, 6 figures, accepted by journal Renewable and Sustainable Energy Review

    A VANET privacy protection scheme based on fair blind signature and secret sharing algorithm

    Get PDF
    Vehicular ad hoc network (VANET) is a traffic application of wireless sensor network, which is also a new mobile ad hoc networks composed of vehicle nodes, roadside units, service providers and other components. In VANET, data is transmitted by the wireless channel, which is subject to potential threat like information leak and data attack due to the openness and sensitivity of the auto organization network itself. How to ensure the identity privacy and trusted communication in VANETs is the key issue to be solved urgently. The existing work usually uses authentication mechanism, but the user’s privacy disclosure is inevitable during the authentication process. Some anonymous authentication schemes have been proposed to solve the problem of privacy disclosure regardless of considering anonymity abuse. However, anonymity abuse is also severe in VANET. In view of the above problems, this paper proposes a scheme based on fair blind signature and secret sharing algorithm. By security analysis and experiment, the scheme has been proved to be higher anonymity and higher efficiency

    An Efficient Black-hole and Worm-hole Attacks Resilient Scheme for Cloud and Fog-Assisted Internet of Vehicles

    Get PDF
    The Internet of Vehicles IoV is a distributed network that supports the use of data created by connected cars and vehicular ad-hoc networks VANETs for real-time communication among the vehicles and other infrastructures in the network Although IoV increases safety and efficient information exchange in transportation its inter-connectivity exposes the vehicles and the people to different cyber-attacks such as black-hole and worm-hole which are capable of disrupting the network In this paper we identify the black-hole and worm-hole attacks as the major security threats to the IoV technology We then propose periodic-time slicing and trust factor approaches to detect and prevent a black-hole attack and a cryptography procedure to prevent other IoV related cyber-attack

    VSPN: VANET-based Secure and Privacy-preserving Navigation

    Get PDF
    postprin
    corecore