2023
DOI: 10.1109/ojcoms.2023.3239115
|View full text |Cite
|
Sign up to set email alerts
|

A Comprehensive Survey of V2X Cybersecurity Mechanisms and Future Research Paths

Abstract: Recent advancements in vehicle-to-everything (V2X) communication have notably improved existing transport systems by enabling increased connectivity and driving autonomy levels. The remarkable benefits of V2X connectivity come inadvertently with challenges which involve security vulnerabilities and breaches. Addressing security concerns is essential for seamless and safe operation of mission-critical V2X use cases. This paper surveys current literature on V2X security and provides a systematic and comprehensiv… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
27
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
8
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 30 publications
(27 citation statements)
references
References 355 publications
0
27
0
Order By: Relevance
“…V2X uses radio transmissions to maintain communication between vehicles, this allows a malicious node to easily inflict itself on the network. In order to deal with these malicious nodes and the attacks previously mentioned, several security mechanisms have been adopted [24,25].…”
Section: Mechanisms Of Security In Vehicular Communicationsmentioning
confidence: 99%
“…V2X uses radio transmissions to maintain communication between vehicles, this allows a malicious node to easily inflict itself on the network. In order to deal with these malicious nodes and the attacks previously mentioned, several security mechanisms have been adopted [24,25].…”
Section: Mechanisms Of Security In Vehicular Communicationsmentioning
confidence: 99%
“…V2V communications will allow the sharing of real-time information about AD vehicle planned maneuverers and trajectories to provide smoother driving comfort [ 111 , 136 , 137 , 138 , 139 ]. The advantage of vehicle-to-everything (V2X) communication systems is access to broad information from V2I and other V2V and access to computing and data resources in the vehicle-to-cloud (V2C) systems; the disadvantages of such systems are strict latencies for real-time operations [ 140 ] and cybersecurity [ 141 ]. Cyberattacks could create serious safety issues and lead to accidents, posing a physical threat to users or passengers [ 142 ].…”
Section: Common Controller Layout For Automated Vehiclesmentioning
confidence: 99%
“…And all the platforms and links of the system need to be properly secured in order to prevent data to go to nonauthenticated hands, and keep the data as it should be. Security assessment and development of solutions for mission-critical applications such as vehicle-to-everything connectivity that enables extended situational awareness via use of sensors of other connected vehicles is an active research area [50], [51]. In industrial IoT applications requirements include scalability to large-scale networks, low latency, and advanced and robust security measures [52].…”
Section: E Connectivity and Cybersecuritymentioning
confidence: 99%