Living in the Internet of Things: Cybersecurity of the IoT - 2018 2018
DOI: 10.1049/cp.2018.0046
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Security Standards and Issues in V2X Communications for Internet of Vehicles

Abstract: Significant developments have taken place over the past few years in the area of vehicular communication systems in the ITS environment. It is vital that, in these environments, security is considered in design and implementation since compromised vulnerabilities in one vehicle can be propagated to other vehicles, especially given that V2X communication is through an ad-hoc type network. Recently, many standardisation organisations have been working on creating international standards related to vehicular comm… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 31 publications
(14 citation statements)
references
References 4 publications
0
14
0
Order By: Relevance
“…2) Harmonization Efforts: There were two harmonization task groups (HTG) established by the United States and Europian international standards harmonization working group [48]: (a) HTG1 -to harmonize security standards [36]. The harmonization efforts were completed in 2013 [49] and the reports/recommendations are publicly available online [50], [51].…”
Section: B Standardization Efforts For V2x Securitymentioning
confidence: 99%
“…2) Harmonization Efforts: There were two harmonization task groups (HTG) established by the United States and Europian international standards harmonization working group [48]: (a) HTG1 -to harmonize security standards [36]. The harmonization efforts were completed in 2013 [49] and the reports/recommendations are publicly available online [50], [51].…”
Section: B Standardization Efforts For V2x Securitymentioning
confidence: 99%
“…Cellular: The intelligent vehicles are currently equipped with cellular network technologies such as LTE,3G,4G and now 5G [20] and consequently, they can communicate to either another vehicle (V2V) or the infrastructure (V2I) at long distances on the scale of miles [54]. Cellular networks, on the other hand, are prone to eavesdropping and jamming attacks [56].…”
Section: Remote Keyless Entry (Rke)mentioning
confidence: 99%
“…According to ETSI TC ITS [8,9], the security in VANETs must consider authentication, integrity, non-repudiation, privacy, confidentiality, authorization, real-time constraints and availability. Scenarios with VANETs and IoT must take into account special requirements such as low computational overhead and low communication overhead.…”
Section: Related Workmentioning
confidence: 99%