2022
DOI: 10.31219/osf.io/68ugw
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

A Brief Summary of Cybersecurity attacks in V2X Communication

Abstract: Vehicles in the current era can communicate with other vehicles, roadside units, and networks. Thiscommunication is collaboratively called Vehicle to Everything(V2X) communication. V2X networkleverages modern communication technologies such as DSRC, LTE, and 5G communication. Along withthe leverages of these technologies, potential security threat has also increased. Cybersecurity attacksare the most common attacks that damage the V2X communication network. In this paper, we willreveal poetnetial cybersecurity… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
9
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(10 citation statements)
references
References 14 publications
0
9
0
Order By: Relevance
“…Physical layer authentication is based on test threshold in the hypothesis test, this is difficult for IoT devices to choose appropriate test threshold due to radio environment and unknown spoofing model. So, IoT devices can apply Reinforcement learning techniques like Q learning based authentication, which allows the device to reach optimal test threshold and improve utility and authentication accuracy [12,13]. Supervised learning techniques like Frank-Wolfe (dFW) and incremental aggregated gradient (IAG) can also be applied in IoT systems to improve the spoofing resistance.…”
Section: Learning Based Authentication Schemesmentioning
confidence: 99%
“…Physical layer authentication is based on test threshold in the hypothesis test, this is difficult for IoT devices to choose appropriate test threshold due to radio environment and unknown spoofing model. So, IoT devices can apply Reinforcement learning techniques like Q learning based authentication, which allows the device to reach optimal test threshold and improve utility and authentication accuracy [12,13]. Supervised learning techniques like Frank-Wolfe (dFW) and incremental aggregated gradient (IAG) can also be applied in IoT systems to improve the spoofing resistance.…”
Section: Learning Based Authentication Schemesmentioning
confidence: 99%
“…IoT combines various communication technologies at the lower layers of TCP/IP protocol stack and thusforth provides a complex heterogeneous network. The heterogeneity is introduced at physical layer of the IoT and then different amendments are made at data link layer, for instance special channel design and so forth, depending on the underlying physical layer technology [12]. There are different security issues in physical layer of IoT depending on the underlying technology, for instance in case of sensor nodes, physical attacks on sensor nodes must be mitigated [13].…”
Section: Physical (Phy) and Link Layer Security Issuesmentioning
confidence: 99%
“…With the improvement of privacy awareness, every institute is trying to develop solution to accomplish the increasing requirements of privacy safety [2][3][4][5]. The goal is to make privacy safe so that people can work easily without any privacy leakage.…”
Section: Introductionmentioning
confidence: 99%