2022
DOI: 10.3390/su14095211
|View full text |Cite
|
Sign up to set email alerts
|

An Overview of Vehicular Cybersecurity for Intelligent Connected Vehicles

Abstract: Cybersecurity is one of the most important challenges in the intelligent connected vehicle system. Interconnected vehicles are vulnerable to different network security attacks, which endanger the safety of passengers. This review paper firstly analyses the reasons why the current vehicle network is vulnerable to network attack and summarizes the three implementation methods of network security threats. The necessity of vehicle network security research and deployment is also analyzed. After giving a short intr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
11
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(11 citation statements)
references
References 52 publications
0
11
0
Order By: Relevance
“…Several studies [104][105][106] have explored how AI tools can augment the capabilities and scope of intelligent and electric vehicles by enabling adaptive predictive functions. Additionally, cyber security concerns are gaining prominence, particularly as vehicles become increasingly connected to infrastructure like buildings [107,108].…”
Section: Intelligent Vehicles (Ivs) and Autonomous Vehicles (Avs)mentioning
confidence: 99%
“…Several studies [104][105][106] have explored how AI tools can augment the capabilities and scope of intelligent and electric vehicles by enabling adaptive predictive functions. Additionally, cyber security concerns are gaining prominence, particularly as vehicles become increasingly connected to infrastructure like buildings [107,108].…”
Section: Intelligent Vehicles (Ivs) and Autonomous Vehicles (Avs)mentioning
confidence: 99%
“…The issue of concern is whether all this information gathered by the trust mechanisms/or models is private. To solve such concerns studies in [42,[80][81][82][83][84][85][86][87][88][89] have proposed trust mechanisms that make use cryptography techniques despite the high computational resource requirement [10]. This raises the issue of whether privacy solutions in connected vehicles can be implemented without cryptography if not then there is need to minimize resource usage.…”
Section: Privacymentioning
confidence: 99%
“…The research efforts detailed in [9] recommend the deployment of cryptography and non-cryptography mechanisms, such as trust-based techniques, which are a tradeoff between performance and time [10]. The cryptographic mechanisms are strong and efficient against external attacks.…”
Section: Introductionmentioning
confidence: 99%
“…Its functionalities [5] encompass information sharing, vehicle safety management, condition monitoring, driving behavior analysis, real-time traffic management as well as intelligent road network planning. Despite its potential for significant enhancements in vehicle safety standards along with improved driving comfort and energy efficiency levels; however, VANETs's widespread adoption necessitates addressing concerns related to communication security and vehicle privacy [6][7][8][9].…”
Section: Introductionmentioning
confidence: 99%