2018
DOI: 10.1177/0361198118799012
|View full text |Cite
|
Sign up to set email alerts
|

Cybersecurity Attacks in Vehicle-to-Infrastructure Applications and Their Prevention

Abstract: A connected vehicle (CV) environment is composed of a diverse data collection, data communication and dissemination, and computing infrastructure systems that are vulnerable to the same cyberattacks as all traditional computing environments. Cyberattacks can jeopardize the expected safety, mobility, energy, and environmental benefits from connected vehicle applications. As cyberattacks can lead to severe traffic incidents, it has become one of the primary concerns in connected vehicle applications. In this pap… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
1
1

Relationship

1
8

Authors

Journals

citations
Cited by 29 publications
(9 citation statements)
references
References 21 publications
0
9
0
Order By: Relevance
“…This study adopted a security module for access control and credential management following the SCMS. The application security management is adopted based on security policies developed by Islam et al ( 18 ). Although this study considered the access control and credential management, and application security, the network security is not a focus of this study.…”
Section: Related Workmentioning
confidence: 99%
“…This study adopted a security module for access control and credential management following the SCMS. The application security management is adopted based on security policies developed by Islam et al ( 18 ). Although this study considered the access control and credential management, and application security, the network security is not a focus of this study.…”
Section: Related Workmentioning
confidence: 99%
“…Islam et al [14] propose a distributed DoS (DDoS) attack detection and prevention scheme called CVGuard in a V2I environment that uses a software-defined network (SDN), network functions virtualization (NFV), and edge computing. There are two parts of this scheme called micro box and CVGuard controller.…”
Section: Intrusion Detection Systemsmentioning
confidence: 99%
“…In [25], the authors assumed that connected vehicles are similar to all the Internet devices and cyber security should be considered as a fundamental part of their development.…”
Section: Related Workmentioning
confidence: 99%