2020
DOI: 10.1109/tiv.2020.2987430
|View full text |Cite
|
Sign up to set email alerts
|

Securing Vehicle-to-Everything (V2X) Communication Platforms

Abstract: Modern vehicular wireless technology enables vehicles to exchange information at any time, from any place, to any network -forms the vehicle-to-everything (V2X) communication platforms. Despite benefits, V2X applications also face great challenges to security and privacy -a very valid concern since breaches are not uncommon in automotive communication networks and applications. In this survey, we provide an extensive overview of V2X ecosystem. We also review main security/privacy issues, current standardizatio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
84
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
2
2

Relationship

0
10

Authors

Journals

citations
Cited by 175 publications
(84 citation statements)
references
References 136 publications
(238 reference statements)
0
84
0
Order By: Relevance
“…In almost all security papers in V2X services, simulation conditions vary a lot. Most of the papers conduct their simulation under a specific scenario, which may not be typical, or may result in unfair comparisons [135]. Thus, determine a general simulation platform that contains typical vehicular network scenarios and V2X uses cases is in great need to provide fair evaluations and comparisons.…”
Section: Simulation Platformmentioning
confidence: 99%
“…In almost all security papers in V2X services, simulation conditions vary a lot. Most of the papers conduct their simulation under a specific scenario, which may not be typical, or may result in unfair comparisons [135]. Thus, determine a general simulation platform that contains typical vehicular network scenarios and V2X uses cases is in great need to provide fair evaluations and comparisons.…”
Section: Simulation Platformmentioning
confidence: 99%
“…For example, in a car park scenario, a vehicle can share false information about car parking space availability in a particular area to deceive other vehicles (mis-)leading them to search alternative areas, in order to enhance its own chance of getting a parking space in preferred areas. This is different from but related to the issues of message tampering and data trust in vehicle-to-vehicle communications [6], and false data injection or false event notification attacks [7].…”
Section: Introductionmentioning
confidence: 91%
“…Basically, the attacker models will exploit the vulnerabilities in vehicular systems by accessing physical or remote attack surfaces to execute security attacks. The attacks may create on RSUs or other physical attack surfaces such as vehicular external interfaces OBUs via Electronic Control Units (ECUs) [33].…”
Section: A Security Threatsmentioning
confidence: 99%