2021 International Symposium on Computer Science and Intelligent Controls (ISCSIC) 2021
DOI: 10.1109/iscsic54682.2021.00037
|View full text |Cite
|
Sign up to set email alerts
|

Security assessment in Vehicle-to-Everything communications with the integration of 5G and 6G networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 26 publications
0
4
0
1
Order By: Relevance
“…Another meaningful direction is to integrate traffic knowledge into Machine Learning models for cyberattack detection/prediction and proactive defence. Last but not the least, the proposed cyberattacks should be further evaluated using more security performance metrics, such as availability, authentication, reliability, confidentiality, integrity, robustness and trustworthiness [49]. More results and findings will be provided in the subsequent publications.…”
Section: Discussionmentioning
confidence: 99%
“…Another meaningful direction is to integrate traffic knowledge into Machine Learning models for cyberattack detection/prediction and proactive defence. Last but not the least, the proposed cyberattacks should be further evaluated using more security performance metrics, such as availability, authentication, reliability, confidentiality, integrity, robustness and trustworthiness [49]. More results and findings will be provided in the subsequent publications.…”
Section: Discussionmentioning
confidence: 99%
“…The study [24] is a security assessment of V2X integration with 6G networks. However, it does not systematically cover the complete security architecture such as countermeasures and intrusion detection systems etc.…”
Section: A Related Previous Surveys / Reviews In the Literaturementioning
confidence: 99%
“…The authors in [8] offer a security assessment for the evolution of Vehicle-to-Everything Communications (V2X-C) architecture and the integration of 5G and 6G networks. They also provide a comparison of the Quality of Service (QoS) versus security provisions for Connected and AV (CAVs) and illustrate the safety and security enhancement mechanisms for V2X-C. A deep CNN-LSTM architecture is proposed in [9] for CAV intelligence threats and compared with other deep learning algorithms such as DNN, CNN, and LSTM.…”
Section: Literature Reviewmentioning
confidence: 99%