Cyber security analysis of connected vehicles

Maria Drolence Mwanje,Omprakash Kaiwartya,Mohammad Aljaidi,Yue Cao,Sushil Kumar,Devki Nandan Jha,Abdallah Naser,Jaime Lloret
DOI: https://doi.org/10.1049/itr2.12504
IF: 2.7
2024-04-13
IET Intelligent Transport Systems
Abstract:The paper critically evaluates the CAV structure and component vulnerabilities, validates the identified attacks, and analyzes the trust‐based security solutions categorized according to the suggested trust taxonomy. The sensor‐enabled in‐vehicle communication and infrastructure‐centric vehicle‐to‐everything (V2X) communications have significantly contributed to the spark in the amount of data exchange in the connected and autonomous vehicles (CAV) environment. The growing vehicular communications pose a potential cyber security risk considering online vehicle hijacking. Therefore, there is a critical need to prioritize the cyber security issues in the CAV research theme. In this context, this paper presents a cyber security analysis of connected vehicle traffic environments (CyACV). Specifically, potential cyber security attacks in CAV are critically investigated and validated via experimental data sets. Trust in V2X communication for connected vehicles is explored in detail focusing on trust computation and trust management approaches and related challenges. A wide range of trust‐based cyber security solutions for CAV have been critically investigated considering their strengths and weaknesses. Open research directions have been highlighted as potential new research themes in CAV cyber security area.
engineering, electrical & electronic,transportation science & technology
What problem does this paper attempt to address?