Security Issues of Autonomous and Connected Vehicles: Comparison
Please note this is a comparison between Version 2 by Jason Zhu and Version 3 by Jason Zhu.

Connected and Autonomous Vehicles (CAVs) combine technologies of autonomous vehicles (AVs) and connected vehicles (CVs) to develop quicker, more reliable, and safer traffic. Artificial Intelligence (AI)-based CAV solutions play significant roles in sustainable cities. The convergence imposes stringent security requirements for CAV safety and reliability. In practice, vehicles are developed with increased automation and connectivity. Increased automation increases the reliance on the sensor-based technologies and decreases the reliance on the driver; increased connectivity increases the exposures of vehicles’ vulnerability and increases the risk for an adversary to implement a cyber-attack. Much work has been dedicated to identifying the security vulnerabilities and recommending mitigation techniques associated with different sensors, controllers, and connection mechanisms, respectively. 

  • artificial intelligence
  • autonomous vehicles
  • connected vehicles
  • CAV

1. Introduction

CAVs effectively combine technologies of sensor-based autonomous vehicles and communication-based connected vehicles, and it is anticipated that the convergence will greatly improve safety and reduce cost, emissions, and energy consumption, and change the way they are operated today. Currently, vehicles are being developed with increasing levels of connectivity and automation. Many new vehicles and aftermarket systems are already at Level 2 and approaching Level 3 and provide partially autonomous capability [1]. However, with the ascendance of CAVs, drivers undertake less control and management of the vehicle; increased automation exacerbates the security risk by increasing the possibilities for adversaries to implement a successful attack. Meanwhile, the increased connectivity of the vehicles increases the exposure of potential vulnerabilities and paves avenues for cyber-attacks. The development of CAV is inevitably facing great security threats and attack risks.
In early stages, manual vehicles are not equipped with much connectivity to the outside, therefore, hackers must have physical access to the vehicle, which causes great difficulty for hackers to perform the attack. In [2][3], the reseauthorchers showed that they could use wired connections to the vehicle to manipulate the vehicle, such as controlling the display dashboard, killing the engine, disturbing the steering, etc. However, the demonstrations do not attract much attention from the audience. In recent years, the advancement in AV technology allows diverse types of sensors to be installed on the vehicle to assist human driving. For example, Google’s driverless car utilizes more than 10 types of sensors to move autonomously on the road. However, sensors are easily affected by noise and fooled by malicious attacks, which can cause danger and accidents [4][5]. Due to people’s concerns regarding the AV reliance, many efforts have been dedicated to the studies of AV security and safety issues.
As AVs have evolved, many types of wireless connectivity technologies have been installed on the vehicle, such as Bluetooth, keyless remote entry, telematics connected to the internet, and VANET, etc. The increased connectivity not only provides more convenience and better safety for the driver, but also speeds up the development of subsequent automation. However, the expansion of vehicle connectivity exposes more vulnerabilities of the vehicle and increases the opportunities for attackers to implement cyber-attacks. Paper [6] showed that a vehicle can be compromised through a Bluetooth connection meters away from the vehicle. In [3], the reseauthorchers showed that the attackers successfully hacked an unaltered Jeep Cherokee through the cellular network and then controlled the vehicle’s critical functions remotely, such as disabling the brakes and steering, etc. In [4], the reseauthorchers investigated potential cybersecurity threats to both individual automated vehicles and cooperative automated vehicles. In [5], the reseauthorchers surveyed cyber threats facing CAVs from three aspects of vehicles, human, and connection infrastructure. Recently, with the flourishing and advancement of IoT and sensing networks, the CAV and even Internet of Vehicles are deeply involved in intelligent transportation and smart city development. Thus, Paper [7] provided detailed analyses on characteristics, architecture, and challenges of intelligent transportation systems. Paper [8] comprehensively investigated how the smart city development imposes precedented security and privacy challenges on intelligent transportation and intelligent infrastructures, such as smart parking, intelligent navigation, and electrical vehicle charging, which illustrates the obstacles of widely deploying CAVs.

2. Security Issues Facing AVs and Solutions

2.1. Sensors

The type and functionality of a sensor determines the extent to which it could contribute to scoping out secure threats, as well as the extent to which it could inform potential implications should it be compromised [5].  For partially autonomous vehicles, sensors only assist the driver to obtain some information and the vehicle is still monitored and controlled by the driver. Even for Google’s driverless car that operates autonomously at most times, the driver will take over of control immediately if the automation system cannot process dangerous situations. Therefore, the impact of attacks on these sensors may be mitigated by the driver’s surveillance or management. Even so, autonomous vehicles significantly depend on these various types of sensors to perceive the surroundings and the status of the vehicles to assist driving or automatically drive by itself. For example, Paper [9] utilized multiple sensors such as radar, LIDAR, and cameras to perform autonomous lane changing. Paper [10] research vision-based autonomous driving systems. Paper [11] proposes an effective empirical formula solution to assist autonomous driving in a GPS-denied environment. Paper [12] provide a survey on intelligent tires for tire–road interaction recognition. Paper [13] proposed a localization system for autonomous driving using gyroscopes and accelerometers. In the future, fully autonomous vehicle will completely operate without driver involvement. Thus, attacks on these sensors will cause serious issues, and calls for more attention.

2.2. In-Vehicle Network

In-vehicle networks are composed of diverse types of bus systems, mainly including CAN, LIN, FlexRay, and MOST. Due to the specific characteristics of each type of bus system, each type possesses distinct vulnerabilities [14]. These bus systems connect diverse types of ECUs together, therefore, any type of bus controller can send messages to any other existing ECU. Among these bus systems, the CAN bus works as the backbone of the in-vehicle network to receive many control messages and deliver them to the corresponding ECU. Therefore, reseauthorchers analyzed the security issues of CAN. Typically, the CAN bus can be categorized into two types: CAN-C and CAN-HIS buses; each of them is designed with distinct functions. Due to the lack of encryption, authentication, and authorization on the CAN bus, all messages on the bus are transmitted in plaintext; neither source or destination address is included in the message format. Therefore, attacks on the CAN bus include eavesdropping and traffic analysis, jamming and DoS, and malicious modification or injection. For attacks aimed at manipulating certain functions of a vehicle, such as steering and braking, the attacker needs access to the CAN bus and to modify messages on the CAN bus or directly inject malicious messages into the bus. In the past, the in-vehicle system was sealed from the outside and the CAN bus can only be accessed on special occasions with the help of special tools; for example, the maintenance technician uses an OBD-II scanner to diagnose the system. Recently, the increased connectivity of vehicles increased the chances that the in-vehicle network is accessed, which exposed the CAN bus to more types of attacks. For example, the attack successfully accessed the CAN bus and sent messages on the bus remotely from the cellular connection [3]. Much work has been undertaken to boost CAN bus security. Generally, these measures can be categorized into two types: (1) cryptography [14][15][16][17], which originated from (a) controller authentication and (b) message encryption; and (2) firewall and physical separation. (1a) Authentication requires that only authorized controllers can communicate over the bus systems. A general way to ensure authentication combining unsymmetrical and symmetric keys is presented in [14]. (1b) Encryption of the CAN message typically involves the data field [17]. The sender and receiver ECUs synchronously manage a sequence number. The sender can use the number and encryption algorithm, such as AES-128, to generate cipher text. After receiving the message, the receiver can decrypt the message and verify the source. In practice, implementing a real-time cryptographic solution can cause an overhead of extra computation and data transfer time. Thus, a clear trade-off between security, functionality, and efficiency should be taken into consideration. (2) Firewall and physical separation. An effective way to prevent malicious attacks through an OBD-II port is to set up a firewall on the central gateway to filter the outside communication between the port and inside network [18][19]. However, implementation of a firewall usually requires more cost, and results in communication overhead, which should be within the consideration of the design. Physically separating the infotainment system from the main system inside networks can prevent certain types of attacks. The messages as well as the multimedia interfaces should be forbidden from interfering with the main system during normal driving operation. However, considering that several functions and components cooperate with each other to implement a complicated module, concerns regarding separation exist that the complicated operations on vehicles will be impacted.

2.3. Electronic Control Unit (ECU)

The ECU is a kind of embedded system in a vehicle used to monitor the real-time state of the corresponding component and feedback the status parameters to the bus system. Meanwhile, the ECU processes the information exchanged from the bus system and takes control of operations to adapt the vehicle’s behavior. The number of ECUs ranges from about 40 in compact cars to about 90 in luxury cars. According to their functions, ECUs are loosely categorized into four types: powertrain, chassis, infotainment, and body control [20]. There are some key ECUs, such as EBCM, playing a critical role in manipulating a vehicle’s behavior; compromising them will directly kill the vehicle and endanger the driver’s safety [21]. In practice, many ECUs are coupled with each other to achieve some complicated control functions [5]. Thus, attacking a single ECU has the potential to impact large control functionality of the vehicle. Attacks on ECUs might result from compromising a vehicle’s sensor network or exploiting the control module directly through diverse types of connectivity. As Paper [22] provided, a comprehensive guide of ECU vulnerabilities regarding different attack surfaces exist in many popular vehicles in the U.S. Specific attacks on ECUs include fuzzing, phishing, DoS [5], etc. A fuzzing attack aims at finding vulnerabilities by sending random packets to the ECU. Phishing attacks involve masquerading a trusted entity to gain sensitive information and compromise the system. The driver might be tricked by the phisher into flashing the firmware, which will cause permanent damage. In most cases, a fuzzing attack is the first step in creating a phishing attack. Typically, ECUs are configured when a vehicle is manufactured, and have a long lifetime. Therefore, other exploits on ECUs involve overwriting firmware and flashing ECU [21]. The firmware can be modified or replaced by performing a physical and valid update via an OBD port. Recently, an ECU update over the air (OTA) has been proposed [23][24], which would expose more security risks.

3. Security Issues Facing CVs and Solutions

CVs adopt wireless communication to allow vehicles, roadside units, and mobile devices to communicate with each other and exchange critical information. In essence, CV is a kind of distributed system and imposes severe security and privacy challenges. It is anticipated that vehicle connectivity coupled with AV will revolutionize transportation systems, improve safety, and reduce costs, emissions, and energy consumption. In fact, the adoption of diverse types of vehicle connectivity on AV enables the exposure of potential vulnerabilities of the vehicle and results in a heightened risk of cyber-attacks on the CAV.

3.1. Bluetooth

Bluetooth is a type of short-range communication (typically tens of meters) and was proposed to be applicable for the communications of CVs in some certain situations. For example, at a traffic intersection, Bluetooth can be used for connecting vehicle communication to avoid potential accidents [26]. Another scene is that Bluetooth may be applicable to V2P communication due to its low energy consumption, considering that pedestrian users in V2P usually have the limit on power saving of the device. However, as Bluetooth is natively developed for short-range low-speed transmission, it would be challenging when it is applied in highly mobile vehicles’ communication, which has the requirements of high transmission data. In recent years, a few techniques have even been used to enhance the security of Bluetooth communication, including frequency hopping, a pre-shared key for authentication, and encryption [27]. Even so, some security risks cannot be avoided, yet, when Bluetooth is used in vehicles’ connectivity. In nature, how to handle the native security risks caused by the frequent iteration, various versions of Bluetooth, and pairing methods would be challenging. As a matter of fact, the reason why Bluetooth is so convenient to use in the first place is that it constantly broadcasts information such that nearby devices can be alerted to its presence. Thus, setting the Bluetooth device to “undiscoverable” mode would be a securer measure. Bluetooth devices can form piconets, and multiple piconets through sharing the same devices can join to form a scatternet. If an entity is compromised, it is possibly going to infect other piconets or the scatternet, which finally damages multiple entities in the V2X connection. In addition, the MAC address of a Bluetooth device is usually unique and traceable, which may expose the vehicle to traceability attacks [6]. Even though a Bluetooth PIN is used between the paired Bluetooth devices to implement authentication, it is vulnerable to brute-force decryption, interception, and injection of a fake PIN [28]. What is worse, the compromised device can inject malicious messages into the paired vehicle and damage its functions. In [29], the reseauthorchers showed how a user device connected to a vehicle through Bluetooth launches an attack on the vehicle. In [30][31], the reseauthorchers investigated how Bluetooth-enabled devices are extremely vulnerable within and beyond the vehicle domain.

3.2. Wi-Fi

As another type of short range communication, Wi-Fi satisfies some types of V2X communications with the advantages of low cost and the ease of deployment [32]. In [33], Wi-Fi and WiMax provide viable solutions for V2V and V2I communications. Some reseauthorchers even suggested using Wi-Fi directly to facilitate the relaying of information from one vehicle to another [34][35][36]. The built-in Wi-Fi module or Wi-Fi enabled mobile device in a vehicle allows the vehicle to approach the internet when it is moving into the coverage of Wi-Fi hotspots, which is referred as the Drive-Through Internet. With the increasing deployment of the urban-scale WLAN (i.e., Google Wi-Fi in the city of Mountain View), the Drive-Through Internet would rapidly increase, which could provide a complementary solution to V2X with low cost. In actual design, some technologies are applied to enhance Wi-Fi capabilities to fit the high-speed and secure requirements of vehicular communications, such as Multiple-Input Multiple-Output (MIMO). Recent advances in Passpoint/Hotspot 2.0 provide Wi-Fi with some secure connectivity [37], which makes Wi-Fi more competitive in V2X communications. Even so, Wi-Fi was not originally designed for a high-mobility environment; the stringent V2X service requirements impose some challenges on the reliability, robustness, and security of Wi-Fi-based V2X connectivity [38][39]. In terms of security, high vehicle mobility yields a very short connect time to the AP, while Wi-Fi communication usually requires a long establishing procedure. Time spent in Wi-Fi association, authentication, and IP configuration before actual data transmission cannot be negligible. For instance, if cryptography (i.e., Wi-Fi Protected Access, WPA) is applied in Wi-Fi communication, it will generate a considerable delay, up to 250ms, which is fatal to the safety-related application in VANET. In addition, Wi-Fi is typically set as the “discoverable” mode for users’ search and connection as Bluetooth, thus, it requires a large bandwidth to guarantee the high transmission, which provides opportunities for attackers to launch attacks such as cracking, DoS, and karma attack [40]. Especially, with security-enhanced WAP2 being cracked recently [18], it must raise more attention and research efforts to enable Wi-Fi in connected vehicles’ communication.

3.3. Cellular Network

Cellular networks are considered a potential source that can guarantee the mobility and seamless connection in V2V and V2I. Existing solutions to connect vehicles together through widely deployed cellular infrastructure can be divided into two modes: brought-in and built-in [39]. The brought-in connectivity refers to that users in a vehicle tether their own smart phone to the vehicle’s infotainment system such that the vehicle gains immediate access to the internet and some duplicate functions of a smartphone. Incidentally, built-in connectivity integrates the cellular module into a vehicle’s on-board infotainment system, and the internet connection relies on a built-in module. C-V2X is a part of the overall 3GPP process to advance cellular systems from 4G to 5G technologies. Starting from Release 14 published by 3GPP, the LTE Direct and LTE broadcast laid the foundation for C-V2X, while after Release 16+, the 5G technology built new capabilities for C-V2X networks and augmented C-V2X direct communications over time [41][42]. As Khanh, Quy Vu et al. highlighted in [43], the power of 5G enables cellular and mobile communication networks to connect to hundreds of billions of devices with extreme-high throughput and extreme-low latency, including IoT, smart-connected vehicles, smart cities, smart agriculture, smart retail, and intelligent transportation systems. Built on many existing cellular infrastructures, the C-V2X service covers large areas, and has a high penetration rate and low cost to potentially support the high-bandwidth demands and QoS-sensitive requirements of vehicular applications. C-V2X defines multi-types of services, including V2V, V2P and V2I, and V2N, and two modes of transmission, including network-based communication and direct communication [44]. It is also designed for both in-coverage and out-of-coverage services. C-V2X direct communications can support active safety and enhance situational awareness by detecting and exchanging information using low-latency transmission in the 5.9 GHz ITS band for vehicle-to-vehicle (V2V) as well as V2I and V2P scenarios. In practice, C-V2X needs to address some technical challenges, such as a high Doppler effect, resource scheduling, and synchronization [45].

3.4. VANET

3.4.1. Efficient Authentication with Privacy Preservation and Key Management in Group Signature

Authentication is the primary step to ensure security in VANET, and much existing work proposed different techniques to provide authentication in VANET [19][52][53][54]. Usually, the symmetric key method is significantly faster than the digital signatures; however, the symmetric key method cannot provide non-repudiation [55]. Unsymmetrical keys can provide authentication and non-repudiation, but they may cause computation complexity and communication overhead [56], as well as privacy exposure [57]. Therefore, efficient unsymmetrical authentication with privacy preservation is needed. In recent years, group signature has been applied in VAENT to protect a vehicle’s anonymity besides authentication [58][59]. The main limitation of this approach is the computation complexity and communication overhead to distribute group keys [59][60]. In addition, a manager is needed to distribute the key to a new member when it joins the group or revoke the key when the member leaves. Invalid and malicious signers should be identified in time, while forward privacy should be protected at the same time [61][62]. Therefore, how to manage the key in a group signature is still challenging.

3.4.2. Privacy Protection and Effective Pseudonym Change Strategy

Privacy protection (e.g., vehicle’s location and trajectory) has been a top challenge in VANET [63]. Many approaches have been proposed to implement effective strategies of pseudonym changing [64][65][66][67][68]. However, the simple changing of a pseudonym is not sufficient to defend against pseudonym linking attacks, especially semantic linking, which can predict the next position of a vehicle and link the vehicle’s new pseudonym and the original one [69]. Currently, encryption or radio silence is suggested to defend against the semantic linking attack. However, encryption is ineffective against internal passive adversaries [64], and radio silence may negatively affect safety-related applications in VANET [70]. Therefore, a highly effective and reliable pseudonym change strategy is still needed to protect a vehicle’s privacy from semantic linking attack. In addition, a unified framework and metric is needed to quantify the privacy protection level, which will contribute to evaluating new privacy protection mechanisms [71][72][73].

3.4.3. Trust Management and Enhancement

Trust usually works as a complementary defense to cryptography in some specific situations. Specifically, trust mainly deals with inside attackers (e.g., passive attacks) and has little negative impact on message treatment and transmission delays, and thus, can be applied in both delay-sensitive and delay-tolerant traffic [74][75]. Even so, some issues should be considered when applying trust management in VANET security. Most exiting models assume that the adversary has stable and continuous behavior. However, smart attacks (e.g., an insider user becomes malicious) may become aware of the trust rule and can alternate between legal and illegal behaviors. Therefore, new trust models should adaptively detect such types of ‘unstable’ dishonest behaviors or entities. On the other hand, how to handle the location and identity privacy while ensuring efficient and reliable message dissemination is still one of the open issues in existing models [74].

3.4.4. RSU Assisted Security and RSU Power Abuse

Within the communication range of an RSU, multiple vehicles nodes may communicate with its neighbors via V2V or via V2I through RSU. As a result, the nodes will contend for the radio resources of the single RSU. When traffic density and message dissemination increase, the RSU may become saturated. Therefore, it is critical to make the communication near the RSU both secure and scalable. In practice, a challenging scheduling problem arises when RSU serves as a centralized scheduler for all the nodes within its coverage. On the other hand, RSU will possess great power to allocate resources to different nodes. It registers much private and secure information of each node within its range. Therefore, valid measures should be taken to block the power abuse of RSU, to prevent RSU from unfairly allocating resources to a certain node, and to maliciously invade or disclose the privacy of a node within its range. Either C-V2X or VANET represents a promising solution to support V2X communication. At the moment, VANET has the advantage. The 5.9 GHz band made available in the U.S. more than a decade ago remains reserved for it, the EU also intended to make 802.11p the basis of the radio standard for safety-related messages between vehicles within ITS-G5. However, Qualcomm, which supports DSRC and offered second-generation 802.11p DSRC chips in the past, introduced its first C-V2X commercial solution in 2017; China appears ready to mandate C-V2X for C-ITS and safety-related services. No matter which one will become the standard to support V2X finally, the security issues in both types of networks should be well considered before they are widely developed to support CAV application.

References

  1. NHTSA. SAE Define 5 Levels of Vehicle Automation. Available online: https://www.sema.org/sema-enews/2017/11/ettn-tech-alert-nhtsa-sae-define-5-levels-of-vehicle-automation (accessed on 19 May 2022).
  2. Koscher, K.; Czeskis, A.; Roesner, F.; Patel, S.; Kohno, T.; Checkoway, S.; McCoy, D.; Kantor, B.; Anderson, D.; Shacham, H.; et al. Experimental Security Analysis of a Modern Automobile. In Proceedings of the 2010 IEEE Symposium on Security and Privacy, Oakland, CA, USA, 16–19 May 2010; pp. 447–462.
  3. Chris, V.; Charlie, M. Remote Exploitation of an Unaltered Passenger Vehicle. White Paper. 2015; p. 93. Available online: https://illmatics.com/Remote%20Car%20Hacking.pdf (accessed on 8 August 2022).
  4. Petit, J.; Shladover, S.E. Potential cyberattacks on automated vehicles. IEEE Trans. Intell. Transp. Syst. 2015, 16, 546–556.
  5. Parkinson, S.; Ward, P.; Wilson, K.; Miller, J. Cyber Threats Facing Autonomous and Connected Vehicles: Future Challenges. IEEE Trans. Intell. Transp. Syst. 2017, 18, 2898–2915.
  6. Checkoway, S.; McCoy, D.; Kantor, B.; Anderson, D.; Shacham, H.; Savage, S.; Koscher, K.; Czeskis, A.; Roesner, F.; Kohno, T. Comprehensive Experimental Analyses of Automotive Attack Surfaces. In Proceedings of the USENIX Security Symposium, San Francisco, CA, USA, 8–12 August 2011.
  7. Quy, V.K.; Nam, V.H.; Linh, D.M.; Ban, N.T.; Han, N.D. Communication Solutions for Vehicle Ad-hoc Network in Smart Cities Environment: A Comprehensive Survey. Wirel. Pers. Commun. 2022, 122, 2791–2815.
  8. Zhang, K.; Ni, J.; Yang, K.; Liang, X.; Ren, J.; Shen, X.S. Security and privacy in smart city applications: Challenges and solutions. IEEE Commun. Mag. 2017, 55, 122–129.
  9. Péter, G.; Kiss, B.; Tihanyi, V. Vision and odometry based autonomous vehicle lane changing. ICT Express 2019, 5, 219–226.
  10. Zablocki, É.; Ben-Younes, H.; Pérez, P.; Cord, M. Explainability of vision-based autonomous driving systems: Review and challenges. arXiv 2021, arXiv:2101.05307.
  11. Zhang, F.; Wang, Z.; Zhong, Y.; Chen, L. Localization Error Modeling for Autonomous Driving in GPS Denied Environment. Electronics 2022, 11, 647.
  12. Yang, S.; Chen, Y.; Shi, R.; Wang, R.; Cao, Y.; Lu, J. A Survey of Intelligent Tires for Tire-road Interaction Recognition. IEEE Trans. Intell. Veh. 2022.
  13. Liu, Z.; Wang, L.; Wen, F.; Zhang, H. IMU/vehicle calibration and integrated localization for autonomous driving. In Proceedings of the 2021 IEEE International Conference on Robotics and Automation (ICRA), Xi’an, China, 30 May–5 June 2021; pp. 4013–4019.
  14. Wolf, M.; Weimerskirch, A.; Paar, C. Security in automotive bus systems. In Proceedings of the Workshop on Embedded Security in Cars, Bochum, Germany, 11–12 November 2004.
  15. Wolf, M.; Weimerskirch, A.; Wollinger, T. State of the art: Embedding security in vehicles. EURASIP J. Embed. Syst. 2007, 2007, 074706.
  16. Jafarnejad, S.; Codeca, L.; Bronzi, W.; Frank, R.; Engel, T. A car hacking experiment: When connectivity meets vulnerability. In Proceedings of the 2015 IEEE Globecom Workshops (GC Wkshps), San Diego, CA, USA, 6–10 December 2015; pp. 1–6.
  17. Woo, S.; Jo, H.J.; Lee, D.H. A practical wireless attack on the connected car and security protocol for in-vehicle CAN. IEEE Trans. Intell. Transp. Syst. 2015, 16, 993–1006.
  18. Vanhoef, M.; Piessens, F. Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2. In Proceedings of the CCS’17: 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, TX, USA, 30 October–3 November 2017.
  19. Huang, J.-L.; Yeh, L.-Y.; Chien, H.-Y. ABAKA: An anonymous batch authenticated and key agreement scheme for value-added services in vehicular ad hoc networks. IEEE Trans. Veh. Technol. 2011, 60, 248–262.
  20. An Analysis and Comparison of Hardware Security Modules for the Automotive Domain. Available online: https://www.escar.info/images/Datastore/2014_escar_Vortraege_USA/Frederic_Stumpf_escar_USA_2014.pdf (accessed on 8 August 2022).
  21. Studnia, I.; Nicomette, V.; Alata, E.; Deswarte, Y.; Kaâniche, M.; Laarouchi, Y. Survey on security threats and protection mechanisms in embedded automotive networks. In Proceedings of the 2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W), Washington, DC, USA, 24–27 June 2013; pp. 1–12.
  22. Valasek, C.; Miller, C. A Survey of Remote Automotive Attack Surfaces; Scribd: Washington, DC, USA, 2014.
  23. Nilsson, D.; Larson, U.; Jonsson, E. Creating a secure infrastructure for wireless diagnostics and software updates in vehicles. In Proceedings of the SAFECOMP 2008, Newcastle upon Tyne, UK, 22–25 September 2008; pp. 207–220.
  24. Nilsson, D.K.; Larson, U. A Defense-in-Depth Approach to Securing the Wireless Vehicle Infrastructure. JNW 2009, 4, 552–564.
  25. Qualcomm. Expanding and Evolving the Cellular System for V2X Communications—Introduced in 3GPP Release 14—Part of LTE Advanced Pro; Qualcomm Technologies: San Diego, CA, USA, 2016.
  26. Sawant, H.; Tan, J.; Yang, Q.; Wang, Q. Using Bluetooth and sensor networks for intelligent transportation systems. In Proceedings of the IEEE intelligent Transportation Systems Conference, Washington, DC, USA, 3–6 October 2004.
  27. Dardanelli, A.; Maggi, F.; Tanelli, M.; Zanero, S.; Savaresi, S.M.; Kochanek, R.; Holz, T. A security layer for smartphone-to-vehicle communication over Bluetooth. IEEE Embed. Syst. Lett. 2013, 5, 34–37.
  28. Humayed, A.; Lin, J.; Li, F.; Luo, B. Cyber-Physical Systems Security--A Survey. IEEE Internet Things J. 2017, 4, 1802–1831.
  29. Han, K.; Potluri, S.D.; Shin, K.G. On authentication in a connected vehicle: Secure integration of mobile devices with vehicular networks. In Proceedings of the 2013 ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS), Philadelphia, PA, USA, 8–11 August 2013; pp. 160–169.
  30. Spill, D.; Bittau, A. BlueSniff: Eve Meets Alice and Bluetooth. WOOT 2007, 7, 1–10.
  31. Haataja, K. Security Threats and Countermeasures in Bluetooth-Enabled Systems. Ph.D. Thesis, University of Kuopio, Kuopio, Finland, 2009.
  32. Rhoades, B.B.; Conrad, J.M. A survey of alternate methods and implementations of an intelligent transportation system. In Proceedings of the SoutheastCon, Charlotte, NC, USA, 30 March–2 April 2017; pp. 1–8.
  33. Chou, C.-M.; Li, C.-Y.; Chien, W.-M.; Lan, K.-C. A feasibility study on vehicle-to-infrastructure communication: WiFi vs. WiMAX. In Proceedings of the 2009 Tenth International Conference on Mobile Data Management: Systems, Services and Middleware, Taipei, Taiwan, 18–20 May 2009; pp. 397–398.
  34. Jeong, S.; Baek, Y.; Son, S.H. A Hybrid V2X System for Safety-Critical Applications in VANET. In Proceedings of the 2016 IEEE 4th International Conference on Cyber-Physical Systems, Networks, and Applications (CPSNA), Nagoya, Japan, 6–7 October 2016; pp. 13–18.
  35. Su, K.-C.; Wu, H.-M.; Chang, W.-L.; Chou, Y.-H. Vehicle-to-vehicle communication system through Wi-Fi network using android smartphone. In Proceedings of the 2012 International Conference on Connected Vehicles and Expo (ICCVE), Beijing, China, 12–16 December 2012; pp. 191–196.
  36. Viittala, H.; Soderi, S.; Saloranta, J.; Hamalainen, M.; Iinatti, J. An experimental evaluation of wifi-based vehicle-to-vehicle (V2V) communication in a tunnel. In Proceedings of the Vehicular Technology Conference (VTC Spring), Dresden, Germany, 2–5 June 2013; pp. 1–5.
  37. Seamless, Secure Connection to Wi-Fi® Networks. Available online: http://www.wi-fi.org/discover-wi-fi/wi-fi-certified-passpoint (accessed on 8 August 2022).
  38. Jansons, J.; Barancevs, A. Using wireless networking for vehicular environment: IEEE 802.11 a standard performance. In Proceedings of the 2012 Second International Conference on Digital Information Processing and Communications (ICDIPC), Washington, DC, USA, 7–8 January 2012; pp. 5–9.
  39. Lu, N.; Cheng, N.; Zhang, N.; Shen, X.; Mark, J.W. Connected vehicles: Solutions and challenges. IEEE Internet Things J. 2014, 1, 289–299.
  40. Security Issues of WiFi—How it Works. Available online: https://www.alienvault.com/blogs/security-essentials/security-issues-of-wifi-how-it-works (accessed on 8 August 2022).
  41. Seo, H.; Lee, K.-D.; Yasukawa, S.; Peng, Y.; Sartori, P. LTE evolution for vehicle-to-everything services. IEEE Commun. Mag. 2016, 54, 22–28.
  42. Lee, J.; Kim, Y.; Kwak, Y.; Zhang, J.; Papasakellariou, A.; Novlan, T.; Sun, C.; Li, Y. LTE-advanced in 3GPP Rel-13/14: An evolution toward 5G. IEEE Commun. Mag. 2016, 54, 36–42.
  43. Khanh, Q.V.; Hoai, N.V.; Manh, L.D.; Le, A.N.; Jeon, G. Wireless communication technologies for IoT in 5G: Vision, applications, and challenges. Wirel. Commun. Mob. Comput. 2022, 2022, 3229294.
  44. Araniti, G.; Campolo, C.; Condoluci, M.; Iera, A.; Molinaro, A. LTE for vehicular networking: A survey. IEEE Commun. Mag. 2013, 51, 148–157.
  45. Sun, S.-H.; Hu, J.-L.; Peng, Y.; Pan, X.-M.; Zhao, L.; Fang, J.-Y. Support for vehicle-to-everything services based on LTE. IEEE Wirel. Commun. 2016, 23, 4–8.
  46. Expanding Your Horizons with Lte Direct—Enabling the Next Generation of Proximal Services. Available online: https://www.qualcomm.com/documents/srg-whitepaper-expanding-your-horizons-lte-direct (accessed on 8 August 2022).
  47. V2X Cellular Solutions. October. 2016. Available online: https://www.5gamericas.org/v2x-cellular-solutions/ (accessed on 8 August 2022).
  48. Cheng, N.; Lyu, F.; Chen, J.; Xu, W.; Zhou, H.; Zhang, S.; Shen, X. Big data driven vehicular networks. IEEE Netw. 2018, 32, 160–167.
  49. Mejri, M.N.; Ben-Othman, J.; Hamdi, M. Survey on VANET security challenges and possible cryptographic solutions. Veh. Commun. 2014, 1, 53–66.
  50. Papadimitratos, P.; Hubaux, J.-P. Report on the secure vehicular communications: Results and challenges ahead workshop. ACM SIGMOBILE Mob. Comput. Commun. Rev. 2008, 12, 53–64.
  51. Hasrouny, A.E.S.H.; Bassil, C.; Laouiti, A. VANET Security Challenges and Solutions: A Survey. Veh. Commun. 2017, 7, 7–20.
  52. Mershad, K.; Artail, H. A framework for secure and efficient data acquisition in vehicular ad hoc networks. IEEE Trans. Veh. Technol. 2013, 62, 536–551.
  53. Dhamgaye, A.; Chavhan, N. Survey on Security Challenges in VANET 1. 2013. Available online: https://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.300.3967 (accessed on 8 August 2022).
  54. Raya, M.; Hubaux, J.-P. Securing vehicular ad hoc networks. J. Comput. Secur. 2007, 15, 39–68.
  55. Perrig, A.; Canetti, R.; Tygar, J.D.; Song, D. The TESLA Broadcast Authentication Protocol. Rsa Cryptobytes. 2005; Volume 5. Available online: https://people.eecs.berkeley.edu/~tygar/papers/TESLA_broadcast_authentication_protocol.pdf (accessed on 8 August 2022).
  56. Wasef, A.; Jiang, Y.; Shen, X. ECMV: Efficient certificate management scheme for vehicular networks. In Proceedings of the Global Telecommunications Conference, New Orleans, LA, USA, 30 November–4 December 2008; pp. 1–5.
  57. Studer, A.; Shi, E.; Bai, F.; Perrig, A. TACKing together efficient authentication, revocation, and privacy in VANETs. In Proceedings of the 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, Rome, Italy, 22–26 June 2009; pp. 1–9.
  58. Wong, C.K.; Gouda, M.; Lam, S.S. Secure group communications using key graphs. IEEE/ACM Trans. Netw. 2000, 8, 16–30.
  59. Zheng, X.; Huang, C.-T.; Matthews, M. Chinese remainder theorem based group key management. In Proceedings of the 45th Annual Southeast Regional Conference, Winston-Salem, NC, USA, 23–24 March 2007; pp. 266–271.
  60. Zhou, J.; Ou, Y.H. Key tree and Chinese remainder theorem based group key distrubution scheme. J. Chin. Inst. Eng. 2009, 32, 967–974.
  61. Calandriello, G.; Papadimitratos, P.; Hubaux, J.-P.; Lioy, A. Efficient and robust pseudonymous authentication in VANET. In Proceedings of the fourth ACM International Workshop on Vehicular Ad Hoc Networks, Montreal, QC, Canada, 10 September 2007; pp. 19–28.
  62. Lu, R.; Lin, X.; Zhu, H.; Ho, P.-H.; Shen, X. ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications. In Proceedings of the INFOCOM 2008—The 27th Conference on Computer Communications, Phoenix, AZ, USA, 13–18 April 2008; pp. 1229–1237.
  63. Boualouache, A.; Senouci, S.-M.; Moussaoui, S. A survey on pseudonym changing strategies for Vehicular Ad-Hoc Networks. arXiv 2017, arXiv:1704.00679.
  64. Freudiger, J.; Raya, M.; Félegyházi, M.; Papadimitratos, P.; Hubaux, J.-P. Mix-zones for location privacy in vehicular networks. In Proceedings of the ACM Workshop on Wireless Networking for Intelligent Transportation Systems (WiN-ITS), Vancouver, BC, Canada, 14 August 2007.
  65. Lu, R.; Lin, X.; Luan, T.H.; Liang, X.; Shen, X. Pseudonym changing at social spots: An effective strategy for location privacy in vanets. IEEE Trans. Veh. Technol. 2012, 61, 86–96.
  66. Emara, K.; Woerndl, W.; Schlichter, J.H. POSTER: Context-Adaptive User-Centric Privacy Scheme for VANET. In Proceedings of the SecureComm, Dallas, TX, USA, 26–29 October 2015; pp. 590–593.
  67. Sampigethaya, K.; Li, M.; Huang, L.; Poovendran, R. AMOEBA: Robust location privacy scheme for VANET. IEEE J. Sel. Areas Commun. 2007, 25, 8.
  68. Buttyán, L.; Holczer, T.; Weimerskirch, A.; Whyte, W. Slow: A practical pseudonym changing scheme for location privacy in vanets. In Proceedings of the 2009 IEEE Vehicular Networking Conference (VNC), Tokyo, Japan, 28–30 October 2009; pp. 1–8.
  69. Wiedersheim, B.; Ma, Z.; Kargl, F.; Papadimitratos, P. Privacy in inter-vehicular networks: Why simple pseudonym change is not enough. In Proceedings of the 2010 Seventh International Conference on Wireless On-demand Network Systems and Services (WONS), Kranjska Gora, Slovenia, 3–5 February 2010; pp. 176–183.
  70. Lefevre, S.; Petit, J.; Bajcsy, R.; Laugier, C.; Kargl, F. Impact of v2x privacy strategies on intersection collision avoidance systems. In Proceedings of the Vehicular Networking Conference (VNC), Boston, MA, USA, 16–18 December 2013; pp. 71–78.
  71. Wagner, I.; Eckhoff, D. Privacy assessment in vehicular networks using simulation. In Proceedings of the Simulation Conference (WSC), Savannah, GA, USA, 7–10 December 2014; pp. 3155–3166.
  72. Eckhoff, D. Simulation of Privacy-Enhancing Technologies in Vehicular Ad-Hoc Networks. Ph.D. Thesis, Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU), Erlangen, Germany, 2016.
  73. Eckhoff, D.; Protsenko, M.; German, R. Toward an open source location privacy evaluation framework for vehicular networks. In Proceedings of the Vehicular Technology Conference (VTC Fall), Vancouver, BC, Canada, 14–17 September 2014; pp. 1–2.
  74. Zhang, J. A survey on trust management for vanets. In Proceedings of the 2011 IEEE International Conference on Advanced information networking and applications (AINA), Singapore, 22–25 March 2011; pp. 105–112.
  75. Kerrache, C.A.; Calafate, C.T.; Cano, J.-C.; Lagraa, N.; Manzoni, P. Trust management for vehicular networks: An adversary-oriented overview. IEEE Access 2016, 4, 9293–9307.
More
ScholarVision Creations