Toggle Main Menu Toggle Search

Open Access padlockePrints

Cyber security analysis of connected vehicles

Lookup NU author(s): Dr Dev JhaORCiD

Downloads


Licence

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License (CC BY-NC-ND).


Abstract

© 2024 The Authors. IET Intelligent Transport Systems published by John Wiley & Sons Ltd on behalf of The Institution of Engineering and Technology.The sensor-enabled in-vehicle communication and infrastructure-centric vehicle-to-everything (V2X) communications have significantly contributed to the spark in the amount of data exchange in the connected and autonomous vehicles (CAV) environment. The growing vehicular communications pose a potential cyber security risk considering online vehicle hijacking. Therefore, there is a critical need to prioritize the cyber security issues in the CAV research theme. In this context, this paper presents a cyber security analysis of connected vehicle traffic environments (CyACV). Specifically, potential cyber security attacks in CAV are critically investigated and validated via experimental data sets. Trust in V2X communication for connected vehicles is explored in detail focusing on trust computation and trust management approaches and related challenges. A wide range of trust-based cyber security solutions for CAV have been critically investigated considering their strengths and weaknesses. Open research directions have been highlighted as potential new research themes in CAV cyber security area.


Publication metadata

Author(s): Mwanje MD, Kaiwartya O, Aljaidi M, Cao Y, Kumar S, Jha DN, Naser A, Lloret J

Publication type: Review

Publication status: Published

Journal: IET Intelligent Transport Systems

Year: 2024

Pages: epub ahead of print

Online publication date: 12/04/2024

Acceptance date: 22/02/2024

ISSN (print): 1751-956X

ISSN (electronic): 1751-9578

Publisher: John Wiley and Sons Inc

URL: https://doi.org/10.1049/itr2.12504

DOI: 10.1049/itr2.12504

Data Access Statement: Data will be made available via individual request to the corresponding author.


Share