Skip to main content
Top

2020 | OriginalPaper | Chapter

6. Inter-Vehicle Communication and Cyber Security

Authors : Shiho Kim, Rakesh Shrestha

Published in: Automotive Cyber Security

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In this chapter, we focus on the connected vehicle technology and describe in detail about the different types of connected vehicle technology and its security issues. The intelligent and autonomous vehicle (IAV) technologies are expected to revolutionize the intelligent transportation system internationally.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference K. Sjoberg, P. Andres, T. Buburuzan, A. Brakemeier, Cooperative intelligent transport systems in Europe: current deployment status and outlook. IEEE Veh. Technol. Mag. 12(2), 89–97 (2017)CrossRef K. Sjoberg, P. Andres, T. Buburuzan, A. Brakemeier, Cooperative intelligent transport systems in Europe: current deployment status and outlook. IEEE Veh. Technol. Mag. 12(2), 89–97 (2017)CrossRef
3.
go back to reference 3 GPP, Technical specification group services and system aspects. Study on architecture enhancements for EPS and 5G system to support advanced V2X services, 3GPP TR 23.786 v0.8.0., (2018) 3 GPP, Technical specification group services and system aspects. Study on architecture enhancements for EPS and 5G system to support advanced V2X services, 3GPP TR 23.786 v0.8.0., (2018)
4.
go back to reference Y.L. Morgan, Notes on DSRC & WAVE standards suite: Its architecture, design, and characteristics. IEEE Commun. Surv. Tutorials 12(4), 504–518 (2010)CrossRef Y.L. Morgan, Notes on DSRC & WAVE standards suite: Its architecture, design, and characteristics. IEEE Commun. Surv. Tutorials 12(4), 504–518 (2010)CrossRef
5.
go back to reference ETSI, Intelligent Transport Systems (ITS), Access layer specification for Intelligent Transport Systems operating in the 5 GHz frequency band, (France, 2013) ETSI, Intelligent Transport Systems (ITS), Access layer specification for Intelligent Transport Systems operating in the 5 GHz frequency band, (France, 2013)
6.
go back to reference V.D. Khairnar, K. Kotecha, Performance of vehicle-to-vehicle communication using IEEE 802.11p in vehicular ad-hoc network environment. Int. J. Netw. Secur. Its Appl. 5(2), 1–28 (2013) V.D. Khairnar, K. Kotecha, Performance of vehicle-to-vehicle communication using IEEE 802.11p in vehicular ad-hoc network environment. Int. J. Netw. Secur. Its Appl. 5(2), 1–28 (2013)
7.
go back to reference Technical specification group services and system aspects, Security aspect for LTE support of Vehicle-to-Everything (V2X) services, 3GPP TS 33.185 V14.1.0., (2017) Technical specification group services and system aspects, Security aspect for LTE support of Vehicle-to-Everything (V2X) services, 3GPP TS 33.185 V14.1.0., (2017)
8.
go back to reference 3 GPP, Technical specification group radio access network. Evolved universal terrestrial radio access (E-UTRA), Physical layer procedures, Rel. 15, TR 36.213 v15.3.0, (2018) 3 GPP, Technical specification group radio access network. Evolved universal terrestrial radio access (E-UTRA), Physical layer procedures, Rel. 15, TR 36.213 v15.3.0, (2018)
9.
go back to reference 3 GPP, Technical specification group services and system aspects, Release 14 Description, Summary of Rel–14 Work Items, (2018) 3 GPP, Technical specification group services and system aspects, Release 14 Description, Summary of Rel–14 Work Items, (2018)
10.
go back to reference A. Haider, S.-H. Hwang, Adaptive transmit power control algorithm for sensing-based semi-persistent scheduling in C-V2X Mode 4 communication, Electronics, 8(8), (2019) A. Haider, S.-H. Hwang, Adaptive transmit power control algorithm for sensing-based semi-persistent scheduling in C-V2X Mode 4 communication, Electronics, 8(8), (2019)
11.
go back to reference 3 GPP, LTE: service requirements for V2X services, 3GPP TS 22.185 version 14.3.0 Release 14, (2017) 3 GPP, LTE: service requirements for V2X services, 3GPP TS 22.185 version 14.3.0 Release 14, (2017)
12.
go back to reference 5G Automotive association, The case for cellular V2X for safety and cooperative driving, 5GAA Whitepaper, pp. 1–8, (2016) 5G Automotive association, The case for cellular V2X for safety and cooperative driving, 5GAA Whitepaper, pp. 1–8, (2016)
13.
go back to reference Autotalks, DSRC vs. C-V2X for safety applications, [Online]. Available: DSRC vs. C-V2X for Safety Applications. [Accessed: 01-Nov-2019], (2019) Autotalks, DSRC vs. C-V2X for safety applications, [Online]. Available: DSRC vs. C-V2X for Safety Applications. [Accessed: 01-Nov-2019], (2019)
14.
go back to reference ITU-R M.2410–0, Minimum requirements related to technical performance for IMT-2020 radio interface(s) ITU-R M.2410–0, Minimum requirements related to technical performance for IMT-2020 radio interface(s)
15.
go back to reference X. Wang et al., Millimeter wave communication: a comprehensive survey. IEEE Commun. Surv. Tutorials 20(3), 1616–1653 (2018)CrossRef X. Wang et al., Millimeter wave communication: a comprehensive survey. IEEE Commun. Surv. Tutorials 20(3), 1616–1653 (2018)CrossRef
17.
go back to reference R. Shrestha, R. Bajracharya, S. Djuraev, S.Y. Nam, K.-S. Sohn, Performance evaluation of heterogeneous VANET based on simulation. Far East J. Electron. Commun. 2(1), 155–162 (2016)CrossRef R. Shrestha, R. Bajracharya, S. Djuraev, S.Y. Nam, K.-S. Sohn, Performance evaluation of heterogeneous VANET based on simulation. Far East J. Electron. Commun. 2(1), 155–162 (2016)CrossRef
18.
go back to reference R. Shrestha, Sybil attack detection in vehicular network based on received signal strength, 1, (2014) R. Shrestha, Sybil attack detection in vehicular network based on received signal strength, 1, (2014)
20.
go back to reference 3GPP, Service requirements for enhanced V2X scenarios, 2018 3GPP, Service requirements for enhanced V2X scenarios, 2018
21.
go back to reference R. Shrestha, R. Bajracharya, S.Y. Nam, Challenges of future VANET and cloud—based approaches, Wirel. Commun. Mob. Comput., 2018, no. Article ID 5603518, 1–15 (2018) R. Shrestha, R. Bajracharya, S.Y. Nam, Challenges of future VANET and cloud—based approaches, Wirel. Commun. Mob. Comput., 2018, no. Article ID 5603518, 1–15 (2018)
22.
go back to reference H.Y. Chao, M. Patel, D. Sabella, N. Sprecher, V. Young, Mobile edge computing a key technology towards 5G, ETSI (European Telecommun. Stand. Institute), pp. 1–16 (2015) H.Y. Chao, M. Patel, D. Sabella, N. Sprecher, V. Young, Mobile edge computing a key technology towards 5G, ETSI (European Telecommun. Stand. Institute), pp. 1–16 (2015)
23.
go back to reference D. Sabella et al., Toward fully connected vehicles: edge computing for advanced automotive communications, 2017 D. Sabella et al., Toward fully connected vehicles: edge computing for advanced automotive communications, 2017
24.
go back to reference ETSI, Multi-access Edge Computing (MEC): study on MEC support for V2X use cases, 2018 ETSI, Multi-access Edge Computing (MEC): study on MEC support for V2X use cases, 2018
25.
go back to reference Open Network Foundation, White paper: software defined networking: the new norm for networks (Palo Alto, Calif, USA, 2012) Open Network Foundation, White paper: software defined networking: the new norm for networks (Palo Alto, Calif, USA, 2012)
26.
go back to reference H. Kim, N. Feamster, Improving network management with software defined networking. IEEE Commun. Mag. 51(2), 114–119 (2013)CrossRef H. Kim, N. Feamster, Improving network management with software defined networking. IEEE Commun. Mag. 51(2), 114–119 (2013)CrossRef
27.
go back to reference X. Duan, Y. Liu, X. Wang, SDN enabled 5G-VANET: adaptive vehicle clustering and beamformed transmission for aggregated traffic. IEEE Commun. Mag. 55(7), 120–127 (2017)CrossRef X. Duan, Y. Liu, X. Wang, SDN enabled 5G-VANET: adaptive vehicle clustering and beamformed transmission for aggregated traffic. IEEE Commun. Mag. 55(7), 120–127 (2017)CrossRef
28.
go back to reference IEEE SA, IEEE 1609.2–2016—IEEE Standard for wireless access in vehicular environments–security services for applications and management messages, 2016 IEEE SA, IEEE 1609.2–2016—IEEE Standard for wireless access in vehicular environments–security services for applications and management messages, 2016
29.
go back to reference F. Ahmad, A. Adnane, V.N.L. Franqueira, A systematic approach for cyber security in vehicular networks. J. Comput. Commun. 04(16), 38–62 (2016)CrossRef F. Ahmad, A. Adnane, V.N.L. Franqueira, A systematic approach for cyber security in vehicular networks. J. Comput. Commun. 04(16), 38–62 (2016)CrossRef
30.
go back to reference T.W. Chim, S.M. Yiu, L.C.K. Hui, Z.L. Jiang, V.O.K. Li, SPECS: secure and privacy enhancing communications schemes for VANETs. Ad Hoc Netw. 9(2), 160–175 (2011)CrossRef T.W. Chim, S.M. Yiu, L.C.K. Hui, Z.L. Jiang, V.O.K. Li, SPECS: secure and privacy enhancing communications schemes for VANETs. Ad Hoc Netw. 9(2), 160–175 (2011)CrossRef
31.
go back to reference S. Manvi, M. Kakkasageri, D. Adiga, Message authentication in vehicular ad hoc networks: ECDSA based approach, Int. Conf. Future Comput. Commun., pp. 16–20 (2009) S. Manvi, M. Kakkasageri, D. Adiga, Message authentication in vehicular ad hoc networks: ECDSA based approach, Int. Conf. Future Comput. Commun., pp. 16–20 (2009)
32.
go back to reference D.K. Nilsson, U.E. Larson, A defense-in-depth approach to securing the wireless vehicle infrastructure. J. Networks 4, 552–564 (2009)CrossRef D.K. Nilsson, U.E. Larson, A defense-in-depth approach to securing the wireless vehicle infrastructure. J. Networks 4, 552–564 (2009)CrossRef
33.
go back to reference N. Nikaein, S.K. Datta, I. Marecar, C. Bonnet, Application distribution model and related security attacks in VANET, Int. Conf. Graph. Image Process., 2012 N. Nikaein, S.K. Datta, I. Marecar, C. Bonnet, Application distribution model and related security attacks in VANET, Int. Conf. Graph. Image Process., 2012
34.
go back to reference K.S. Tamil Selvan, R. Rajendiran, A holistic protocol for secure data transmission in VANET, Int. J. Adv. Res. Comput. Commun. Eng., 2, 4840–4849 (2013) K.S. Tamil Selvan, R. Rajendiran, A holistic protocol for secure data transmission in VANET, Int. J. Adv. Res. Comput. Commun. Eng., 2, 4840–4849 (2013)
35.
go back to reference Y.C. Hu, A. Perrig, D. Johnson, Packet leashes: a defense against wormhole attacks in wireless networks, in 22nd Annual Joint Conference of the IEEE Computer and Communications, pp. 1976–1986 (2003) Y.C. Hu, A. Perrig, D. Johnson, Packet leashes: a defense against wormhole attacks in wireless networks, in 22nd Annual Joint Conference of the IEEE Computer and Communications, pp. 1976–1986 (2003)
36.
go back to reference S.M. Safi, M. Movaghar, A. Mohammadizadeh, Novel approach for avoiding wormhole attack in VANET, in 1st Asian Himalayas International Conference on Internet, pp. 54–59 (2009) S.M. Safi, M. Movaghar, A. Mohammadizadeh, Novel approach for avoiding wormhole attack in VANET, in 1st Asian Himalayas International Conference on Internet, pp. 54–59 (2009)
37.
go back to reference K. Verma, H. Hasbullah, A. Kumar, Prevention of DoS attacks in VANET. Wirel. Pers. Commun. 73, 95–126 (2013)CrossRef K. Verma, H. Hasbullah, A. Kumar, Prevention of DoS attacks in VANET. Wirel. Pers. Commun. 73, 95–126 (2013)CrossRef
38.
go back to reference L. Mokdad, J. Ben-Othman, A. Tuan Nguyen, DJAVAN: detecting jamming attacks in vehicle ad hoc networks, Perform. Eval., 87(C), pp. 47–59 (2015) L. Mokdad, J. Ben-Othman, A. Tuan Nguyen, DJAVAN: detecting jamming attacks in vehicle ad hoc networks, Perform. Eval., 87(C), pp. 47–59 (2015)
39.
go back to reference C. Zhang, R. Lu, X. Lin, P.H. Ho, X. Shen, An efficient identity-based batch verification scheme for vehicular sensor networks, in The 27th IEEE Conference on Computer Communications, pp. 816–824 (2008) C. Zhang, R. Lu, X. Lin, P.H. Ho, X. Shen, An efficient identity-based batch verification scheme for vehicular sensor networks, in The 27th IEEE Conference on Computer Communications, pp. 816–824 (2008)
40.
go back to reference T.E. Montgomery, P.Y. Humphreys, B.M. Ledvina, Receiver-autonomous spoofing detection: experimental results of a multi-antenna receiver defense against a portable civil GPS spoofer, in Proceedings of the ION International Technical Meeting, pp. 124–130 (2009) T.E. Montgomery, P.Y. Humphreys, B.M. Ledvina, Receiver-autonomous spoofing detection: experimental results of a multi-antenna receiver defense against a portable civil GPS spoofer, in Proceedings of the ION International Technical Meeting, pp. 124–130 (2009)
41.
go back to reference T. Leinmuller, C. Maihofer, E. Schoch, F. Kargl, Improved security in geographic ad hoc routing through autonomous position verification, in Proceedings of the 3rd International Workshop on Vehicular Ad Hoc Networks, pp. 57–66 (2006) T. Leinmuller, C. Maihofer, E. Schoch, F. Kargl, Improved security in geographic ad hoc routing through autonomous position verification, in Proceedings of the 3rd International Workshop on Vehicular Ad Hoc Networks, pp. 57–66 (2006)
42.
go back to reference C. Chen, X. Wang, W. Han, B. Zang, A robust detection of the sybil attack in urban VANETs, in 29th IEEE International Conference on Distributed Computing Systems Workshops, pp. 270–276 (2009) C. Chen, X. Wang, W. Han, B. Zang, A robust detection of the sybil attack in urban VANETs, in 29th IEEE International Conference on Distributed Computing Systems Workshops, pp. 270–276 (2009)
43.
go back to reference F. Gómez Mármol, G. Martínez Pérez, TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks, J. Netw. Comput. Appl., 35(3), 934–941 (2012) F. Gómez Mármol, G. Martínez Pérez, TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks, J. Netw. Comput. Appl., 35(3), 934–941 (2012)
44.
go back to reference Y.M. Chen, Y.C. Wei, A beacon-based trust management system for enhancing user centric location privacy in VANETs. J. Commun. Networks 15(2), 153–163 (2013)CrossRef Y.M. Chen, Y.C. Wei, A beacon-based trust management system for enhancing user centric location privacy in VANETs. J. Commun. Networks 15(2), 153–163 (2013)CrossRef
45.
go back to reference C. Gentry, A fully homomorphic encryption scheme, Stanford University, 2009 C. Gentry, A fully homomorphic encryption scheme, Stanford University, 2009
46.
go back to reference W. Jiang, D. Lin, F. Li, E. Bertino, Randomized and efficient authentication in mobile environments, Cyber Center Publication, pp. 1–15, 2014 W. Jiang, D. Lin, F. Li, E. Bertino, Randomized and efficient authentication in mobile environments, Cyber Center Publication, pp. 1–15, 2014
48.
go back to reference S. Kim, Blockchain for a Trust Network Among Intelligent Vehicles, 1st edn. vol. 111. (Elsevier Inc., 2018) S. Kim, Blockchain for a Trust Network Among Intelligent Vehicles, 1st edn. vol. 111. (Elsevier Inc., 2018)
49.
go back to reference A. Dorri, M. Steger, S. Kanhere, R. Jurdak, BlockChain: a distributed solution to automotive security and privacy, IEEE Commun. Mag. Mag., 55(12), 119–125 (2009) A. Dorri, M. Steger, S. Kanhere, R. Jurdak, BlockChain: a distributed solution to automotive security and privacy, IEEE Commun. Mag. Mag., 55(12), 119–125 (2009)
50.
go back to reference M. Cebe, E. Erdin, K. Akkaya, H. Aksu, S. Uluagac, Block4Forensic: an integrated lightweight blockchain framework for forensics applications of connected vehicles. IEEE Commun. Mag. 56(10), 50–57 (2018)CrossRef M. Cebe, E. Erdin, K. Akkaya, H. Aksu, S. Uluagac, Block4Forensic: an integrated lightweight blockchain framework for forensics applications of connected vehicles. IEEE Commun. Mag. 56(10), 50–57 (2018)CrossRef
53.
go back to reference A. Chattopadhyay, K.-Y. Lam, Autonomous vehicle: security by design, 2018 A. Chattopadhyay, K.-Y. Lam, Autonomous vehicle: security by design, 2018
Metadata
Title
Inter-Vehicle Communication and Cyber Security
Authors
Shiho Kim
Rakesh Shrestha
Copyright Year
2020
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-15-8053-6_6

Premium Partner