Skip to main content

2020 | OriginalPaper | Buchkapitel

6. Inter-Vehicle Communication and Cyber Security

verfasst von : Shiho Kim, Rakesh Shrestha

Erschienen in: Automotive Cyber Security

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this chapter, we focus on the connected vehicle technology and describe in detail about the different types of connected vehicle technology and its security issues. The intelligent and autonomous vehicle (IAV) technologies are expected to revolutionize the intelligent transportation system internationally.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat K. Sjoberg, P. Andres, T. Buburuzan, A. Brakemeier, Cooperative intelligent transport systems in Europe: current deployment status and outlook. IEEE Veh. Technol. Mag. 12(2), 89–97 (2017)CrossRef K. Sjoberg, P. Andres, T. Buburuzan, A. Brakemeier, Cooperative intelligent transport systems in Europe: current deployment status and outlook. IEEE Veh. Technol. Mag. 12(2), 89–97 (2017)CrossRef
3.
Zurück zum Zitat 3 GPP, Technical specification group services and system aspects. Study on architecture enhancements for EPS and 5G system to support advanced V2X services, 3GPP TR 23.786 v0.8.0., (2018) 3 GPP, Technical specification group services and system aspects. Study on architecture enhancements for EPS and 5G system to support advanced V2X services, 3GPP TR 23.786 v0.8.0., (2018)
4.
Zurück zum Zitat Y.L. Morgan, Notes on DSRC & WAVE standards suite: Its architecture, design, and characteristics. IEEE Commun. Surv. Tutorials 12(4), 504–518 (2010)CrossRef Y.L. Morgan, Notes on DSRC & WAVE standards suite: Its architecture, design, and characteristics. IEEE Commun. Surv. Tutorials 12(4), 504–518 (2010)CrossRef
5.
Zurück zum Zitat ETSI, Intelligent Transport Systems (ITS), Access layer specification for Intelligent Transport Systems operating in the 5 GHz frequency band, (France, 2013) ETSI, Intelligent Transport Systems (ITS), Access layer specification for Intelligent Transport Systems operating in the 5 GHz frequency band, (France, 2013)
6.
Zurück zum Zitat V.D. Khairnar, K. Kotecha, Performance of vehicle-to-vehicle communication using IEEE 802.11p in vehicular ad-hoc network environment. Int. J. Netw. Secur. Its Appl. 5(2), 1–28 (2013) V.D. Khairnar, K. Kotecha, Performance of vehicle-to-vehicle communication using IEEE 802.11p in vehicular ad-hoc network environment. Int. J. Netw. Secur. Its Appl. 5(2), 1–28 (2013)
7.
Zurück zum Zitat Technical specification group services and system aspects, Security aspect for LTE support of Vehicle-to-Everything (V2X) services, 3GPP TS 33.185 V14.1.0., (2017) Technical specification group services and system aspects, Security aspect for LTE support of Vehicle-to-Everything (V2X) services, 3GPP TS 33.185 V14.1.0., (2017)
8.
Zurück zum Zitat 3 GPP, Technical specification group radio access network. Evolved universal terrestrial radio access (E-UTRA), Physical layer procedures, Rel. 15, TR 36.213 v15.3.0, (2018) 3 GPP, Technical specification group radio access network. Evolved universal terrestrial radio access (E-UTRA), Physical layer procedures, Rel. 15, TR 36.213 v15.3.0, (2018)
9.
Zurück zum Zitat 3 GPP, Technical specification group services and system aspects, Release 14 Description, Summary of Rel–14 Work Items, (2018) 3 GPP, Technical specification group services and system aspects, Release 14 Description, Summary of Rel–14 Work Items, (2018)
10.
Zurück zum Zitat A. Haider, S.-H. Hwang, Adaptive transmit power control algorithm for sensing-based semi-persistent scheduling in C-V2X Mode 4 communication, Electronics, 8(8), (2019) A. Haider, S.-H. Hwang, Adaptive transmit power control algorithm for sensing-based semi-persistent scheduling in C-V2X Mode 4 communication, Electronics, 8(8), (2019)
11.
Zurück zum Zitat 3 GPP, LTE: service requirements for V2X services, 3GPP TS 22.185 version 14.3.0 Release 14, (2017) 3 GPP, LTE: service requirements for V2X services, 3GPP TS 22.185 version 14.3.0 Release 14, (2017)
12.
Zurück zum Zitat 5G Automotive association, The case for cellular V2X for safety and cooperative driving, 5GAA Whitepaper, pp. 1–8, (2016) 5G Automotive association, The case for cellular V2X for safety and cooperative driving, 5GAA Whitepaper, pp. 1–8, (2016)
13.
Zurück zum Zitat Autotalks, DSRC vs. C-V2X for safety applications, [Online]. Available: DSRC vs. C-V2X for Safety Applications. [Accessed: 01-Nov-2019], (2019) Autotalks, DSRC vs. C-V2X for safety applications, [Online]. Available: DSRC vs. C-V2X for Safety Applications. [Accessed: 01-Nov-2019], (2019)
14.
Zurück zum Zitat ITU-R M.2410–0, Minimum requirements related to technical performance for IMT-2020 radio interface(s) ITU-R M.2410–0, Minimum requirements related to technical performance for IMT-2020 radio interface(s)
15.
Zurück zum Zitat X. Wang et al., Millimeter wave communication: a comprehensive survey. IEEE Commun. Surv. Tutorials 20(3), 1616–1653 (2018)CrossRef X. Wang et al., Millimeter wave communication: a comprehensive survey. IEEE Commun. Surv. Tutorials 20(3), 1616–1653 (2018)CrossRef
17.
Zurück zum Zitat R. Shrestha, R. Bajracharya, S. Djuraev, S.Y. Nam, K.-S. Sohn, Performance evaluation of heterogeneous VANET based on simulation. Far East J. Electron. Commun. 2(1), 155–162 (2016)CrossRef R. Shrestha, R. Bajracharya, S. Djuraev, S.Y. Nam, K.-S. Sohn, Performance evaluation of heterogeneous VANET based on simulation. Far East J. Electron. Commun. 2(1), 155–162 (2016)CrossRef
18.
Zurück zum Zitat R. Shrestha, Sybil attack detection in vehicular network based on received signal strength, 1, (2014) R. Shrestha, Sybil attack detection in vehicular network based on received signal strength, 1, (2014)
20.
Zurück zum Zitat 3GPP, Service requirements for enhanced V2X scenarios, 2018 3GPP, Service requirements for enhanced V2X scenarios, 2018
21.
Zurück zum Zitat R. Shrestha, R. Bajracharya, S.Y. Nam, Challenges of future VANET and cloud—based approaches, Wirel. Commun. Mob. Comput., 2018, no. Article ID 5603518, 1–15 (2018) R. Shrestha, R. Bajracharya, S.Y. Nam, Challenges of future VANET and cloud—based approaches, Wirel. Commun. Mob. Comput., 2018, no. Article ID 5603518, 1–15 (2018)
22.
Zurück zum Zitat H.Y. Chao, M. Patel, D. Sabella, N. Sprecher, V. Young, Mobile edge computing a key technology towards 5G, ETSI (European Telecommun. Stand. Institute), pp. 1–16 (2015) H.Y. Chao, M. Patel, D. Sabella, N. Sprecher, V. Young, Mobile edge computing a key technology towards 5G, ETSI (European Telecommun. Stand. Institute), pp. 1–16 (2015)
23.
Zurück zum Zitat D. Sabella et al., Toward fully connected vehicles: edge computing for advanced automotive communications, 2017 D. Sabella et al., Toward fully connected vehicles: edge computing for advanced automotive communications, 2017
24.
Zurück zum Zitat ETSI, Multi-access Edge Computing (MEC): study on MEC support for V2X use cases, 2018 ETSI, Multi-access Edge Computing (MEC): study on MEC support for V2X use cases, 2018
25.
Zurück zum Zitat Open Network Foundation, White paper: software defined networking: the new norm for networks (Palo Alto, Calif, USA, 2012) Open Network Foundation, White paper: software defined networking: the new norm for networks (Palo Alto, Calif, USA, 2012)
26.
Zurück zum Zitat H. Kim, N. Feamster, Improving network management with software defined networking. IEEE Commun. Mag. 51(2), 114–119 (2013)CrossRef H. Kim, N. Feamster, Improving network management with software defined networking. IEEE Commun. Mag. 51(2), 114–119 (2013)CrossRef
27.
Zurück zum Zitat X. Duan, Y. Liu, X. Wang, SDN enabled 5G-VANET: adaptive vehicle clustering and beamformed transmission for aggregated traffic. IEEE Commun. Mag. 55(7), 120–127 (2017)CrossRef X. Duan, Y. Liu, X. Wang, SDN enabled 5G-VANET: adaptive vehicle clustering and beamformed transmission for aggregated traffic. IEEE Commun. Mag. 55(7), 120–127 (2017)CrossRef
28.
Zurück zum Zitat IEEE SA, IEEE 1609.2–2016—IEEE Standard for wireless access in vehicular environments–security services for applications and management messages, 2016 IEEE SA, IEEE 1609.2–2016—IEEE Standard for wireless access in vehicular environments–security services for applications and management messages, 2016
29.
Zurück zum Zitat F. Ahmad, A. Adnane, V.N.L. Franqueira, A systematic approach for cyber security in vehicular networks. J. Comput. Commun. 04(16), 38–62 (2016)CrossRef F. Ahmad, A. Adnane, V.N.L. Franqueira, A systematic approach for cyber security in vehicular networks. J. Comput. Commun. 04(16), 38–62 (2016)CrossRef
30.
Zurück zum Zitat T.W. Chim, S.M. Yiu, L.C.K. Hui, Z.L. Jiang, V.O.K. Li, SPECS: secure and privacy enhancing communications schemes for VANETs. Ad Hoc Netw. 9(2), 160–175 (2011)CrossRef T.W. Chim, S.M. Yiu, L.C.K. Hui, Z.L. Jiang, V.O.K. Li, SPECS: secure and privacy enhancing communications schemes for VANETs. Ad Hoc Netw. 9(2), 160–175 (2011)CrossRef
31.
Zurück zum Zitat S. Manvi, M. Kakkasageri, D. Adiga, Message authentication in vehicular ad hoc networks: ECDSA based approach, Int. Conf. Future Comput. Commun., pp. 16–20 (2009) S. Manvi, M. Kakkasageri, D. Adiga, Message authentication in vehicular ad hoc networks: ECDSA based approach, Int. Conf. Future Comput. Commun., pp. 16–20 (2009)
32.
Zurück zum Zitat D.K. Nilsson, U.E. Larson, A defense-in-depth approach to securing the wireless vehicle infrastructure. J. Networks 4, 552–564 (2009)CrossRef D.K. Nilsson, U.E. Larson, A defense-in-depth approach to securing the wireless vehicle infrastructure. J. Networks 4, 552–564 (2009)CrossRef
33.
Zurück zum Zitat N. Nikaein, S.K. Datta, I. Marecar, C. Bonnet, Application distribution model and related security attacks in VANET, Int. Conf. Graph. Image Process., 2012 N. Nikaein, S.K. Datta, I. Marecar, C. Bonnet, Application distribution model and related security attacks in VANET, Int. Conf. Graph. Image Process., 2012
34.
Zurück zum Zitat K.S. Tamil Selvan, R. Rajendiran, A holistic protocol for secure data transmission in VANET, Int. J. Adv. Res. Comput. Commun. Eng., 2, 4840–4849 (2013) K.S. Tamil Selvan, R. Rajendiran, A holistic protocol for secure data transmission in VANET, Int. J. Adv. Res. Comput. Commun. Eng., 2, 4840–4849 (2013)
35.
Zurück zum Zitat Y.C. Hu, A. Perrig, D. Johnson, Packet leashes: a defense against wormhole attacks in wireless networks, in 22nd Annual Joint Conference of the IEEE Computer and Communications, pp. 1976–1986 (2003) Y.C. Hu, A. Perrig, D. Johnson, Packet leashes: a defense against wormhole attacks in wireless networks, in 22nd Annual Joint Conference of the IEEE Computer and Communications, pp. 1976–1986 (2003)
36.
Zurück zum Zitat S.M. Safi, M. Movaghar, A. Mohammadizadeh, Novel approach for avoiding wormhole attack in VANET, in 1st Asian Himalayas International Conference on Internet, pp. 54–59 (2009) S.M. Safi, M. Movaghar, A. Mohammadizadeh, Novel approach for avoiding wormhole attack in VANET, in 1st Asian Himalayas International Conference on Internet, pp. 54–59 (2009)
37.
Zurück zum Zitat K. Verma, H. Hasbullah, A. Kumar, Prevention of DoS attacks in VANET. Wirel. Pers. Commun. 73, 95–126 (2013)CrossRef K. Verma, H. Hasbullah, A. Kumar, Prevention of DoS attacks in VANET. Wirel. Pers. Commun. 73, 95–126 (2013)CrossRef
38.
Zurück zum Zitat L. Mokdad, J. Ben-Othman, A. Tuan Nguyen, DJAVAN: detecting jamming attacks in vehicle ad hoc networks, Perform. Eval., 87(C), pp. 47–59 (2015) L. Mokdad, J. Ben-Othman, A. Tuan Nguyen, DJAVAN: detecting jamming attacks in vehicle ad hoc networks, Perform. Eval., 87(C), pp. 47–59 (2015)
39.
Zurück zum Zitat C. Zhang, R. Lu, X. Lin, P.H. Ho, X. Shen, An efficient identity-based batch verification scheme for vehicular sensor networks, in The 27th IEEE Conference on Computer Communications, pp. 816–824 (2008) C. Zhang, R. Lu, X. Lin, P.H. Ho, X. Shen, An efficient identity-based batch verification scheme for vehicular sensor networks, in The 27th IEEE Conference on Computer Communications, pp. 816–824 (2008)
40.
Zurück zum Zitat T.E. Montgomery, P.Y. Humphreys, B.M. Ledvina, Receiver-autonomous spoofing detection: experimental results of a multi-antenna receiver defense against a portable civil GPS spoofer, in Proceedings of the ION International Technical Meeting, pp. 124–130 (2009) T.E. Montgomery, P.Y. Humphreys, B.M. Ledvina, Receiver-autonomous spoofing detection: experimental results of a multi-antenna receiver defense against a portable civil GPS spoofer, in Proceedings of the ION International Technical Meeting, pp. 124–130 (2009)
41.
Zurück zum Zitat T. Leinmuller, C. Maihofer, E. Schoch, F. Kargl, Improved security in geographic ad hoc routing through autonomous position verification, in Proceedings of the 3rd International Workshop on Vehicular Ad Hoc Networks, pp. 57–66 (2006) T. Leinmuller, C. Maihofer, E. Schoch, F. Kargl, Improved security in geographic ad hoc routing through autonomous position verification, in Proceedings of the 3rd International Workshop on Vehicular Ad Hoc Networks, pp. 57–66 (2006)
42.
Zurück zum Zitat C. Chen, X. Wang, W. Han, B. Zang, A robust detection of the sybil attack in urban VANETs, in 29th IEEE International Conference on Distributed Computing Systems Workshops, pp. 270–276 (2009) C. Chen, X. Wang, W. Han, B. Zang, A robust detection of the sybil attack in urban VANETs, in 29th IEEE International Conference on Distributed Computing Systems Workshops, pp. 270–276 (2009)
43.
Zurück zum Zitat F. Gómez Mármol, G. Martínez Pérez, TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks, J. Netw. Comput. Appl., 35(3), 934–941 (2012) F. Gómez Mármol, G. Martínez Pérez, TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks, J. Netw. Comput. Appl., 35(3), 934–941 (2012)
44.
Zurück zum Zitat Y.M. Chen, Y.C. Wei, A beacon-based trust management system for enhancing user centric location privacy in VANETs. J. Commun. Networks 15(2), 153–163 (2013)CrossRef Y.M. Chen, Y.C. Wei, A beacon-based trust management system for enhancing user centric location privacy in VANETs. J. Commun. Networks 15(2), 153–163 (2013)CrossRef
45.
Zurück zum Zitat C. Gentry, A fully homomorphic encryption scheme, Stanford University, 2009 C. Gentry, A fully homomorphic encryption scheme, Stanford University, 2009
46.
Zurück zum Zitat W. Jiang, D. Lin, F. Li, E. Bertino, Randomized and efficient authentication in mobile environments, Cyber Center Publication, pp. 1–15, 2014 W. Jiang, D. Lin, F. Li, E. Bertino, Randomized and efficient authentication in mobile environments, Cyber Center Publication, pp. 1–15, 2014
48.
Zurück zum Zitat S. Kim, Blockchain for a Trust Network Among Intelligent Vehicles, 1st edn. vol. 111. (Elsevier Inc., 2018) S. Kim, Blockchain for a Trust Network Among Intelligent Vehicles, 1st edn. vol. 111. (Elsevier Inc., 2018)
49.
Zurück zum Zitat A. Dorri, M. Steger, S. Kanhere, R. Jurdak, BlockChain: a distributed solution to automotive security and privacy, IEEE Commun. Mag. Mag., 55(12), 119–125 (2009) A. Dorri, M. Steger, S. Kanhere, R. Jurdak, BlockChain: a distributed solution to automotive security and privacy, IEEE Commun. Mag. Mag., 55(12), 119–125 (2009)
50.
Zurück zum Zitat M. Cebe, E. Erdin, K. Akkaya, H. Aksu, S. Uluagac, Block4Forensic: an integrated lightweight blockchain framework for forensics applications of connected vehicles. IEEE Commun. Mag. 56(10), 50–57 (2018)CrossRef M. Cebe, E. Erdin, K. Akkaya, H. Aksu, S. Uluagac, Block4Forensic: an integrated lightweight blockchain framework for forensics applications of connected vehicles. IEEE Commun. Mag. 56(10), 50–57 (2018)CrossRef
53.
Zurück zum Zitat A. Chattopadhyay, K.-Y. Lam, Autonomous vehicle: security by design, 2018 A. Chattopadhyay, K.-Y. Lam, Autonomous vehicle: security by design, 2018
Metadaten
Titel
Inter-Vehicle Communication and Cyber Security
verfasst von
Shiho Kim
Rakesh Shrestha
Copyright-Jahr
2020
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-15-8053-6_6

    Premium Partner