Comprehensive Survey on Vehicular Communication Security
Significant advancements in Cooperative and Autonomous Driving via Vehicle-to-everything (V2X) communications owe much to the rapid expansion and technological progress in vehicular communications, promising benefits like enhanced traffic flow and reduced energy consumption. However, this reliance o...
Gespeichert in:
Veröffentlicht in: | Journal of Cyber Security and Mobility 2024-09, p.1007-1038 |
---|---|
Hauptverfasser: | , , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 1038 |
---|---|
container_issue | |
container_start_page | 1007 |
container_title | Journal of Cyber Security and Mobility |
container_volume | |
creator | Ismail, Tayssir Touati, Haifa Hajlaoui, Nasreddine Hadded, Mohamed Muhlethaler, Paul Bouzefrane, Samia Saidane, Leila Azouz |
description | Significant advancements in Cooperative and Autonomous Driving via Vehicle-to-everything (V2X) communications owe much to the rapid expansion and technological progress in vehicular communications, promising benefits like enhanced traffic flow and reduced energy consumption. However, this reliance on connected vehicles opens new security vulnerabilities.
This study provides a comprehensive overview of challenges in existing vehicular communications, with a specific focus on security attacks categorised by their impact on MAC, routing, and cross-layer levels. To ensure secure vehicular communication, we analyse existing solutions for both single and cross-layer attacks, evaluating their strengths and limitations from a security standpoint. Additionally, we innovate by addressing vulnerabilities across MAC, routing, and cross-layer interactions, offering practical insights and a unique approach to mitigating their combined impact. Our findings suggest that enhancements are needed for MAC layer security in TDMA protocols, and that routing protocols must be designed with better security features to manage high overheads and real-time requirements. |
doi_str_mv | 10.13052/jcsm2245-1439.1359 |
format | Article |
fullrecord | <record><control><sourceid>hal_cross</sourceid><recordid>TN_cdi_hal_primary_oai_HAL_hal_04703788v1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>oai_HAL_hal_04703788v1</sourcerecordid><originalsourceid>FETCH-LOGICAL-c1239-66ee23930f3b6d0c5b7705b876cc620ef5943a89f51f52d3deab9234ad22bb293</originalsourceid><addsrcrecordid>eNo9kLFOwzAQhi0EElXpE7BkZQjYPju2x6oCWqkSQ4HVsh1HMUqaym4q5e1J2sL0n77774YPoUeCnwlgTl9-XGopZTwnDNTIuLpBszNgXMjb6zwt79EipWAxYMIlEWyG5KprD9HXfp_CyWe7Pp78kHX77NvXwfWNidnYaPt9cOYYRr7zro_hODygu8o0yS-uOUdfb6-fq3W-_XjfrJbb3BEKKi8K78cEXIEtSuy4FQJzK0XhXEGxr7hiYKSqOKk4LaH0xioKzJSUWksVzNHT5W9tGn2IoTVx0J0Jer3c6olhJjAIKU9k7MKl62KXUvTV_wHB-uxK_7nSkw49uYJfWbNcwQ</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Comprehensive Survey on Vehicular Communication Security</title><source>EZB-FREE-00999 freely available EZB journals</source><creator>Ismail, Tayssir ; Touati, Haifa ; Hajlaoui, Nasreddine ; Hadded, Mohamed ; Muhlethaler, Paul ; Bouzefrane, Samia ; Saidane, Leila Azouz</creator><creatorcontrib>Ismail, Tayssir ; Touati, Haifa ; Hajlaoui, Nasreddine ; Hadded, Mohamed ; Muhlethaler, Paul ; Bouzefrane, Samia ; Saidane, Leila Azouz</creatorcontrib><description>Significant advancements in Cooperative and Autonomous Driving via Vehicle-to-everything (V2X) communications owe much to the rapid expansion and technological progress in vehicular communications, promising benefits like enhanced traffic flow and reduced energy consumption. However, this reliance on connected vehicles opens new security vulnerabilities.
This study provides a comprehensive overview of challenges in existing vehicular communications, with a specific focus on security attacks categorised by their impact on MAC, routing, and cross-layer levels. To ensure secure vehicular communication, we analyse existing solutions for both single and cross-layer attacks, evaluating their strengths and limitations from a security standpoint. Additionally, we innovate by addressing vulnerabilities across MAC, routing, and cross-layer interactions, offering practical insights and a unique approach to mitigating their combined impact. Our findings suggest that enhancements are needed for MAC layer security in TDMA protocols, and that routing protocols must be designed with better security features to manage high overheads and real-time requirements.</description><identifier>ISSN: 2245-1439</identifier><identifier>EISSN: 2245-4578</identifier><identifier>DOI: 10.13052/jcsm2245-1439.1359</identifier><language>eng</language><publisher>River Publishers</publisher><subject>Computer Science</subject><ispartof>Journal of Cyber Security and Mobility, 2024-09, p.1007-1038</ispartof><rights>Distributed under a Creative Commons Attribution 4.0 International License</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>230,314,776,780,881,27901,27902</link.rule.ids><backlink>$$Uhttps://hal.science/hal-04703788$$DView record in HAL$$Hfree_for_read</backlink></links><search><creatorcontrib>Ismail, Tayssir</creatorcontrib><creatorcontrib>Touati, Haifa</creatorcontrib><creatorcontrib>Hajlaoui, Nasreddine</creatorcontrib><creatorcontrib>Hadded, Mohamed</creatorcontrib><creatorcontrib>Muhlethaler, Paul</creatorcontrib><creatorcontrib>Bouzefrane, Samia</creatorcontrib><creatorcontrib>Saidane, Leila Azouz</creatorcontrib><title>Comprehensive Survey on Vehicular Communication Security</title><title>Journal of Cyber Security and Mobility</title><description>Significant advancements in Cooperative and Autonomous Driving via Vehicle-to-everything (V2X) communications owe much to the rapid expansion and technological progress in vehicular communications, promising benefits like enhanced traffic flow and reduced energy consumption. However, this reliance on connected vehicles opens new security vulnerabilities.
This study provides a comprehensive overview of challenges in existing vehicular communications, with a specific focus on security attacks categorised by their impact on MAC, routing, and cross-layer levels. To ensure secure vehicular communication, we analyse existing solutions for both single and cross-layer attacks, evaluating their strengths and limitations from a security standpoint. Additionally, we innovate by addressing vulnerabilities across MAC, routing, and cross-layer interactions, offering practical insights and a unique approach to mitigating their combined impact. Our findings suggest that enhancements are needed for MAC layer security in TDMA protocols, and that routing protocols must be designed with better security features to manage high overheads and real-time requirements.</description><subject>Computer Science</subject><issn>2245-1439</issn><issn>2245-4578</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><recordid>eNo9kLFOwzAQhi0EElXpE7BkZQjYPju2x6oCWqkSQ4HVsh1HMUqaym4q5e1J2sL0n77774YPoUeCnwlgTl9-XGopZTwnDNTIuLpBszNgXMjb6zwt79EipWAxYMIlEWyG5KprD9HXfp_CyWe7Pp78kHX77NvXwfWNidnYaPt9cOYYRr7zro_hODygu8o0yS-uOUdfb6-fq3W-_XjfrJbb3BEKKi8K78cEXIEtSuy4FQJzK0XhXEGxr7hiYKSqOKk4LaH0xioKzJSUWksVzNHT5W9tGn2IoTVx0J0Jer3c6olhJjAIKU9k7MKl62KXUvTV_wHB-uxK_7nSkw49uYJfWbNcwQ</recordid><startdate>20240903</startdate><enddate>20240903</enddate><creator>Ismail, Tayssir</creator><creator>Touati, Haifa</creator><creator>Hajlaoui, Nasreddine</creator><creator>Hadded, Mohamed</creator><creator>Muhlethaler, Paul</creator><creator>Bouzefrane, Samia</creator><creator>Saidane, Leila Azouz</creator><general>River Publishers</general><scope>AAYXX</scope><scope>CITATION</scope><scope>1XC</scope></search><sort><creationdate>20240903</creationdate><title>Comprehensive Survey on Vehicular Communication Security</title><author>Ismail, Tayssir ; Touati, Haifa ; Hajlaoui, Nasreddine ; Hadded, Mohamed ; Muhlethaler, Paul ; Bouzefrane, Samia ; Saidane, Leila Azouz</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c1239-66ee23930f3b6d0c5b7705b876cc620ef5943a89f51f52d3deab9234ad22bb293</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Computer Science</topic><toplevel>online_resources</toplevel><creatorcontrib>Ismail, Tayssir</creatorcontrib><creatorcontrib>Touati, Haifa</creatorcontrib><creatorcontrib>Hajlaoui, Nasreddine</creatorcontrib><creatorcontrib>Hadded, Mohamed</creatorcontrib><creatorcontrib>Muhlethaler, Paul</creatorcontrib><creatorcontrib>Bouzefrane, Samia</creatorcontrib><creatorcontrib>Saidane, Leila Azouz</creatorcontrib><collection>CrossRef</collection><collection>Hyper Article en Ligne (HAL)</collection><jtitle>Journal of Cyber Security and Mobility</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Ismail, Tayssir</au><au>Touati, Haifa</au><au>Hajlaoui, Nasreddine</au><au>Hadded, Mohamed</au><au>Muhlethaler, Paul</au><au>Bouzefrane, Samia</au><au>Saidane, Leila Azouz</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Comprehensive Survey on Vehicular Communication Security</atitle><jtitle>Journal of Cyber Security and Mobility</jtitle><date>2024-09-03</date><risdate>2024</risdate><spage>1007</spage><epage>1038</epage><pages>1007-1038</pages><issn>2245-1439</issn><eissn>2245-4578</eissn><abstract>Significant advancements in Cooperative and Autonomous Driving via Vehicle-to-everything (V2X) communications owe much to the rapid expansion and technological progress in vehicular communications, promising benefits like enhanced traffic flow and reduced energy consumption. However, this reliance on connected vehicles opens new security vulnerabilities.
This study provides a comprehensive overview of challenges in existing vehicular communications, with a specific focus on security attacks categorised by their impact on MAC, routing, and cross-layer levels. To ensure secure vehicular communication, we analyse existing solutions for both single and cross-layer attacks, evaluating their strengths and limitations from a security standpoint. Additionally, we innovate by addressing vulnerabilities across MAC, routing, and cross-layer interactions, offering practical insights and a unique approach to mitigating their combined impact. Our findings suggest that enhancements are needed for MAC layer security in TDMA protocols, and that routing protocols must be designed with better security features to manage high overheads and real-time requirements.</abstract><pub>River Publishers</pub><doi>10.13052/jcsm2245-1439.1359</doi><tpages>32</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2245-1439 |
ispartof | Journal of Cyber Security and Mobility, 2024-09, p.1007-1038 |
issn | 2245-1439 2245-4578 |
language | eng |
recordid | cdi_hal_primary_oai_HAL_hal_04703788v1 |
source | EZB-FREE-00999 freely available EZB journals |
subjects | Computer Science |
title | Comprehensive Survey on Vehicular Communication Security |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-08T14%3A33%3A57IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-hal_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Comprehensive%20Survey%20on%20Vehicular%20Communication%20Security&rft.jtitle=Journal%20of%20Cyber%20Security%20and%20Mobility&rft.au=Ismail,%20Tayssir&rft.date=2024-09-03&rft.spage=1007&rft.epage=1038&rft.pages=1007-1038&rft.issn=2245-1439&rft.eissn=2245-4578&rft_id=info:doi/10.13052/jcsm2245-1439.1359&rft_dat=%3Chal_cross%3Eoai_HAL_hal_04703788v1%3C/hal_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |