Cyber security analysis of connected vehicles

8Citations
Citations of this article
34Readers
Mendeley users who have this article in their library.

Abstract

The sensor-enabled in-vehicle communication and infrastructure-centric vehicle-to-everything (V2X) communications have significantly contributed to the spark in the amount of data exchange in the connected and autonomous vehicles (CAV) environment. The growing vehicular communications pose a potential cyber security risk considering online vehicle hijacking. Therefore, there is a critical need to prioritize the cyber security issues in the CAV research theme. In this context, this paper presents a cyber security analysis of connected vehicle traffic environments (CyACV). Specifically, potential cyber security attacks in CAV are critically investigated and validated via experimental data sets. Trust in V2X communication for connected vehicles is explored in detail focusing on trust computation and trust management approaches and related challenges. A wide range of trust-based cyber security solutions for CAV have been critically investigated considering their strengths and weaknesses. Open research directions have been highlighted as potential new research themes in CAV cyber security area.

Cite

CITATION STYLE

APA

Mwanje, M. D., Kaiwartya, O., Aljaidi, M., Cao, Y., Kumar, S., Jha, D. N., … Lloret, J. (2024, July 1). Cyber security analysis of connected vehicles. IET Intelligent Transport Systems. John Wiley and Sons Inc. https://doi.org/10.1049/itr2.12504

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free