Loading [MathJax]/extensions/MathZoom.js
Essential Technics of Cybersecurity for Intelligent Connected Vehicles: Comprehensive Review and Perspective | IEEE Journals & Magazine | IEEE Xplore

Essential Technics of Cybersecurity for Intelligent Connected Vehicles: Comprehensive Review and Perspective


Abstract:

Along with the promotion of intelligent connected vehicles (ICVs), the problems of network attacks have rapidly increased, and thus the cybersecurity has drawn much atten...Show More

Abstract:

Along with the promotion of intelligent connected vehicles (ICVs), the problems of network attacks have rapidly increased, and thus the cybersecurity has drawn much attention. Unfortunately, although remarkable progress has been achieved both in technics and standard, it still remains vague for designing vehicular cybersecurity. In this article, the general technical profile of cybersecurity for ICVs has been comprehensively reviewed, including threat analysis and risk assessment, static defense, and intrusion detection. The potential attacking vulnerabilities for ICVs are summarized, within in-vehicle network and mobile networks. Then, the identity authentication and secure communication methods are introduced from static defense, where the conventional and novel intelligent approach are included. And the intrusion detection is introduced as the active methods, including conventional and novel ones. Moreover, the general procedure and management for designing the vehicular cybersecurity are also summarized according to the current standard system. It hopes that the review of research progress on technical method may help researchers and manufactures, and delivers the potential direction for future cybersecurity development.
Published in: IEEE Internet of Things Journal ( Volume: 10, Issue: 24, 15 December 2023)
Page(s): 21787 - 21810
Date of Publication: 04 August 2023

ISSN Information:

Funding Agency:


I. Introduction

Along with the rapid innovation of vehicular technologies, ICVs have been gradually promoted worldwide and lead the direction of technical development for the next generation of vehicles. Perception, controlling, and decision methods help ICVs to understand driving situations and guarantee the safety. Moreover, the diversified communications methods provide more approaches for ICVs to realize surrounding environments and make decisions. Presented as Fig. 1, the diversity of communication is one of the typical characteristics for ICVs, where the vehicle may access to cloud-platform (vehicle-to-Internet), surrounding vehicle (vehicle-to-vehicle) and people (vehicle-to-person). Diverse accessing approach results in abundant functions and contributes to improve the user’s experience. Unfortunately, the abundance of functions leads to another problem—the risking attacks. Moreover, ICVs always incorporate various intelligent sensors, such as lidar, video camera, GPS, and others. The diverse sensors significantly benefit the perception of the dynamic environment, but they also increase the potential risking cyber-attack and result in threats for cybersecurity.

Landscape of vehicular ad-hoc networks [1].

Contact IEEE to Subscribe

References

References is not available for this document.