Loading [MathJax]/extensions/MathZoom.js
Essential Technics of Cybersecurity for Intelligent Connected Vehicles: Comprehensive Review and Perspective | IEEE Journals & Magazine | IEEE Xplore

Essential Technics of Cybersecurity for Intelligent Connected Vehicles: Comprehensive Review and Perspective


Abstract:

Along with the promotion of intelligent connected vehicles (ICVs), the problems of network attacks have rapidly increased, and thus the cybersecurity has drawn much atten...Show More

Abstract:

Along with the promotion of intelligent connected vehicles (ICVs), the problems of network attacks have rapidly increased, and thus the cybersecurity has drawn much attention. Unfortunately, although remarkable progress has been achieved both in technics and standard, it still remains vague for designing vehicular cybersecurity. In this article, the general technical profile of cybersecurity for ICVs has been comprehensively reviewed, including threat analysis and risk assessment, static defense, and intrusion detection. The potential attacking vulnerabilities for ICVs are summarized, within in-vehicle network and mobile networks. Then, the identity authentication and secure communication methods are introduced from static defense, where the conventional and novel intelligent approach are included. And the intrusion detection is introduced as the active methods, including conventional and novel ones. Moreover, the general procedure and management for designing the vehicular cybersecurity are also summarized according to the current standard system. It hopes that the review of research progress on technical method may help researchers and manufactures, and delivers the potential direction for future cybersecurity development.
Published in: IEEE Internet of Things Journal ( Volume: 10, Issue: 24, 15 December 2023)
Page(s): 21787 - 21810
Date of Publication: 04 August 2023

ISSN Information:

Funding Agency:

References is not available for this document.

I. Introduction

Along with the rapid innovation of vehicular technologies, ICVs have been gradually promoted worldwide and lead the direction of technical development for the next generation of vehicles. Perception, controlling, and decision methods help ICVs to understand driving situations and guarantee the safety. Moreover, the diversified communications methods provide more approaches for ICVs to realize surrounding environments and make decisions. Presented as Fig. 1, the diversity of communication is one of the typical characteristics for ICVs, where the vehicle may access to cloud-platform (vehicle-to-Internet), surrounding vehicle (vehicle-to-vehicle) and people (vehicle-to-person). Diverse accessing approach results in abundant functions and contributes to improve the user’s experience. Unfortunately, the abundance of functions leads to another problem—the risking attacks. Moreover, ICVs always incorporate various intelligent sensors, such as lidar, video camera, GPS, and others. The diverse sensors significantly benefit the perception of the dynamic environment, but they also increase the potential risking cyber-attack and result in threats for cybersecurity.

Landscape of vehicular ad-hoc networks [1].

Select All
1.
M. Safwat, A. Elgammal, E. G. AbdAllah and M. A. Azer, "Survey and taxonomy of information-centric vehicular networking security attacks", Ad Hoc Netw., vol. 124, Jan. 2022.
2.
Y. Xie, Y. Zhou, J. Xu, J. Zhou, X. Chen and F. Xiao, "Cybersecurity protection on in-vehicle networks for distributed automotive cyber-physical systems: State-of-the-art and future challenges", Softw. Pract. Exp., vol. 51, no. 11, pp. 2108-2127, 2021.
3.
M. Dibaei et al., "Attacks and defences on intelligent connected vehicles: A survey", Digit. Commun. Netw., vol. 6, no. 4, pp. 399-421, 2020.
4.
D. Zhang, Y.-P. Shen, S.-Q. Zhou, X.-W. Dong and L. Yu, "Distributed secure platoon control of connected vehicles subject to DoS attack: Theory and application", IEEE Trans. Syst. Man Cybern. Syst., vol. 51, no. 11, pp. 7269-7278, Nov. 2021.
5.
S. Ohira, A. K. Desta, I. Arai, H. Inoue and K. Fujikawa, "Normal and malicious sliding windows similarity analysis method for fast and accurate IDS against DoS attacks on in-vehicle networks", IEEE Access, vol. 8, pp. 42422-42435, 2020.
6.
J. Li, Z. Xue, C. Li and M. Liu, "RTED-SD: A real-time edge detection scheme for Sybil DDoS in the Internet of Vehicles", IEEE Access, vol. 9, pp. 11296-11305, 2021.
7.
Y. Ma, Z. Nie, S. Hu, Z. Li, R. Malekian and M. Sotelo, "Fault detection filter and controller co-design for unmanned surface vehicles under DoS attacks", IEEE Trans. Intell. Transp. Syst., vol. 22, no. 3, pp. 1422-1434, Mar. 2021.
8.
Z. A. Biron, S. Dey and P. Pisu, "Real-time detection and estimation of denial of service attack in connected vehicle systems", IEEE Trans. Intell. Transp. Syst., vol. 19, no. 12, pp. 3893-3902, Dec. 2018.
9.
Z. Hassan, A. Mehmood, C. Maple, M. A. Khan and A. Aldegheishem, "Intelligent detection of black hole attacks for secure communication in autonomous and connected vehicles", IEEE Access, vol. 8, pp. 199618-199628, 2020.
10.
S. Chang, Y. Qi, H. Zhu, J. Zhao and X. Shen, "Footprint: Detecting Sybil attacks in urban vehicular networks", IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 6, pp. 1103-1114, Jun. 2012.
11.
R. Shrestha, S. Djuraev and S. Y. Nam, "Sybil attack detection in vehicular network based on received signal strength", Int. Conf. Connected Veh. Expo (ICCVE), pp. 745-746, 2014.
12.
P. Faruki et al., "Android Security: A survey of issues malware penetration and defenses", IEEE Commun. Surveys Tuts., vol. 17, no. 2, pp. 998-1022, 2nd Quart. 2015.
13.
C. S. Ramaiah, S. Z. Hussain, S. A. Hussain and Y. A. Balushi, "Smart vehicle security system for defending against collabrative attacks by malware", 3rd MEC Int. Conf. Big Data Smart City (ICBDSC), pp. 1-5, 2016.
14.
J. F. Roscoe, O. Baxandall and R. Hercock, "Simulation of malware propagation and effects in connected and autonomous vehicles", Int. Conf. Comput. Electron. Commun. Eng. (iCCECE), 2020.
15.
A. A. Elkhail, R. U. D. Refat, R. Habre, A. Hafeez, A. Bacha and H. Malik, "Vehicle security: A survey of security issues and vulnerabilities malware attacks and defenses", IEEE Access, vol. 9, pp. 162401-162437, 2021.
16.
T. Zhang, H. Antunes and S. Aggarwal, "Defending connected vehicles against malware: Challenges and a solution framework", IEEE Internet Things J., vol. 1, no. 1, pp. 10-21, Feb. 2014.
17.
A. I. Alrabady and S. M. Mahmud, "Analysis of attacks against the security of keyless-entry systems for vehicles and suggestions for improved designs", IEEE Trans. Veh. Technol., vol. 54, no. 1, pp. 41-50, Jan. 2005.
18.
S. van de Beek and F. Leferink, "Vulnerability of remote keyless-entry systems against pulsed electromagnetic interference and possible improvements", IEEE Trans. Electromagn. Compat., vol. 58, no. 4, pp. 1259-1265, Aug. 2016.
19.
E. Mousavinejad, F. Yang, Q.-L. Han, X. Ge and L. Vlacic, "Distributed cyber attacks detection and recovery mechanism for vehicle platooning", IEEE Trans. Intell. Transp. Syst., vol. 21, no. 9, pp. 3821-3834, Sep. 2020.
20.
M. M. Rana, "Attack resilient wireless sensor networks for smart electric vehicles", IEEE Sens. Lett., vol. 1, no. 2, pp. 1-4, Apr. 2017.
21.
M. Cheah, S. A. Shaikh, O. Haas and A. Ruddle, "Towards a systematic security evaluation of the automotive Bluetooth interface", Veh. Commun., vol. 9, pp. 8-18, Jul. 2017.
22.
A. Dardanelli et al., "A security layer for smartphone-to-vehicle communication Over Bluetooth", IEEE Embedded Syst. Lett., vol. 5, no. 3, pp. 34-37, Sep. 2013.
23.
X. He, E. Hashemi and K. H. Johansson, "Distributed control under compromised measurements: Resilient estimation attack detection and vehicle platooning", Automatica, vol. 134, Dec. 2021.
24.
P. F. De Araujo-Filho, A. J. Pinheiro, G. Kaddoum, D. R. Campelo and F. L. Soares, "An efficient intrusion prevention system for can: Hindering cyber-attacks with a low-cost platform", IEEE Access, vol. 9, pp. 166855-166869, 2021.
25.
M. A. Rahman, M. S. Hossain, M. M. Rashid, S. Barnes and E. Hassanain, "IoEV-Chain: A 5G-based secure inter-connected mobility framework for the Internet of electric vehicles", IEEE Netw., vol. 34, no. 5, pp. 190-197, Sep./Oct. 2020.
26.
D. Jiang and L. Delgrossi, "IEEE 802.11p: Towards an international standard for wireless access in vehicular environments", VTC Spring IEEE Veh. Technol. Conf, 2008.
27.
Y. Sun, R. Lu, X. Lin, X. Shen and J. Su, "An Efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications", IEEE Trans. Veh. Technol., vol. 59, no. 7, pp. 3589-3603, Sep. 2010.
28.
J. Petit and S. E. Shladover, "Potential cyberattacks on automated vehicles", IEEE Trans. Intell. Transp. Syst., vol. 16, no. 2, pp. 546-556, Apr. 2015.
29.
J. Cao et al., "A survey on security aspects for 3GPP 5G networks", IEEE Commun. Surveys Tuts., vol. 22, no. 1, pp. 170-195, 1st Quart. 2020.
30.
M. Raya and J.-P. Hubaux, "Securing vehicular ad hoc networks", J. Comput. Security, vol. 15, no. 1, pp. 39-68, 2007.

Contact IEEE to Subscribe

References

References is not available for this document.