Cyber Security Standards and Issues in V2x Communications

نویسنده

  • IVAN IVANOV
چکیده

Significant developments have taken place over the past few years in the area of vehicular communication systems in the ITS environment, where the vulnerability of a vehicle can be propagated to the other vehicles since the V2X communication is an ad-hoc type network. Thus security function should be considered in developing vehicular communication technologies. Recently, many standard organisations are working on making international standard related with vehicular communication security. This paper presents the current V2X communications cyber security and standardisation issues being considered by standardisation bodies such as ISO, ITU, IEEE, and ETSI.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Security Credential Management System for V2X Communications

The US Department of Transportation (USDOT) issued a proposed rule on January 12th, 2017 to mandate vehicle-to-vehicle (V2V) safety communications in light vehicles in the US. Cybersecurity and privacy are major challenges for such a deployment. The authors present a Security Credential Management System (SCMS) for vehicle-to-everything (V2X) communications in this paper, which has been develop...

متن کامل

A Survey on Security Issues of M2M Communications in Cyber-Physical Systems

In this paper, we present a survey of security and privacy preserving issues in M2M communications in Cyber-Physical Systems. First, we discuss the security challenges in M2M communications in wireless networks of Cyber-Physical Systems and outline the constraints, attack issues, and a set of challenges that need to be addressed for building secure Cyber-Physical Systems. Then, a secure archite...

متن کامل

Cyber Security in the UK

 Cyber security was one of four top priorities for UK national security in the 2010 National Security Strategy.  Effective approaches to cyber security integrate technological measures with those relating to processes and personnel.  There is no overarching regulation of cyber security in the UK, although a growing number of organisations are complying with voluntary standards.  Better comm...

متن کامل

An Overview of Group Key Management Issues in IEEE 802.16e Networks

The computer industry has defined the IEEE 802.16 family of standards that will enable mobile devices to access a broadband network as an alternative to digital subscriber line technology. As the mobile devices join and leave a network, security measures must be taken to ensure the safety of the network against unauthorized usage by encryption and group key management. IEEE 802.16e uses Multica...

متن کامل

V2X Security & Privacy: The Current State and Its Future

Vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication is currently a focus of research and standardization in the USA, Europe and Asia. It is believed that V2V safety applications are able to reduce traffic fatalities significantly. Data security was identified as a major technical aspect to resolve before potential deployment. In particular, communication security and priv...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017