Security issues and challenges in V2X: A survey

A Ghosal, M Conti - Computer Networks, 2020 - Elsevier
Computer Networks, 2020Elsevier
In its latest report, the United States National Highway Traffic Safety Administration (NHTSA)
registered some 37,300 fatalities for the yearly victims of motor vehicle accidents in 2017.
Vehicle-to-everything (V2X) is playing an important role in improving road safety, traffic
efficiency and infotainment systems. With the growth of the connected vehicle technology,
V2X is emerging as a key component in the rapid rise of this technology. Therefore,
researchers think that development of robust wireless communication through efficient V2X …
Abstract
In its latest report, the United States National Highway Traffic Safety Administration (NHTSA) registered some 37,300 fatalities for the yearly victims of motor vehicle accidents in 2017. Vehicle-to-everything (V2X) is playing an important role in improving road safety, traffic efficiency and infotainment systems. With the growth of the connected vehicle technology, V2X is emerging as a key component in the rapid rise of this technology. Therefore, researchers think that development of robust wireless communication through efficient V2X technologies can significantly improve the vehicular environment. The highly dynamic environment and the mobility factor appear to be challenging for implementation of V2X technology. Similar to other wireless technology, the security issues are also key concerns in V2X.
In this survey, we highlight and discuss the main security issues of V2X. Particularly, the main objective of this survey is providing for a comprehensive and structured outline of different research directions and approaches, mostly emphasizing on the security issues and challenges in V2X communication technologies. At first, we discuss the key features of V2X and focus on the standardization techniques used for communication technologies. Then, we introduce the security challenges and requirements of V2X. We also classify present state-of-the-art works dealing with implementing different secured techniques in V2X. We further discuss the project implementation that concentrated on the various applications in V2X. Finally, we identify possible future research directions of V2X, particularly in the area of security.
Elsevier
以上显示的是最相近的搜索结果。 查看全部搜索结果