An environment for testing V2X communication scenarios

GHM AMANDO - 2023 - repositorio.ufpe.br
Most cars have 10-15 ECUs that control functions, including powertrain. Luxury cars have up
to 70 ECUs to support the most recent technologies, such as self-driving (autonomous) cars …

Security in use cases of vehicle-to-everything communications

K Bian, G Zhang, L Song - 2017 IEEE 86th Vehicular …, 2017 - ieeexplore.ieee.org
Vehicle-to-everything (V2X) communications enable the information exchange between the
vehicle and the infrastructure, pedestrian, device, or any other entity that may affect the …

Securing vehicle-to-everything (V2X) communication platforms

M Hasan, S Mohan, T Shimizu… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Modern vehicular wireless technology enables vehicles to exchange information at any time,
from any place, to any network-forms the vehicle-to-everything (V2X) communication …

Wireless Threats Against V2X Communication

A Boström, F Wotawa - 2023 IEEE 23rd International …, 2023 - ieeexplore.ieee.org
As the automotive industry increasingly relies on wireless technologies, a new attack surface
emerges, posing significant security threats to modern cars. This paper investigates the …

A comprehensive survey of v2x cybersecurity mechanisms and future research paths

R Sedar, C Kalalas, F Vázquez-Gallego… - IEEE Open Journal …, 2023 - ieeexplore.ieee.org
Recent advancements in vehicle-to-everything (V2X) communication have notably improved
existing transport systems by enabling increased connectivity and driving autonomy levels …

[PDF][PDF] Commonalities in vehicle vulnerabilities

C Thuen - Retrieved from Infosecurity, 2016 - ioactive.com
Abstract With the Connected Car becoming commonplace in the market, vehicle
cybersecurity grows more important by the year. At the forefront of this growing area of …

Applied Quasi-Experimentation: Attacking Non-Connected & Connected Vehicle Systems Via Remote Commercial Off-The-Shelf Attack Implant

CM Stone - 2023 - search.proquest.com
The research presented in this dissertation examines threat vectors that could attack a
controller area network (CAN) bus network via a remote vehicle connection or a remotely …

Cyber-attacks on autonomous vehicles

I Kazoleas - 2022 - search.proquest.com
This thesis deals with the operation and the communication of autonomous vehicles and
more specifically on the security issues that arise with the deployment of such technology …

[HTML][HTML] Simulation-Based Cybersecurity Testing and Evaluation Method for Connected Car V2X Application Using Virtual Machine

DH Lee, CM Kim, HS Song, YH Lee, WS Chung - Sensors, 2023 - mdpi.com
In a connected car, the vehicle's internal network is connected to the outside through
communication technology. However, this can cause new security vulnerabilities. In …

Formulation of a Comprehensive Threat Model for Automated Driving Systems Including External Vehicular Attacks such as V2X and the Establishment of an Attack …

K Okuyama - SIP Results Report, 2018 - jstage.jst.go.jp
Information used as the foundation for automated driving systems is expected to be obtained
from external networks, which could cause cybersecurity issues that did not exist in …