Security concerns in cooperative intelligent transportation systems

Authors: Fysarakis, K., Askoxylakis, I., Katos, V., Ioannidis, S. and Marinos, L.

Pages: 487-522

Publisher: CRC Press

ISBN: 9781138033573

This data was imported from Scopus:

Authors: Fysarakis, K., Askoxylakis, I., Katos, V., Ioannidis, S. and Marinos, L.

Pages: 487-521

ISBN: 9781138033573

DOI: 10.1201/b21885

© 2018 by Taylor & Francis Group, LLC CRC Press is an imprint of Taylor & Francis Group, an Informa business. The intelligence being built into modern vehicles significantly improves passenger safety and comfort, and this trend is expected to intensify in the coming years. Smart, eventually self-driving, vehicles are expected to form an important segment of the Internet of Things (IoT)-enabled word, introducing new modes of transportation and new types of services. This merge of the ubiquitous smart systems with the smart vehicle environment is often referred to as co-operative intelligent transportation system (C-ITS). Nevertheless, the above enhancements give rise to significant security and privacy concerns. Remote attacks have already been reported in production vehicles, even though their capabilities and features are very limited compared to future models. The significantly enlarged attack surface, the complexity of interactions, and the variety of threat actors necessitate the introduction of appropriate mechanisms, to ensure that the vehicular platforms and the associated applications are secure enough for users to rely upon. In this chapter, we summarize the threats, requirements, and challenges in securing vehicular networks, examining both vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) interactions. Moreover, a holistic approach for intrusion detection, prevention, and mitigation for C-ITS ecosystems is presented, considering the said deployments as an important part of the cyber-physical systems that are essential to protect. Pointers to important elements that future research should consider are provided, to maximize the effectiveness and benefits of such security frameworks, thus enabling the faster adoption of the future trends that will shape the world around us.

The data on this page was last updated at 05:14 on July 22, 2019.