Next Article in Journal
Dialogue Management and Language Generation for a Robust Conversational Virtual Coach: Validation and User Study
Next Article in Special Issue
Research Regarding Different Types of Headlights on Selected Passenger Vehicles when Using Sensor-Related Equipment
Previous Article in Journal
Electrochemical Sensing of Lead in Drinking Water Using Copper Foil Bonded with Polymer
Previous Article in Special Issue
Emissions Production by Exhaust Gases of a Road Vehicle’s Starting Depending on a Road Gradient
 
 
Article
Peer-Review Record

Simulation-Based Cybersecurity Testing and Evaluation Method for Connected Car V2X Application Using Virtual Machine

Sensors 2023, 23(3), 1421; https://doi.org/10.3390/s23031421
by Dae-Hwi Lee 1, Chan-Min Kim 1, Hyun-Seok Song 2, Yong-Hee Lee 3 and Won-Sun Chung 1,*
Reviewer 1:
Reviewer 2: Anonymous
Sensors 2023, 23(3), 1421; https://doi.org/10.3390/s23031421
Submission received: 27 December 2022 / Revised: 19 January 2023 / Accepted: 24 January 2023 / Published: 27 January 2023
(This article belongs to the Special Issue Sensors and Systems for Automotive and Road Safety)

Round 1

Reviewer 1 Report

1. the fist line of abstract "In connected cars, security vulnerabilities that did not exist before can occur due to the connectivity between the vehicle’s internal network and the outside" - make  asimple sentence rather than conjugate sentence.

2. do put the comparitive results in a tabular form.

3. 5G and IoT are the dominant force in V2V communication. so it is advisable to include this in the introductiona nd banckground atleast.

4. A paragraph should be wriiten on as a concluding remarks obn all the observation is the section 5, sinc eteh conclusion is not reflecting it.

5. how could your study is unique from others reseracher contribution? there is no mentioning of this.

6. how vulnerable is teh current TCP/IP model on the threat a sdiscussed by you? there is no mentioning of this aspects.

Author Response

Dear Reviewer,

Please see the attachment.

 

Sincerely,

Dae-Hwi Lee.

Author Response File: Author Response.pdf

Reviewer 2 Report

In my view, this is a really intriguing work, and I have no doubt that its readers will find it interesting as well. Some minor problems that I see in the article are as follows:

1- Please provide more explanations than the introduction and statement of the problem in the beginning and also discuss and consider more references, and update references in the Introduction. Some references that may be of interest to your readers are suggested as follows:

10.1109/DASC/PiCom/CBDCom/Cy55231.2022.9927793

10.1109/CoDIT55151.2022.9804014

10.1109/TR.2022.3159664

https://doi.org/10.1016/j.vehcom.2021.100428

2- In section 3: Why you consider 3 requirements of implementation (3.2.1,3.2.2,3.2.3) in your study?

3 In section 4.1.: Authors mentioned “Since each node implemented in a typical commercial V2X communication simulation exists only within the simulation, it is not connected to the external ITS infrastructure. Please consider a reference for this statement.

network, unlike the ITS components in the real-world environment.

4- Page 11: Even though Section 5 is well-explained, authors need to consider more explanation about your scenarios.

5- It's suggested that the model's restrictions be included at the end of Section 5.

6- Minor English grammar and spelling checking is required.

Author Response

Dear Reviewer,

Please see the attachment.

 

Sincerely,

Dae-Hwi Lee.

Author Response File: Author Response.pdf

Round 2

Reviewer 1 Report

all the comments have been successfully justified.

 

Back to TopTop