Cybersecurity in Intelligent Transportation Systems
Abstract
:1. Introduction
2. ITS Cyberattacks
2.1. VANET Man-in-the-Middle Attack
2.2. Routing Attacks
2.3. Timing Attacks
2.4. Spoofing
2.5. Denial-of-Service Attacks (DoS)
2.6. Internal Vehicle Network Attack
2.7. Identity Attack
2.8. Eavesdropping
2.9. Attack against Fog
2.10. AI Attacks
3. ITS Architecture and Security Challenges
4. Conventional Methods in ITS Cybersecurity
5. Innovative Approaches in ITS Cybersecurity
5.1. Blockchain
5.2. Anonymous Authentication in Fog
5.3. Bloom Filter
5.4. Security by Contract
5.5. Sensor Fusion
6. An Intelligent Security in IoT
6.1. Artificial Intelligence
6.2. Machine Learning
6.3. Ontology
6.4. Game Theory
7. Discussion
8. Conclusions and Future Work
Author Contributions
Funding
Conflicts of Interest
References
- Coppola, P.; Silvestri, F. Autonomous vehicles and future mobility solutions. In Autonomous Vehicles and Future Mobility; AET Series; Elsevier: Amsterdam, The Netherlands, 2019. [Google Scholar]
- Han, M.; Liu, S.; Ma, S.; Wan, A. Anonymous-authentication scheme based on fog computing for VANET. PLoS ONE 2020, 15, e0228319. [Google Scholar] [CrossRef] [PubMed]
- Jin, H.; Papadimitratos, P. Proactive certificate validation for VANETs. In Proceedings of the 2016 IEEE Vehicular Networking Conference (VNC), Columbus, OH, USA, 8–10 December 2016. [Google Scholar]
- IEEE. 1609.2-2016 IEEE Standard for Wireless Access in Vehicular Environments—Security Services for Applications and Management Messages; Revision of IEEE Std 1609.2-2013; IEEE: Pictasaway, NJ, USA, 2016; pp. 1–240. [Google Scholar]
- Khan, S.; Parkinson, S.; Qin, Y. Fog computing security: A review of current applications and security solutions. J. Cloud Comput. Adv. Syst. Appl. 2017, 6, 19. [Google Scholar] [CrossRef]
- Busygin, A.G.; Kalinin, M.; Konoplev, A. Supporting connectivity of VANET/MANET network nodes and elastic software-configurable security services using blockchain with floating genesis block. In Proceedings of the IV International Scientific Conference ’the Convergence of Digital and Physical Worlds: Technological, Economic and Social Challenges’ (CC-TESC2018), St. Petersburg, Russia, 16–18 May 2018; SHS Web of Conferences Volume 44; EDP Sciences: Les Ulis, France, 2018. [Google Scholar]
- Mir, Z.H.; Filali, F. LTE and IEEE 802.11p for vehicular networking: A performance evaluation. J. Wirel. Commun. Netw. 2014, 2014, 89. [Google Scholar] [CrossRef] [Green Version]
- Cui, L.; Xie, G.; Qu, Y.; Gao, L.; Yang, Y. Security and Privacy in Smart Cities: Challenges and Opportunities. IEEE Access 2018, 6, 46134–46145. [Google Scholar] [CrossRef]
- Hahn, D.A.; Munir, A.; Behzadan, V. Security and Privacy Issues in Intelligent Transportation Systems: Classification and Challenges. IEEE Intell. Transp. Syst. Mag. 2019, 1. [Google Scholar] [CrossRef] [Green Version]
- Katrakazas, C.; Theofilatos, A.; Papastefanatos, G.; Härri, J.; Antoniou, C. Cyber Security and Its Impact on Cav Safety: Overview, Policy Needs and Challenges; Elsevier: Amsterdam, The Netherlands, 2020. [Google Scholar]
- Sanguino, T.D.J.M.; Domínguez, J.M.L.; Baptista, P.D.C. Cybersecurity Certification and Auditing of Automotive Industry; Elsevier: Amsterdam, The Netherlands, 2020; pp. 95–124. [Google Scholar]
- Jadoon, A.K.; Wang, L.; Li, T.; Zia, M.A. Lightweight Cryptographic Techniques for Automotive Cybersecurity. Wirel. Commun. Mob. Comput. 2018, 1–15. [Google Scholar] [CrossRef]
- Vähäkainu, P.; Lehto, M. Artificial intelligence in the cyber security environment. In Proceedings of the 14th International Conference on Cyber Warfare and Security ICCWS 2019, Stellenbosch, South Africa, 28 February–1 March 2019; Available online: https://www.researchgate.net/publication/338223306_Artificial_intelligence_in_the_cyber_security_environment (accessed on 12 October 2020).
- Giaretta, A.; Dragoni, N.; Massacci, F. IoT Security Configurability with Security-by-Contract. Sensors 2019, 19, 4121. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Huawei Technologies Co., Ltd. 5G Security Architecture White Paper; Huawei Technologies Co., Ltd.: Shenzhen, China, 2017. [Google Scholar]
- Mandy, C.; Mahgoub, I. Implementation of the WAVE 1609.2 Security Services Standard and Encountered Issues and Challenges. In Proceedings of the 2018 9th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), New York, NY, USA, 8–10 November 2018; pp. 13–18. [Google Scholar] [CrossRef]
- Aldhaheri, S.; AlGhazzawi, D.M.; Cheng, L.; Alzahrani, B.A.; Al-Barakati, A. DeepDCA: Novel Network-Based Detection of IoT Attacks Using Artificial Immune System. Appl. Sci. 2020, 10, 1909. [Google Scholar] [CrossRef] [Green Version]
- Gordeychik, S.; Nikolaev, A.; Kolegov, D. Measuring Artificial Intelligence and Machine Learning Implementation Security on the Internet, Project: AI Security. 2019. Available online: https://www.researchgate.net/publication/337771481_Measuring_Artificial_Intelligence_and_Machine_Learning_Implementation_Security_on_the_Internet (accessed on 12 October 2020).
- Liang, F.; Hatcher, W.G.; Liao, W.; Gao, W.; Yu, W. Machine Learning for Security and the Internet of Things: The Good, the Bad, and the Ugly. IEEE Access 2019, 7, 158126–158147. [Google Scholar] [CrossRef]
- Mukherjee, M.; Matam, R.; Shu, L.; Maglaras, L.; Ferrag, M.A.; Choudhury, N.; Kumar, V. Security and Privacy in Fog Computing: Challenges. IEEE Access 2017, 5, 19293–19304. [Google Scholar] [CrossRef]
- Fernández, E.B.; Washizaki, H.; Yoshioka, N. Abstract and IoT security patterns. In Proceedings of the 8th Asian Conference on Pattern Languages of Programs (PLoP’19), Tokio, Japan, 20–22 March 2019. [Google Scholar]
- Careem, M.A.A.; Dutta, A. Reputation based Routing in MANET using Blockchain. In Proceedings of the 2020 International Conference on COMmunication Systems & NETworkS (COMSNETS), Bengaluru, India, 7–11 January 2020; pp. 1–6. [Google Scholar]
- Deshpande, V.; Das, T.; Badis, H.; George, L. SEBS: A Secure Element and Blockchain Stratagem for Securing IoT. In Proceedings of the 2019 Global Information Infrastructure and Networking Symposium (GIIS), Paris, France, 18–20 December 2019; pp. 1–7. [Google Scholar] [CrossRef]
- Elagin, V.; Spirkina, A.; Levakov, A.; Belozertsev, I. Blockchain Behavioral Traffic Model as a Tool to Influence Service IT Security. Futur. Internet 2020, 12, 68. [Google Scholar] [CrossRef]
- Mouchfiq, N.; Habbani, A.; Benjbara, C. Blockchain Security in MANETs. Open Science Index 154. Int. J. Comput. Inform. Eng. 2019, 13, 546–550. [Google Scholar] [CrossRef]
- Rahimi, N.; Maynor, J.; Gupta, B. Adversarial Machine Learning: Difficulties in Applying Machine Learning to Existing Cybersecurity Systems. EPiC Series Comput. 2020, 69, 40–47. [Google Scholar] [CrossRef]
- Jeon, D.; Tak, B. BlackEye: Automatic IP blacklisting using machine learning from security logs. Wirel. Netw. 2019, 1–12. [Google Scholar] [CrossRef]
- Gonzalez-Gil, P.; Martinez, J.A.; Skarmeta, A. Lightweight Data-Security Ontology for IoT. Sensors 2020, 20, 801. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Nobahary, S.; Garakani, H.G.; Khademzadeh, A.; Rahmani, A.M. Selfish node detection based on hierarchical game theory in IoT. EURASIP J. Wirel. Commun. Netw. 2019, 2019. [Google Scholar] [CrossRef]
- Sheehan, B.; Murphy, F.; Mullins, M.; Ryan, C. Connected and autonomous vehicles: A cyber-risk classification framework. Transp. Res. Part A 2019, 124, 523–536. [Google Scholar] [CrossRef]
- Wang, P.; Wu, X.; He, X. Modeling and analyzing cyberattack effects on connected automated vehicular platoons. Transp. Res. Part C 2020, 115, 102625. [Google Scholar] [CrossRef]
Architecture Layer | Security Issue | Cyberattack |
---|---|---|
Perception layer | Configuration and initialization of the devices during manufacturing; Internal vehicular network design; | Denial-of-Service; Spoofing; Internal vehicle network attack; |
Network layer | Anonymous authentication in VANET; | Sybil Attacks; Denial-of-Service; Man-in-the-Middle; Eavesdropping; Routing attacks; Identity attack; Timing attack; |
Support layer | Fog defense; | Attack against Fog; |
Application layer | Complicated data model; AI defense. | Data poisoning; Environmental Perturbations; Policy manipulation. |
Architecture Layer | Security Issue | Cyberattack | Security Approach |
---|---|---|---|
Perception layer | Configuration and initialization of the devices during manufacturer; Internal vehicular network design; | Denial-of-Service; Spoofing; | Security by contract; Sensor fusion; |
Network layer | Anonymous authentication in VANET; | Sybil Attacks; Denial-of-Service; Man-in-the-Middle; Eavesdropping; Routing attacks; | Blockchain; Reputation based models; Bloom filter combined with auxiliary methods; Game theory; |
Support layer | Fog defense; | Attack against Fog; | Authentication; Encryption; Key management; Regular auditing; |
Application layer | Complicated data model; AI defense. | Data poisoning; Environmental Perturbations; Policy manipulation. | Blockchain; AI; Machine learning; Ontology; Game theory. |
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Mecheva, T.; Kakanakov, N. Cybersecurity in Intelligent Transportation Systems. Computers 2020, 9, 83. https://doi.org/10.3390/computers9040083
Mecheva T, Kakanakov N. Cybersecurity in Intelligent Transportation Systems. Computers. 2020; 9(4):83. https://doi.org/10.3390/computers9040083
Chicago/Turabian StyleMecheva, Teodora, and Nikolay Kakanakov. 2020. "Cybersecurity in Intelligent Transportation Systems" Computers 9, no. 4: 83. https://doi.org/10.3390/computers9040083
APA StyleMecheva, T., & Kakanakov, N. (2020). Cybersecurity in Intelligent Transportation Systems. Computers, 9(4), 83. https://doi.org/10.3390/computers9040083