Secure Communication Protocols for Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) Communication in Avs: Investigates secure communication protocols for V2V and V2I communication in AVs to prevent cyber attacks
Published 14-05-2023
Keywords
- Secure communication,
- Vehicle-to-vehicle (V2V) communication,
- Vehicle-to-infrastructure (V2I) communication
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
How to Cite
Abstract
Secure communication protocols are crucial for ensuring the safety and security of autonomous vehicles (AVs) in modern transportation systems. Vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication play vital roles in enabling cooperative driving and enhancing traffic efficiency. However, these communication channels are susceptible to various cyber threats, including eavesdropping, message tampering, and denial of service attacks. This paper investigates the state-of-the-art secure communication protocols designed specifically for V2V and V2I communication in AVs.
We begin by discussing the importance of secure communication in AVs and the unique challenges it presents. We then provide an overview of existing communication protocols, such as IEEE 802.11p (WAVE), LTE-V2X, and 5G-V2X, highlighting their security features and vulnerabilities. Next, we analyze the security requirements for V2V and V2I communication and propose a set of criteria for evaluating the effectiveness of secure communication protocols in AVs.
To evaluate the performance of these protocols, we conduct a comparative analysis based on their security features, communication overhead, latency, and scalability. We also consider the impact of these protocols on the overall AV system, including computational resources and energy consumption. Furthermore, we discuss the integration of cryptographic techniques, such as digital signatures and encryption algorithms, to enhance the security of V2V and V2I communication.
Based on our analysis, we identify the strengths and weaknesses of existing secure communication protocols and propose recommendations for future research directions. We emphasize the need for standardized, interoperable, and scalable security solutions to mitigate the risks associated with cyber attacks on AVs. Overall, this paper provides valuable insights into the design and implementation of secure communication protocols for V2V and V2I communication in AVs.
Downloads
References
- Tatineni, Sumanth. "Beyond Accuracy: Understanding Model Performance on SQuAD 2.0 Challenges." International Journal of Advanced Research in Engineering and Technology (IJARET) 10.1 (2019): 566-581.
- Vemoori, V. “Towards Secure and Trustworthy Autonomous Vehicles: Leveraging Distributed Ledger Technology for Secure Communication and Exploring Explainable Artificial Intelligence for Robust Decision-Making and Comprehensive Testing”. Journal of Science & Technology, vol. 1, no. 1, Nov. 2020, pp. 130-7, https://thesciencebrigade.com/jst/article/view/224.
- Mahammad Shaik. “Reimagining Digital Identity: A Comparative Analysis of Advanced Identity Access Management (IAM) Frameworks Leveraging Blockchain Technology for Enhanced Security, Decentralized Authentication, and Trust-Centric Ecosystems”. Distributed Learning and Broad Applications in Scientific Research, vol. 4, June 2018, pp. 1-22, https://dlabi.org/index.php/journal/article/view/2.
- Vemori, Vamsi. "Towards Safe and Equitable Autonomous Mobility: A Multi-Layered Framework Integrating Advanced Safety Protocols, Data-Informed Road Infrastructure, and Explainable AI for Transparent Decision-Making in Self-Driving Vehicles." Human-Computer Interaction Perspectives 2.2 (2022): 10-41.