In recent years, electric vehicles (EVs) have emerged as a sustainable alternative to conventional automobiles. Distinguished by their environmental friendliness, superior performance, reduced noise, and low maintenance requirements, EVs offer numerous advantages over traditional vehicles. The integration of electric vehicles with cloud computing has heralded a transformative shift in the automotive industry. However, as EVs become increasingly interconnected with the internet, various devices, and infrastructure, they become susceptible to cyberattacks. These attacks pose a significant risk to the safety, privacy, and functionality of both the vehicles and the broader transportation infrastructure. In this paper, we delve into the topic of electric vehicles and their connectivity to the cloud. We scrutinize the potential attack vectors that EVs are vulnerable to and the consequential impact on vehicle operations. Moreover, we outline both general and specific strategies aimed at thwarting these cyberattacks. Additionally, we anticipate future developments aimed at enhancing EV performance and reducing security risks.
more »
« less
Security and Privacy Issues in Intelligent Transportation Systems: Classification and Challenges
Intelligent Transportation Systems (ITS) aim at integrating sensing, control, analysis, and communication technologies into travel infrastructure and transportation to improve mobility, comfort, safety, and efficiency. Car manufacturers are continuously creating smarter vehicles, and advancements in roadways and infrastructure are changing the feel of travel. Traveling is becoming more efficient and reliable with a range of novel technologies, and research and development in ITS. Safer vehicles are introduced every year with greater considerations for passenger and pedestrian safety, nevertheless, the new technology and increasing connectivity in ITS present unique attack vectors for malicious actors. Smart cities with connected public transportation systems introduce new privacy concerns with the data collected about passengers and their travel habits. In this paper, we provide a comprehensive classification of security and privacy vulnerabilities in ITS. Furthermore, we discuss challenges in addressing security and privacy issues in ITS and contemplate potential mitigation techniques. Finally, we highlight future research directions to make ITS more safe, secure, and privacy-preserving.
more »
« less
- PAR ID:
- 10220723
- Date Published:
- Journal Name:
- IEEE intelligent transportation systems magazine
- Volume:
- 13
- Issue:
- 1
- ISSN:
- 1941-1197
- Page Range / eLocation ID:
- 181 - 196
- Format(s):
- Medium: X
- Sponsoring Org:
- National Science Foundation
More Like this
-
-
The latest developments in vehicle-to-infrastructure (V2I) and vehicle-to-anything (V2X) technologies enable all the entities in the transportation system to communicate and collaborate to optimize transportation safety, mobility, and equity at the system level. On the other hand, the community of researchers and developers is becoming aware of the critical role of roadway infrastructure in realizing automated driving. In particular, intelligent infrastructure systems, which leverage modern sensors, artificial intelligence, and communication capabilities, can provide critical information and control support to connected and/or automated vehicles to fulfill functions that are infeasible for automated vehicles alone due to technical or cost considerations. However, there is limited research on formulating and standardizing the intelligence levels of road infrastructure to facilitate the development, as the SAE automated driving levels have done for automated vehicles. This article proposes a five-level intelligence definition for intelligent roadway infrastructure, namely, connected and automated highway (CAH). The CAH is a subsystem of the more extensive collaborative automated driving system (CADS), along with the connected automated vehicle (CAV) subsystem. Leveraging the intelligence definition of CAH, the intelligence definition for the CADS is also defined. Examples of how the CAH at different levels operates with the CAV in the CADS are also introduced to demonstrate the dynamic allocation of various automated driving tasks between different entities in the CADS.more » « less
-
null (Ed.)Internet of Vehicles (IoV) in 5G is regarded as a backbone for intelligent transportation system in smart city, where vehicles are expected to communicate with drivers, with road-side wireless infrastructure, with other vehicles, with traffic signals and different city infrastructure using vehicle-to-vehicle (V2V) and/or vehicle-to-infrastructure (V2I) communications. In IoV, the network topology changes based on drivers' destination, intent or vehicles' movements and road structure on which the vehicles travel. In IoV, vehicles are assumed to be equipped with computing devices to process data, storage devices to store data and communication devices to communicate with other vehicles or with roadside infrastructure (RSI). It is vital to authenticate data in IoV to make sure that legitimate data is being propagated in IoV. Thus, security stands as a vital factor in IoV. The existing literature contains some limitations for robust security in IoV such as high delay introduced by security algorithms, security without privacy, unreliable security and reduced overall communication efficiency. To address these issues, this paper proposes the Elliptic Curve Cryptography (ECC) based Ant Colony Optimization Ad hoc On-demand Distance Vector (ACO-AODV) routing protocol which avoids suspicious vehicles during message dissemination in IoV. Specifically, our proposed protocol comprises three components: i) certificate authority (CA) which maps vehicle's publicly available info such as number plates with cryptographic keys using ECC; ii) malicious vehicle (MV) detection algorithm which works based on trust level calculated using status message interactions; and iii) secure optimal path selection in an adaptive manner based on the intent of communications using ACO-AODV that avoids malicious vehicles. Experimental results illustrate that the proposed approach provides better results than the existing approaches.more » « less
-
Vehicular Ad-hoc Networks (VANETs) are a crucial component of Cooperative Intelligent Transportation Systems (C-ITS), enabling vehicles to communicate and share vital information to enhance road safety and efficiency. Basic Safety Messages (BSMs), periodically broadcast by vehicles to provide real-time kinematic data, form the foundation of numerous safety applications within VANETs. Ensuring the security of BSMs is paramount, as malicious entities can exploit vulnerabilities to launch attacks that could have catastrophic consequences. In this study, we provide a comprehensive analysis of BSM attacks and detection mechanisms in VANETs. We begin by outlining the system model, security requirements, and attacker models relevant to BSMs. Then, we categorize and describe a range of attacks, from simple position falsification to more sophisticated and evasive techniques, such as the SixPack attack. We also classify existing attack detection methods into machine learning-based, deep learning-based, plausibility and consistency-based, and software-defined networking (SDN)-based mechanisms, analyzing their effectiveness and limitations. Additionally, we highlight the challenges in securing BSMs, such as the trade-off between model accuracy and real-time performance. Future research directions are also discussed. This survey paper serves as a foundational step towards building safe, secure, and reliable cooperative intelligent transportation systems and their associated applications.more » « less
-
Integrated sensing and communication (ISAC) is considered an emerging technology for 6th-generation (6G) wireless and mobile networks. It is expected to enable a wide variety of vertical applications, ranging from unmanned aerial vehicles (UAVs) detection for critical infrastructure protection to physiological sensing for mobile healthcare. Despite its significant socioeconomic benefits, ISAC technology also raises unique challenges in system security and user privacy. Being aware of the security and privacy challenges, understanding the trade-off between security and communication performance, and exploring potential countermeasures in practical systems are critical to a wide adoption of this technology in various application scenarios. This talk will discuss various security and privacy threats in emerging ISAC systems with a focus on communication-centric ISAC systems, that is, using the cellular or WiFi infrastructure for sensing. We will then examine potential mechanisms to secure ISAC systems and protect user privacy at the physical and data layers under different sensing modes. At the wireless physical (PHY) layer, an ISAC system is subject to both passive and active attacks, such as unauthorized passive sensing, unauthorized active sensing, signal spoofing, and jamming. Potential countermeasures include wireless channel/radio frequency (RF) environment obfuscation, waveform randomization, anti-jamming communication, and spectrum/RF monitoring. At the data layer, user privacy could be compromised during data collection, sharing, storage, and usage. For sensing systems powered by artificial intelligence (AI), user privacy could also be compromised during the model training and inference stages. An attacker could falsify the sensing data to achieve a malicious goal. Potential countermeasures include the application of privacy enhancing technologies (PETs), such as data anonymization, differential privacy, homomorphic encryption, trusted execution, and data synthesis.more » « less
An official website of the United States government

