Skip to main content

Security Challenges of IoT-Enabled Vehicular Communications and Their Countermeasures

  • Chapter
  • First Online:
Communication Technologies and Security Challenges in IoT

Part of the book series: Internet of Things ((ITTCC))

  • 88 Accesses

Abstract

Vehicular Communication Networks are the recent intensification of data-based, interconnected communication between computers, network entities, and sensory systems that have created a new path to analyse, predict, and prevent potential road misbehaviour by utilising real-time information transfer and environmental simulation. The first part of this book chapter examines the hidden and pervasive potential of IoT in-vehicle networking in terms of real-time traffic forecasting, traffic welfare, and traffic efficiency. The first part also provides an overview of the many cutting-edge technologies, their functionality, structure, laws now being used in vehicular networking for vehicle CPS, and their difficulties. The widespread deployment of IoT-enabled vehicular communication infrastructure also brings various security concerns and challenges that could any breach or attack could significantly harm human life, physical assets, and the environment. Hence, in the second part of the paper, we will examine the various security issues and threats in vehicular communications and the various countermeasures proposed to address them. The overall objective of this chapter is to provide a comprehensive overview of the state of the art in this area and to identify challenges and solutions for securing current and future IoT-enabled vehicular communications.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 119.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 159.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Karagiannis, G., et al. (2011). Vehicular networking: A survey and tutorial on requirements, architectures, challenges, standards and solutions. IEEE Communications Surveys & Tutorials, 13(4), 584–616.

    Article  Google Scholar 

  2. Suh, W., Hunter, M. P., & Fujimoto, R. (2014). Ad hoc distributed simulation for transportation system monitoring and near-term prediction. Simulation Modelling Practice and Theory, 41, 1–14.

    Article  Google Scholar 

  3. Papadimitratos, P., La Fortelle, A., Svensson, K., Brignolo, R., & Cosenza, S. (2009). Vehicular communication systems: Enabling technologies, applications, and future outlook. Intelligent Transport Communication Magazine, 84–95.

    Google Scholar 

  4. Wang, S. Y., & Chou, C. L. (2009). NCTUns tool for wireless vehicular communication network researches. Simulation Modelling Practice and Theory, 17(7), 1211–1226.

    Article  Google Scholar 

  5. Kato, S., Tsugawa, S., Tokuda, K., Matsui, T., & Fujii, H. (2002). Vehicle control algorithms for cooperative driving with automated vehicles and intervehicle communications. IEEE Transactions on Intelligent Transportation Systems, 3(3), 155–161.

    Article  Google Scholar 

  6. Tsugawa, S. (2002). Inter-vehicle communications and their applications to intelligent vehicles: An overview. In Intelligent vehicle symposium, 2002. IEEE (Vol. 2, pp. 564–569).

    Google Scholar 

  7. Demba, A., & Möller, D. P. F. (2018). Vehicle-to-vehicle communication technology. In IEEE international conference on electro/information technology (EIT) (pp. 459–464).

    Google Scholar 

  8. Kawashima, H. (1990). Japanese perspective of driver information systems. Transportation (Amst), 17, 263–284.

    Article  Google Scholar 

  9. Weil, T. (2009). Service management for ITS using WAVE (1609.3) networking. In 2009 IEEE globecom workshops (pp. 1–6).

    Google Scholar 

  10. Choi, J., Va, V., Gonzalez-Prelcic, N., Daniels, R., Bhat, C. R., & Heath, R. W. (2016). Millimeter-wave vehicular communication to support massive automotive sensing. IEEE Communications Magazine, 54(12), 160–167.

    Article  Google Scholar 

  11. Ali, I., et al. (2020). A highly reliable, 5.8 GHz DSRC wake-up receiver with an intelligent digital controller for an ETC system. Sensors, 20, 4012. https://doi.org/10.3390/s20144012

    Article  Google Scholar 

  12. Claussen, H. (1991). Vehicle navigation systems. In Modern cartography series (vol. 1, pp. 225–235). Elsevier.

    Google Scholar 

  13. CVEL. (2023). Navigation systems. Clemson University Vehicular Electronics Laboratory. Retrieved from 05 March 2023. https://cecas.clemson.edu/cvel/auto/systems/navigation.html

  14. Vegni, A. M., Biagi, M., & Cusani, R. (2013). Smart vehicles, technologies and main applications in vehicular ad hoc networks. Vehicular Technologies and Applications, 3–20.

    Google Scholar 

  15. Kargl, F., et al. (2008). Secure vehicular communication systems: Implementation, performance, and research challenges. IEEE Communications Magazine, 46(11), 110–118.

    Article  Google Scholar 

  16. Kosch, T., Kulp, I., Bechler, M., Strassberger, M., Weyl, B., & Lasowski, R. (2009). Communication architecture for cooperative systems in Europe. IEEE Communications Magazine, 47(5), 116–125.

    Article  Google Scholar 

  17. Sarika, S., Pravin, A., Vijayakumar, A., & Selvamani, K. (2016). Security issues in mobile ad hoc networks. Procedia Computer Science, 92, 329–335.

    Article  Google Scholar 

  18. Eichler, S., Schroth, C., & Eberspächer, J. (2006). Car-to-car communication

    Google Scholar 

  19. Becker, J. C. (2000). Fusion of heterogeneous sensors for the guidance of an autonomous vehicle. In Proceedings of the third international conference on information fusion (vol. 2, pp. WED5–11).

    Google Scholar 

  20. Leinmüller, T., et al. (2006). Sevecom-secure vehicle communication. In IST mobile and wireless communication summit, no. POST_TALK.

    Google Scholar 

  21. Baldessari, R., et al. (2007). Car-2-car communication consortium-manifesto.

    Google Scholar 

  22. Pendor, R. B., & Tasgaonkar, P. P. (2016). An IoT framework for intelligent vehicle monitoring system. In International conference on communication and signal processing (ICCSP) (pp. 1694–1696).

    Google Scholar 

  23. Cheng, L., Henty, B. E., Stancil, D. D., Bai, F., & Mudalige, P. (2007). Mobile vehicle-to-vehicle narrow-band channel measurement and characterisation of the 5.9 GHz dedicated short-range communication (DSRC) frequency band. IEEE Journal on Selected Areas in Communications, 25(8), 1501–1516.

    Article  Google Scholar 

  24. Whaiduzzaman, M., Sookhak, M., Gani, A., & Buyya, R. (2014). A survey on vehicular cloud computing. Journal of Network and Computer Applications, 40, 325–344.

    Article  Google Scholar 

  25. Chen, C., Luan, T. H., Guan, X., Lu, N., & Liu, Y. (2017). Connected vehicular transportation: Data analytics and traffic-dependent networking. IEEE Vehicular Technology Magazine, 12(3), 42–54. https://doi.org/10.1109/MVT.2016.2645318

    Article  Google Scholar 

  26. Ahmad, F., Adnane, A., & Franqueira, V. N. L. (2016). A systematic approach for cyber security in vehicular networks. Journal of Computing and Communication, 4(16), 38–62.

    Article  Google Scholar 

  27. Drozhzhin, A. (2015). Black Hat USA 2015: The full story of how that Jeep was hacked. Kaspersky Daily. https://www.kaspersky.com/blog/blackhat-jeep-cherokee-hack-explained/9493/

  28. Pauli, D. (2016). Hackers hijack Tesla Model S from afar, while the cars are moving. The Register. https://www.theregister.com/2016/09/20/tesla_model_s_hijacked_remotely/

  29. Micro, T. (2016). Nissan leaf can be hacked via mobile app and web browser. https://www.trendmicro.com/vinfo/fr/security/news/internet-of-things/nissan-leaf-can-be-hacked-via-mobile-app-and-web-browser

  30. Brewster, T. (2015). Chrysler recalls 1.4 million cars after jeep vulnerability exposed. Forbes. https://www.forbes.com/sites/thomasbrewster/2015/07/24/chrysler-recall-exploit/?sh=37e07c411b70

  31. Wakabayashi, D. (2018). Self-driving uber car kills pedestrian in Arizona, where robots roam. NY Times. https://www.nytimes.com/2018/03/19/technology/uber-driverless-fatality.html

  32. Li, Z., Wang, M., Sharma, V., & Gope, P. (2022). Sustainable and round-optimised group authenticated key exchange in vehicle communication. IEEE Transactions on Intelligent Transportation Systems, 1–14. https://doi.org/10.1109/TITS.2022.3169182

  33. Rathore, M. S., et al. (2022). A novel trust-based security and privacy model for internet of vehicles using encryption and steganography. Computers & Electrical Engineering, 102, 108205. https://doi.org/10.1016/j.compeleceng.2022.108205

    Article  Google Scholar 

  34. Wang, F., Xu, Y., Zhang, H., Zhang, Y., & Zhu, L. (2016). 2FLIP: A two-factor lightweight privacy-preserving authentication scheme for VANET. IEEE Transactions on Vehicular Technology, 65(2), 896–911. https://doi.org/10.1109/TVT.2015.2402166

    Article  Google Scholar 

  35. Barletta, V. S., Caivano, D., Nannavecchia, A., & Scalera, M. (2020). Intrusion detection for in-vehicle communication networks: An unsupervised Kohonen SOM approach. Future Internet, 12(7), 119.

    Article  Google Scholar 

  36. Wen, H., Huang, P. Y. R., Dyer, J., Archinal, A., & Fagan, J. (2005). Countermeasures for GPS signal spoofing. In Proceedings of the 18th international technical meeting of the Satellite division of the Institute of Navigation (ION GNSS 2005) (pp. 1285–1290).

    Google Scholar 

  37. Feng, Y., & Wang, J. (2008). GPS RTK performance characteristics and analysis. Positioning, 1(13).

    Google Scholar 

  38. Zhao, P., Zhang, G., Wan, S., Liu, G., & Umer, T. (2020). A survey of local differential privacy for securing internet of vehicles. The Journal of Supercomputing, 76, 8391–8412.

    Article  Google Scholar 

  39. Loukas, G., & Öke, G. (2010). Protection against denial of service attacks: A survey. The Computer Journal, 53(7), 1020–1037.

    Article  Google Scholar 

  40. Levshun, D., Chechulin, A., & Kotenko, I. (2022). Security and privacy analysis of smartphone-based driver monitoring systems from the developer’s point of view. Sensors, 22(13), 5063.

    Article  Google Scholar 

  41. Alsibai, M. H., & Siang, H. M. (2015). A smart driver monitoring system using android application and embedded system. In 2015 IEEE international conference on control system, computing and engineering (ICCSCE) (pp. 242–247).

    Google Scholar 

  42. Macher, G., Schmittner, C., Veledar, O., & Brenner, E. (2020). ISO/SAE DIS 21434 automotive cybersecurity standard-in a nutshell. In Computer safety, reliability, and security. SAFECOMP 2020 Workshops: DECSoS 2020, DepDevOps 2020, USDAI 2020, and WAISE 2020, Lisbon, Portugal, 15 September 2020, Proceedings vol. 39, pp. 123–135.

    Google Scholar 

  43. Van Der Heijden, R. (2010). Security architectures in V2V and V2I communication. In Proceedings of the 20th student conference IT (pp. 1–10).

    Google Scholar 

  44. Zhang, H., Zhang, Z., & Liang, J. (2022). Dynamic driving intention recognition of vehicles with different driving styles of surrounding vehicles. IET Intelligent Transport Systems, 16(5), 571–585.

    Article  Google Scholar 

  45. Moghadasi, N., et al. (2022). Trust and security of electric vehicle-to-grid systems and hardware supply chains. Reliability Engineering and System Safety, 225, 108565. https://doi.org/10.1016/j.ress.2022.108565

    Article  Google Scholar 

  46. Lin, J., Yu, W., Zhang, N., Yang, X., & Ge, L. (2018). Data integrity attacks against dynamic route guidance in transportation-based cyber-physical systems: Modeling, analysis, and defense. IEEE Transactions on Vehicular Technology, 67(9), 8738–8753.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rathishchandra R. Gatti .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Rai, N., Badrinath, A.R., Kamath, A., Kumar, V.A., Gatti, R.R. (2024). Security Challenges of IoT-Enabled Vehicular Communications and Their Countermeasures. In: Prasad, A., Singh, T.P., Dwivedi Sharma, S. (eds) Communication Technologies and Security Challenges in IoT. Internet of Things. Springer, Singapore. https://doi.org/10.1007/978-981-97-0052-3_18

Download citation

  • DOI: https://doi.org/10.1007/978-981-97-0052-3_18

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-97-0051-6

  • Online ISBN: 978-981-97-0052-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics