Topics In Demand
Notification
New

No notification found.

Blog
V2X communication technology and cybersecurity in V2X communication

February 27, 2020

1113

0


Listen to this article



What is V2X Communication Technology?

  • Stands for Vehicle-to-Everything
  • Vehicular communication technology which enables vehicles to converse with the moving parts of the traffic and external systems like pedestrians and streetlights
  • Designed to improve traffic efficiency by providing warnings for upcoming traffic congestions, proposing alternative routes and preventing accidents
  • Comprises different communication technologies including Vehicle-to-Vehicle (V2V), Vehicle-to-Infrastructure (V2I), Vehicle-to-Pedestrians (V2P) and Vehicle-to-Devices (V2D).
  • Both, DSRC (Dedicated Short-Range Communications) and C-V2X (Cellular to Everything) can be used to meet the target performance for V2X
  • Offers 360-degree situational awareness

Factors Driving the Growth of V2X Market

  • Increasing environmental concerns
  • Intense competition among car manufacturers
  • Demand for real-time traffic and incident alerts for increasing public safety

Future Prospects of V2X

  • As per the IHS Merkit, a leading business research firm, the number of vehicles equipped with a V2X system is expected to reach as high as $11.2 million in 2024.
  • According to statista.com, it is expected that the global V2X market will reach to around 6 billion U.S. dollars by 2025.
  • As suggested by MarketsandMarkets Research Pvt Ltd, North America is estimated to be the largest V2X market during the forecast period (2017-2025). The European region is estimated to be the second largest market.

Why Security A Major Concern in V2X communications

  • ITS output specifically depends on V2X communications as it is responsible for the exchange of data between underlying communication technologies. This data includes information and warnings from on-board sensors, such as current position and speed of the vehicle.
  • V2X also facilitates communication between roadside units (RSUs) & traffic monitoring systems (gather and deliver warnings about hazardous situations).
  • With the help of wireless communications and IoT technologies, the vehicles can now easily communicate with any smart device and share information. This makes vehicular networks more susceptible to different types of cyber-attacks: internal or external attacks.

Threat Landscape for V2X Communications

There are five key areas where we need to emphasise for ensuring V2X security. These are Confidentiality, Integrity, Availability, Authenticity and Non-repudiation.

Threats on Confidentiality

  • Eavesdropping attack
  • Location Tracking

Threats on Integrity

  • Alter messages or inject false messages
  • Replay attack
  • GPS Spoofing attack

Threats on Availability

  • Blackhole & Greyhole attacks
  • Flooding attack
  • Jamming attack
  • Coalition and Platooning attacks

Threat on Authenticity

  • Certificate replication attack
  • Sybil attack
  • Masquerading attack or impersonation attack

Threat on Non-repudiation

  • Repudiation attack

Security Solutions

In order to mitigate all the possible risks having the potential to damage the security of V2X communication, we need to ensure successful implementation of appropriate security services. Some of the security solutions are suggested below:

  • Cryptography-based
  • Behaviour-based / Trust-based
  • Identity-based

That the contents of third-party articles/blogs published here on the website, and the interpretation of all information in the article/blogs such as data, maps, numbers, opinions etc. displayed in the article/blogs and views or the opinions expressed within the content are solely of the author's; and do not reflect the opinions and beliefs of NASSCOM or its affiliates in any manner. NASSCOM does not take any liability w.r.t. content in any manner and will not be liable in any manner whatsoever for any kind of liability arising out of any act, error or omission. The contents of third-party article/blogs published, are provided solely as convenience; and the presence of these articles/blogs should not, under any circumstances, be considered as an endorsement of the contents by NASSCOM in any manner; and if you chose to access these articles/blogs , you do so at your own risk.


TASLCyberPractice

© Copyright nasscom. All Rights Reserved.