Cargando…

Security in V2I Communications: A Systematic Literature Review

Recently, the number of vehicles equipped with wireless connections has increased considerably. The impact of that growth in areas such as telecommunications, infotainment, and automatic driving is enormous. More and more drivers want to be part of a vehicular network, despite the implications or ri...

Descripción completa

Detalles Bibliográficos
Autores principales: Marcillo, Pablo, Tamayo-Urgilés, Diego, Valdivieso Caraguay, Ángel Leonardo, Hernández-Álvarez, Myriam
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9741211/
https://www.ncbi.nlm.nih.gov/pubmed/36501828
http://dx.doi.org/10.3390/s22239123
_version_ 1784848262048514048
author Marcillo, Pablo
Tamayo-Urgilés, Diego
Valdivieso Caraguay, Ángel Leonardo
Hernández-Álvarez, Myriam
author_facet Marcillo, Pablo
Tamayo-Urgilés, Diego
Valdivieso Caraguay, Ángel Leonardo
Hernández-Álvarez, Myriam
author_sort Marcillo, Pablo
collection PubMed
description Recently, the number of vehicles equipped with wireless connections has increased considerably. The impact of that growth in areas such as telecommunications, infotainment, and automatic driving is enormous. More and more drivers want to be part of a vehicular network, despite the implications or risks that, for instance, the openness of wireless communications, its dynamic topology, and its considerable size may bring. Undoubtedly, this trend is because of the benefits the vehicular network can offer. Generally, a vehicular network has two modes of communication (V2I and V2V). The advantage of V2I over V2V is roadside units’ high computational and transmission power, which assures the functioning of early warning and driving guidance services. This paper aims to discover the principal vulnerabilities and challenges in V2I communications, the tools and methods to mitigate those vulnerabilities, the evaluation metrics to measure the effectiveness of those tools and methods, and based on those metrics, the methods or tools that provide the best results. Researchers have identified the non-resistance to attacks, the regular updating and exposure of keys, and the high dependence on certification authorities as main vulnerabilities. Thus, the authors found schemes resistant to attacks, authentication schemes, privacy protection models, and intrusion detection and prevention systems. Of the solutions for providing security analyzed in this review, the authors determined that most of them use metrics such as computational cost and communication overhead to measure their performance. Additionally, they determined that the solutions that use emerging technologies such as fog/edge/cloud computing present better results than the rest. Finally, they established that the principal challenge in V2I communication is to protect and dispose of a safe and reliable communication channel to avoid adversaries taking control of the medium.
format Online
Article
Text
id pubmed-9741211
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-97412112022-12-11 Security in V2I Communications: A Systematic Literature Review Marcillo, Pablo Tamayo-Urgilés, Diego Valdivieso Caraguay, Ángel Leonardo Hernández-Álvarez, Myriam Sensors (Basel) Review Recently, the number of vehicles equipped with wireless connections has increased considerably. The impact of that growth in areas such as telecommunications, infotainment, and automatic driving is enormous. More and more drivers want to be part of a vehicular network, despite the implications or risks that, for instance, the openness of wireless communications, its dynamic topology, and its considerable size may bring. Undoubtedly, this trend is because of the benefits the vehicular network can offer. Generally, a vehicular network has two modes of communication (V2I and V2V). The advantage of V2I over V2V is roadside units’ high computational and transmission power, which assures the functioning of early warning and driving guidance services. This paper aims to discover the principal vulnerabilities and challenges in V2I communications, the tools and methods to mitigate those vulnerabilities, the evaluation metrics to measure the effectiveness of those tools and methods, and based on those metrics, the methods or tools that provide the best results. Researchers have identified the non-resistance to attacks, the regular updating and exposure of keys, and the high dependence on certification authorities as main vulnerabilities. Thus, the authors found schemes resistant to attacks, authentication schemes, privacy protection models, and intrusion detection and prevention systems. Of the solutions for providing security analyzed in this review, the authors determined that most of them use metrics such as computational cost and communication overhead to measure their performance. Additionally, they determined that the solutions that use emerging technologies such as fog/edge/cloud computing present better results than the rest. Finally, they established that the principal challenge in V2I communication is to protect and dispose of a safe and reliable communication channel to avoid adversaries taking control of the medium. MDPI 2022-11-24 /pmc/articles/PMC9741211/ /pubmed/36501828 http://dx.doi.org/10.3390/s22239123 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Review
Marcillo, Pablo
Tamayo-Urgilés, Diego
Valdivieso Caraguay, Ángel Leonardo
Hernández-Álvarez, Myriam
Security in V2I Communications: A Systematic Literature Review
title Security in V2I Communications: A Systematic Literature Review
title_full Security in V2I Communications: A Systematic Literature Review
title_fullStr Security in V2I Communications: A Systematic Literature Review
title_full_unstemmed Security in V2I Communications: A Systematic Literature Review
title_short Security in V2I Communications: A Systematic Literature Review
title_sort security in v2i communications: a systematic literature review
topic Review
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9741211/
https://www.ncbi.nlm.nih.gov/pubmed/36501828
http://dx.doi.org/10.3390/s22239123
work_keys_str_mv AT marcillopablo securityinv2icommunicationsasystematicliteraturereview
AT tamayourgilesdiego securityinv2icommunicationsasystematicliteraturereview
AT valdiviesocaraguayangelleonardo securityinv2icommunicationsasystematicliteraturereview
AT hernandezalvarezmyriam securityinv2icommunicationsasystematicliteraturereview