Software-Defined Vehicle Fleet Management System with Integrated Cybersecurity Measures
Keywords:
cybersecurity, AVNs, DCAVs, DMZAbstract
The significance of cybersecurity in today's globally linked world is paramount. Cybercriminals are finding new and more sophisticated ways to compromise fleet management systems, which regulate and track giant groupings of cars. The potential for cyberattacks is rising exponentially due to the increasing data-driven integration of various systems. Security threats, such as cyber vulnerabilities (CVs), have grown in tandem with the potential uses of extensive data-based communication in multiple sectors, including the autonomous car business. Data transmission between autonomous vehicles and Internet of Things devices may be more susceptible to cyberattacks because of the symmetry of extensive data communication networks employed by these vehicles. Both symmetric and asymmetric algorithms can encrypt the data associated with CVs. Proactive cybersecurity solutions for autonomous vehicles, power-based cyberattacks, and dynamic responses are among the many new concerns and opportunities presented by technological breakthroughs and shifting security threats. A lot of big data research has gone into finding ways to lessen the impact of CVs and big data breaches by implementing security solutions. Big data communication, autonomous vehicular networks (AVNs), and DCAVs will face future security challenges, primarily from CVs in data communication, vulnerabilities in AVMs, and cyber threats to network functioning. For this reason, security algorithms and countermeasure models must be efficient if CVs and data breaches are to be minimized. Integrating CV policies and rules with proxy and DMZ servers strengthened the countermeasure's effectiveness. Here, the energy levels of individual attacks are established to determine the information security measures that are reliant on the increasing degrees of assaults and CVs.
Downloads
References
Alcaraz, Cristina, Javier Lopez, and Stephen Wolthusen. 2017. “OCPP Protocol: Security Threats and Challenges.” IEEE Transactions on Smart Grid 8, no. 5 (February 15, 2017): 2452– 59. https://doi.org/10.1109/TSG.2017.2669647.
Bao, Kaibin, Hristo Valev, Manuela Wagner, and Hartmut Schmeck. 2018. “A Threat Analysis of the Vehicle-to-Grid Charging Protocol ISO 15118.” Computer Science - Research and Development 33, no.1 (September 1, 2017): 3–12. https://doi.org/10.1007/s00450-017-0342-y.
Barker, Elaine. 2016. “Recommendation for Key Management—Part 1: General.” National Institute of Standards and Technology (NIST) Special Publication 800-57 Part 1, Revision 4. January 2016. https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r4.pdf.
Barry, Keith. 2018. “Automakers Embrace Over-the-Air Updates, but Can We Trust Digital Car Repair?” Consumer Reports, April 20, 2018. https://www.consumerreports.org/automotivetechnology/automakers-embrace-over-the-air-updates-can-we-trust-digital-car-repair/.
Carlson, Barney, and Ken Rohde. 2018. “Cyber Security of DC Fast Charging: Potential Impacts to the Electric Grid.” Idaho National Laboratory presentation, September 12, 2018. INL/MIS-18- 51289. https://avt.inl.gov/sites/default/files/pdf/presentations/INLCyberSecurityDCFC.pdf. CHAdeMO. n.d. “What is CHAdeMO.” Accessed May 2019. https://www.chademo.com/aboutus/what-is-chademo/.
Checkoway et al. 2011. “Comprehensive Experimental Analyses of Automotive Attack Surfaces.” USENIX Security, August 10–12, 2011. http://www.autosec.org/pubs/carsusenixsec2011.pdf.
Yu M., Guo Z., Shen S., Ning Y., Liu T., Sun D. An Intelligent Connected Vehicles Information Security Attack Matrix Model; Proceedings of the 2023 IEEE 5th International Conference on Power, Intelligent Computing and Systems (ICPICS); Shenyang, China. 14–16 July 2023; pp. 82–86. [CrossRef] [Google Scholar]
Bouchouia M.L., Labiod H., Jelassi O., Monteuuis J.P., Jaballah W.B., Petit J., Zhang Z. A survey on misbehavior detection for connected and autonomous vehicles. Veh. Commun. 2023;41:100586. doi: 10.1016/j.vehcom.2023.100586.
Rinaldo R.C., Horeis T.F. Proceedings of the 4th ACM Computer Science in Cars Symposium (CSCS '20), Feldkirchen, Germany, December 2 2020. Association for Computing Machinery; New York, NY, USA: 2020. A Hybrid Model for Safety and Security Assessment of Autonomous Vehicles; pp. 1–10. [CrossRef] [Google Scholar]
Varma I.M., Kumar N. A comprehensive survey on SDN and blockchain-based secure vehicular networks. Veh. Commun. 2023;44:100663. doi: 10.1016/j.vehcom.2023.100663. [CrossRef] [Google Scholar]
Hsu K. An Example of Securing In-Cabin AI Using TEE on a Secure FPGA SoC. 2020. [(accessed on 9 August 2023)]. Available online: https://www.allaboutcircuits.com/industry-articles/an-example-of-securing-in-cabin-ai-using-tee-on-a-secure-fpga-soc/
Tesei A., Lattuca D., Luise M., Pagano P., Ferreira J., Bartolomeu P.C. A transparent distributed ledger-based certificate revocation scheme for VANETs. J. Netw. Comput. Appl. 2023;212:103569.
Blum B. Cyberattacks on Cars Increased 225% in Last Three Years—ISRAEL21c. 2022. [(accessed on 9 August 2023)]. Available online: https://www.israel21c.org/cyberattacks-on-cars-increased-225-in-last-three-years/
Geppert T., Deml S., Sturzenegger D., Ebert N. Trusted Execution Environments: Applications and Organizational Challenges. Front. Comput. Sci. 2022;4:930741. doi: 10.3389/fcomp.2022.930741.
Valadares D., Will N., Spohn M., Santos D., Perkusich A., Gorgonio K. Proceedings of the 11th International Conference on Cloud Computing and Services Science-CLOSER Funchal, Madeira, Portugal, 19–21 March 2018. SciTePress; Setúbal, Portugal: 2021. Trusted Execution Environments for Cloud/Fog-based Internet of Things Applications; pp. 111–121
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.