Software-Defined Vehicle Fleet Management System with Integrated Cybersecurity Measures

Authors

  • Venkata Lakshmi Namburi

Keywords:

cybersecurity, AVNs, DCAVs, DMZ

Abstract

The significance of cybersecurity in today's globally linked world is paramount. Cybercriminals are finding new and more sophisticated ways to compromise fleet management systems, which regulate and track giant groupings of cars. The potential for cyberattacks is rising exponentially due to the increasing data-driven integration of various systems. Security threats, such as cyber vulnerabilities (CVs), have grown in tandem with the potential uses of extensive data-based communication in multiple sectors, including the autonomous car business. Data transmission between autonomous vehicles and Internet of Things devices may be more susceptible to cyberattacks because of the symmetry of extensive data communication networks employed by these vehicles. Both symmetric and asymmetric algorithms can encrypt the data associated with CVs. Proactive cybersecurity solutions for autonomous vehicles, power-based cyberattacks, and dynamic responses are among the many new concerns and opportunities presented by technological breakthroughs and shifting security threats. A lot of big data research has gone into finding ways to lessen the impact of CVs and big data breaches by implementing security solutions. Big data communication, autonomous vehicular networks (AVNs), and DCAVs will face future security challenges, primarily from CVs in data communication, vulnerabilities in AVMs, and cyber threats to network functioning. For this reason, security algorithms and countermeasure models must be efficient if CVs and data breaches are to be minimized. Integrating CV policies and rules with proxy and DMZ servers strengthened the countermeasure's effectiveness. Here, the energy levels of individual attacks are established to determine the information security measures that are reliant on the increasing degrees of assaults and CVs.

Downloads

Download data is not yet available.

References

Alcaraz, Cristina, Javier Lopez, and Stephen Wolthusen. 2017. “OCPP Protocol: Security Threats and Challenges.” IEEE Transactions on Smart Grid 8, no. 5 (February 15, 2017): 2452– 59. https://doi.org/10.1109/TSG.2017.2669647.

Bao, Kaibin, Hristo Valev, Manuela Wagner, and Hartmut Schmeck. 2018. “A Threat Analysis of the Vehicle-to-Grid Charging Protocol ISO 15118.” Computer Science - Research and Development 33, no.1 (September 1, 2017): 3–12. https://doi.org/10.1007/s00450-017-0342-y.

Barker, Elaine. 2016. “Recommendation for Key Management—Part 1: General.” National Institute of Standards and Technology (NIST) Special Publication 800-57 Part 1, Revision 4. January 2016. https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r4.pdf.

Barry, Keith. 2018. “Automakers Embrace Over-the-Air Updates, but Can We Trust Digital Car Repair?” Consumer Reports, April 20, 2018. https://www.consumerreports.org/automotivetechnology/automakers-embrace-over-the-air-updates-can-we-trust-digital-car-repair/.

Carlson, Barney, and Ken Rohde. 2018. “Cyber Security of DC Fast Charging: Potential Impacts to the Electric Grid.” Idaho National Laboratory presentation, September 12, 2018. INL/MIS-18- 51289. https://avt.inl.gov/sites/default/files/pdf/presentations/INLCyberSecurityDCFC.pdf. CHAdeMO. n.d. “What is CHAdeMO.” Accessed May 2019. https://www.chademo.com/aboutus/what-is-chademo/.

Checkoway et al. 2011. “Comprehensive Experimental Analyses of Automotive Attack Surfaces.” USENIX Security, August 10–12, 2011. http://www.autosec.org/pubs/carsusenixsec2011.pdf.

Yu M., Guo Z., Shen S., Ning Y., Liu T., Sun D. An Intelligent Connected Vehicles Information Security Attack Matrix Model; Proceedings of the 2023 IEEE 5th International Conference on Power, Intelligent Computing and Systems (ICPICS); Shenyang, China. 14–16 July 2023; pp. 82–86. [CrossRef] [Google Scholar]

Bouchouia M.L., Labiod H., Jelassi O., Monteuuis J.P., Jaballah W.B., Petit J., Zhang Z. A survey on misbehavior detection for connected and autonomous vehicles. Veh. Commun. 2023;41:100586. doi: 10.1016/j.vehcom.2023.100586.

Rinaldo R.C., Horeis T.F. Proceedings of the 4th ACM Computer Science in Cars Symposium (CSCS '20), Feldkirchen, Germany, December 2 2020. Association for Computing Machinery; New York, NY, USA: 2020. A Hybrid Model for Safety and Security Assessment of Autonomous Vehicles; pp. 1–10. [CrossRef] [Google Scholar]

Varma I.M., Kumar N. A comprehensive survey on SDN and blockchain-based secure vehicular networks. Veh. Commun. 2023;44:100663. doi: 10.1016/j.vehcom.2023.100663. [CrossRef] [Google Scholar]

Hsu K. An Example of Securing In-Cabin AI Using TEE on a Secure FPGA SoC. 2020. [(accessed on 9 August 2023)]. Available online: https://www.allaboutcircuits.com/industry-articles/an-example-of-securing-in-cabin-ai-using-tee-on-a-secure-fpga-soc/

Tesei A., Lattuca D., Luise M., Pagano P., Ferreira J., Bartolomeu P.C. A transparent distributed ledger-based certificate revocation scheme for VANETs. J. Netw. Comput. Appl. 2023;212:103569.

Blum B. Cyberattacks on Cars Increased 225% in Last Three Years—ISRAEL21c. 2022. [(accessed on 9 August 2023)]. Available online: https://www.israel21c.org/cyberattacks-on-cars-increased-225-in-last-three-years/

Geppert T., Deml S., Sturzenegger D., Ebert N. Trusted Execution Environments: Applications and Organizational Challenges. Front. Comput. Sci. 2022;4:930741. doi: 10.3389/fcomp.2022.930741.

Valadares D., Will N., Spohn M., Santos D., Perkusich A., Gorgonio K. Proceedings of the 11th International Conference on Cloud Computing and Services Science-CLOSER Funchal, Madeira, Portugal, 19–21 March 2018. SciTePress; Setúbal, Portugal: 2021. Trusted Execution Environments for Cloud/Fog-based Internet of Things Applications; pp. 111–121

Downloads

Published

06.08.2024

How to Cite

Venkata Lakshmi Namburi. (2024). Software-Defined Vehicle Fleet Management System with Integrated Cybersecurity Measures. International Journal of Intelligent Systems and Applications in Engineering, 12(23s), 432–439. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/6887

Issue

Section

Research Article