Integrating Cybersecurity in V2X: A Review of Simulation Environments
The deployment and acceptance of Vehicle-to-Everything (V2X) technologies are essential for the advancement of intelligent transportation systems, requiring robust simulation tools for development and validation. This paper offers an overview of leading V2X simulation tools, emphasizing their role i...
Saved in:
| Main Authors: | , , , , , , , , , , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
IEEE
2024-01-01
|
| Series: | IEEE Access |
| Subjects: | |
| Online Access: | https://ieeexplore.ieee.org/document/10759653/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1850126794254974976 |
|---|---|
| author | Kevin Herman Muraro Gularte Joao Paulo Javidi da Costa Jose Alfredo Ruiz Vargas Antonio Santos da Silva Giovanni Almeida Santos Yuming Wang Christian Alfons Muller Christoph Lipps Rafael Timoteo de Sousa Walter de Britto Vidal Filho Philipp Slusallek Hans Dieter Schotten |
| author_facet | Kevin Herman Muraro Gularte Joao Paulo Javidi da Costa Jose Alfredo Ruiz Vargas Antonio Santos da Silva Giovanni Almeida Santos Yuming Wang Christian Alfons Muller Christoph Lipps Rafael Timoteo de Sousa Walter de Britto Vidal Filho Philipp Slusallek Hans Dieter Schotten |
| author_sort | Kevin Herman Muraro Gularte |
| collection | DOAJ |
| description | The deployment and acceptance of Vehicle-to-Everything (V2X) technologies are essential for the advancement of intelligent transportation systems, requiring robust simulation tools for development and validation. This paper offers an overview of leading V2X simulation tools, emphasizing their role in communication and cybersecurity applications. Existing surveys are reviewed, identifying gaps such as the limited coverage of less known tools such as CARLA and CarSim and the absence of detailed market analyses. A thorough assessment of the market significance of V2X simulation tools is provided, highlighting annual trends and profiling leading companies. Publication trends across major scientific databases are also examined, reflecting the growing interest and research diversity in V2X simulations. The review includes an analysis of crucial simulation tools such as SUMO, NS3, OMNeT++, Veins, and CARLA, emphasizing their contributions to V2X communications. Regarding cybersecurity, the study explores simulation parameters for mitigating security threats such as jamming, spoofing, Denial of Service (DoS), and eavesdropping. Furthermore, the increasing integration of different simulation tools is highlighted to address their individual limitations. Finally, emerging research opportunities are identified, advocating for the integration of co-simulation frameworks and AI-driven (Artificial Intelligence) approaches to improve the accuracy and resilience of V2X systems. This survey aims to guide future research efforts in developing secure, efficient, and scalable V2X communication technologies. |
| format | Article |
| id | doaj-art-4fc91d2fde784e92b17d97f4f2462921 |
| institution | OA Journals |
| issn | 2169-3536 |
| language | English |
| publishDate | 2024-01-01 |
| publisher | IEEE |
| record_format | Article |
| series | IEEE Access |
| spelling | doaj-art-4fc91d2fde784e92b17d97f4f24629212025-08-20T02:33:51ZengIEEEIEEE Access2169-35362024-01-011217794617798510.1109/ACCESS.2024.350440410759653Integrating Cybersecurity in V2X: A Review of Simulation EnvironmentsKevin Herman Muraro Gularte0https://orcid.org/0000-0002-4134-9706Joao Paulo Javidi da Costa1https://orcid.org/0000-0002-8616-4924Jose Alfredo Ruiz Vargas2https://orcid.org/0000-0002-8976-4642Antonio Santos da Silva3https://orcid.org/0000-0003-3709-4007Giovanni Almeida Santos4https://orcid.org/0000-0002-0189-7361Yuming Wang5https://orcid.org/0009-0003-3313-0485Christian Alfons Muller6https://orcid.org/0000-0002-3216-8516Christoph Lipps7https://orcid.org/0000-0001-6382-9156Rafael Timoteo de Sousa8https://orcid.org/0000-0003-1101-3029Walter de Britto Vidal Filho9https://orcid.org/0000-0002-6701-658XPhilipp Slusallek10https://orcid.org/0000-0002-2189-2429Hans Dieter Schotten11https://orcid.org/0000-0001-5005-3635Graduate Program in Mechatronic Systems (PPMEC), University of Brasília (UnB), Brasília, BrazilGraduate Program in Mechatronic Systems (PPMEC), University of Brasília (UnB), Brasília, BrazilDepartment of Electrical Engineering, University of Brasília (UnB), Brasília, BrazilHamm-Lippstadt University of Applied Sciences (HSHL), Lippstadt Campus, Hamm, GermanyHamm-Lippstadt University of Applied Sciences (HSHL), Lippstadt Campus, Hamm, GermanyHamm-Lippstadt University of Applied Sciences (HSHL), Lippstadt Campus, Hamm, GermanyGerman Research Center for Artificial Intelligence (DFKI), Saarbrücken, GermanyDFKI, Kaiserslautern, GermanyProfessional Postgraduate Program in Electrical Engineering (PPEE), UnB, Brasília, BrazilDepartment of Mechanical Engineering, UnB, Brasília, BrazilGerman Research Center for Artificial Intelligence (DFKI), Saarbrücken, GermanyDFKI, Kaiserslautern, GermanyThe deployment and acceptance of Vehicle-to-Everything (V2X) technologies are essential for the advancement of intelligent transportation systems, requiring robust simulation tools for development and validation. This paper offers an overview of leading V2X simulation tools, emphasizing their role in communication and cybersecurity applications. Existing surveys are reviewed, identifying gaps such as the limited coverage of less known tools such as CARLA and CarSim and the absence of detailed market analyses. A thorough assessment of the market significance of V2X simulation tools is provided, highlighting annual trends and profiling leading companies. Publication trends across major scientific databases are also examined, reflecting the growing interest and research diversity in V2X simulations. The review includes an analysis of crucial simulation tools such as SUMO, NS3, OMNeT++, Veins, and CARLA, emphasizing their contributions to V2X communications. Regarding cybersecurity, the study explores simulation parameters for mitigating security threats such as jamming, spoofing, Denial of Service (DoS), and eavesdropping. Furthermore, the increasing integration of different simulation tools is highlighted to address their individual limitations. Finally, emerging research opportunities are identified, advocating for the integration of co-simulation frameworks and AI-driven (Artificial Intelligence) approaches to improve the accuracy and resilience of V2X systems. This survey aims to guide future research efforts in developing secure, efficient, and scalable V2X communication technologies.https://ieeexplore.ieee.org/document/10759653/Vehicle-to-everythingconnected and automated vehiclestrends in V2X simulationsV2X simulation toolsV2X cybersecurityradio jamming |
| spellingShingle | Kevin Herman Muraro Gularte Joao Paulo Javidi da Costa Jose Alfredo Ruiz Vargas Antonio Santos da Silva Giovanni Almeida Santos Yuming Wang Christian Alfons Muller Christoph Lipps Rafael Timoteo de Sousa Walter de Britto Vidal Filho Philipp Slusallek Hans Dieter Schotten Integrating Cybersecurity in V2X: A Review of Simulation Environments IEEE Access Vehicle-to-everything connected and automated vehicles trends in V2X simulations V2X simulation tools V2X cybersecurity radio jamming |
| title | Integrating Cybersecurity in V2X: A Review of Simulation Environments |
| title_full | Integrating Cybersecurity in V2X: A Review of Simulation Environments |
| title_fullStr | Integrating Cybersecurity in V2X: A Review of Simulation Environments |
| title_full_unstemmed | Integrating Cybersecurity in V2X: A Review of Simulation Environments |
| title_short | Integrating Cybersecurity in V2X: A Review of Simulation Environments |
| title_sort | integrating cybersecurity in v2x a review of simulation environments |
| topic | Vehicle-to-everything connected and automated vehicles trends in V2X simulations V2X simulation tools V2X cybersecurity radio jamming |
| url | https://ieeexplore.ieee.org/document/10759653/ |
| work_keys_str_mv | AT kevinhermanmurarogularte integratingcybersecurityinv2xareviewofsimulationenvironments AT joaopaulojavididacosta integratingcybersecurityinv2xareviewofsimulationenvironments AT josealfredoruizvargas integratingcybersecurityinv2xareviewofsimulationenvironments AT antoniosantosdasilva integratingcybersecurityinv2xareviewofsimulationenvironments AT giovannialmeidasantos integratingcybersecurityinv2xareviewofsimulationenvironments AT yumingwang integratingcybersecurityinv2xareviewofsimulationenvironments AT christianalfonsmuller integratingcybersecurityinv2xareviewofsimulationenvironments AT christophlipps integratingcybersecurityinv2xareviewofsimulationenvironments AT rafaeltimoteodesousa integratingcybersecurityinv2xareviewofsimulationenvironments AT walterdebrittovidalfilho integratingcybersecurityinv2xareviewofsimulationenvironments AT philippslusallek integratingcybersecurityinv2xareviewofsimulationenvironments AT hansdieterschotten integratingcybersecurityinv2xareviewofsimulationenvironments |