Integrating Cybersecurity in V2X: A Review of Simulation Environments

The deployment and acceptance of Vehicle-to-Everything (V2X) technologies are essential for the advancement of intelligent transportation systems, requiring robust simulation tools for development and validation. This paper offers an overview of leading V2X simulation tools, emphasizing their role i...

Full description

Saved in:
Bibliographic Details
Main Authors: Kevin Herman Muraro Gularte, Joao Paulo Javidi da Costa, Jose Alfredo Ruiz Vargas, Antonio Santos da Silva, Giovanni Almeida Santos, Yuming Wang, Christian Alfons Muller, Christoph Lipps, Rafael Timoteo de Sousa, Walter de Britto Vidal Filho, Philipp Slusallek, Hans Dieter Schotten
Format: Article
Language:English
Published: IEEE 2024-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/10759653/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850126794254974976
author Kevin Herman Muraro Gularte
Joao Paulo Javidi da Costa
Jose Alfredo Ruiz Vargas
Antonio Santos da Silva
Giovanni Almeida Santos
Yuming Wang
Christian Alfons Muller
Christoph Lipps
Rafael Timoteo de Sousa
Walter de Britto Vidal Filho
Philipp Slusallek
Hans Dieter Schotten
author_facet Kevin Herman Muraro Gularte
Joao Paulo Javidi da Costa
Jose Alfredo Ruiz Vargas
Antonio Santos da Silva
Giovanni Almeida Santos
Yuming Wang
Christian Alfons Muller
Christoph Lipps
Rafael Timoteo de Sousa
Walter de Britto Vidal Filho
Philipp Slusallek
Hans Dieter Schotten
author_sort Kevin Herman Muraro Gularte
collection DOAJ
description The deployment and acceptance of Vehicle-to-Everything (V2X) technologies are essential for the advancement of intelligent transportation systems, requiring robust simulation tools for development and validation. This paper offers an overview of leading V2X simulation tools, emphasizing their role in communication and cybersecurity applications. Existing surveys are reviewed, identifying gaps such as the limited coverage of less known tools such as CARLA and CarSim and the absence of detailed market analyses. A thorough assessment of the market significance of V2X simulation tools is provided, highlighting annual trends and profiling leading companies. Publication trends across major scientific databases are also examined, reflecting the growing interest and research diversity in V2X simulations. The review includes an analysis of crucial simulation tools such as SUMO, NS3, OMNeT++, Veins, and CARLA, emphasizing their contributions to V2X communications. Regarding cybersecurity, the study explores simulation parameters for mitigating security threats such as jamming, spoofing, Denial of Service (DoS), and eavesdropping. Furthermore, the increasing integration of different simulation tools is highlighted to address their individual limitations. Finally, emerging research opportunities are identified, advocating for the integration of co-simulation frameworks and AI-driven (Artificial Intelligence) approaches to improve the accuracy and resilience of V2X systems. This survey aims to guide future research efforts in developing secure, efficient, and scalable V2X communication technologies.
format Article
id doaj-art-4fc91d2fde784e92b17d97f4f2462921
institution OA Journals
issn 2169-3536
language English
publishDate 2024-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj-art-4fc91d2fde784e92b17d97f4f24629212025-08-20T02:33:51ZengIEEEIEEE Access2169-35362024-01-011217794617798510.1109/ACCESS.2024.350440410759653Integrating Cybersecurity in V2X: A Review of Simulation EnvironmentsKevin Herman Muraro Gularte0https://orcid.org/0000-0002-4134-9706Joao Paulo Javidi da Costa1https://orcid.org/0000-0002-8616-4924Jose Alfredo Ruiz Vargas2https://orcid.org/0000-0002-8976-4642Antonio Santos da Silva3https://orcid.org/0000-0003-3709-4007Giovanni Almeida Santos4https://orcid.org/0000-0002-0189-7361Yuming Wang5https://orcid.org/0009-0003-3313-0485Christian Alfons Muller6https://orcid.org/0000-0002-3216-8516Christoph Lipps7https://orcid.org/0000-0001-6382-9156Rafael Timoteo de Sousa8https://orcid.org/0000-0003-1101-3029Walter de Britto Vidal Filho9https://orcid.org/0000-0002-6701-658XPhilipp Slusallek10https://orcid.org/0000-0002-2189-2429Hans Dieter Schotten11https://orcid.org/0000-0001-5005-3635Graduate Program in Mechatronic Systems (PPMEC), University of Brasília (UnB), Brasília, BrazilGraduate Program in Mechatronic Systems (PPMEC), University of Brasília (UnB), Brasília, BrazilDepartment of Electrical Engineering, University of Brasília (UnB), Brasília, BrazilHamm-Lippstadt University of Applied Sciences (HSHL), Lippstadt Campus, Hamm, GermanyHamm-Lippstadt University of Applied Sciences (HSHL), Lippstadt Campus, Hamm, GermanyHamm-Lippstadt University of Applied Sciences (HSHL), Lippstadt Campus, Hamm, GermanyGerman Research Center for Artificial Intelligence (DFKI), Saarbrücken, GermanyDFKI, Kaiserslautern, GermanyProfessional Postgraduate Program in Electrical Engineering (PPEE), UnB, Brasília, BrazilDepartment of Mechanical Engineering, UnB, Brasília, BrazilGerman Research Center for Artificial Intelligence (DFKI), Saarbrücken, GermanyDFKI, Kaiserslautern, GermanyThe deployment and acceptance of Vehicle-to-Everything (V2X) technologies are essential for the advancement of intelligent transportation systems, requiring robust simulation tools for development and validation. This paper offers an overview of leading V2X simulation tools, emphasizing their role in communication and cybersecurity applications. Existing surveys are reviewed, identifying gaps such as the limited coverage of less known tools such as CARLA and CarSim and the absence of detailed market analyses. A thorough assessment of the market significance of V2X simulation tools is provided, highlighting annual trends and profiling leading companies. Publication trends across major scientific databases are also examined, reflecting the growing interest and research diversity in V2X simulations. The review includes an analysis of crucial simulation tools such as SUMO, NS3, OMNeT++, Veins, and CARLA, emphasizing their contributions to V2X communications. Regarding cybersecurity, the study explores simulation parameters for mitigating security threats such as jamming, spoofing, Denial of Service (DoS), and eavesdropping. Furthermore, the increasing integration of different simulation tools is highlighted to address their individual limitations. Finally, emerging research opportunities are identified, advocating for the integration of co-simulation frameworks and AI-driven (Artificial Intelligence) approaches to improve the accuracy and resilience of V2X systems. This survey aims to guide future research efforts in developing secure, efficient, and scalable V2X communication technologies.https://ieeexplore.ieee.org/document/10759653/Vehicle-to-everythingconnected and automated vehiclestrends in V2X simulationsV2X simulation toolsV2X cybersecurityradio jamming
spellingShingle Kevin Herman Muraro Gularte
Joao Paulo Javidi da Costa
Jose Alfredo Ruiz Vargas
Antonio Santos da Silva
Giovanni Almeida Santos
Yuming Wang
Christian Alfons Muller
Christoph Lipps
Rafael Timoteo de Sousa
Walter de Britto Vidal Filho
Philipp Slusallek
Hans Dieter Schotten
Integrating Cybersecurity in V2X: A Review of Simulation Environments
IEEE Access
Vehicle-to-everything
connected and automated vehicles
trends in V2X simulations
V2X simulation tools
V2X cybersecurity
radio jamming
title Integrating Cybersecurity in V2X: A Review of Simulation Environments
title_full Integrating Cybersecurity in V2X: A Review of Simulation Environments
title_fullStr Integrating Cybersecurity in V2X: A Review of Simulation Environments
title_full_unstemmed Integrating Cybersecurity in V2X: A Review of Simulation Environments
title_short Integrating Cybersecurity in V2X: A Review of Simulation Environments
title_sort integrating cybersecurity in v2x a review of simulation environments
topic Vehicle-to-everything
connected and automated vehicles
trends in V2X simulations
V2X simulation tools
V2X cybersecurity
radio jamming
url https://ieeexplore.ieee.org/document/10759653/
work_keys_str_mv AT kevinhermanmurarogularte integratingcybersecurityinv2xareviewofsimulationenvironments
AT joaopaulojavididacosta integratingcybersecurityinv2xareviewofsimulationenvironments
AT josealfredoruizvargas integratingcybersecurityinv2xareviewofsimulationenvironments
AT antoniosantosdasilva integratingcybersecurityinv2xareviewofsimulationenvironments
AT giovannialmeidasantos integratingcybersecurityinv2xareviewofsimulationenvironments
AT yumingwang integratingcybersecurityinv2xareviewofsimulationenvironments
AT christianalfonsmuller integratingcybersecurityinv2xareviewofsimulationenvironments
AT christophlipps integratingcybersecurityinv2xareviewofsimulationenvironments
AT rafaeltimoteodesousa integratingcybersecurityinv2xareviewofsimulationenvironments
AT walterdebrittovidalfilho integratingcybersecurityinv2xareviewofsimulationenvironments
AT philippslusallek integratingcybersecurityinv2xareviewofsimulationenvironments
AT hansdieterschotten integratingcybersecurityinv2xareviewofsimulationenvironments