A literature review on V2X communications security: Foundation, solutions, status, and future

Abstract With the refinement and development of the Vehicle to Everything (V2X) concept, its security issues have gradually come to the fore, revealing many security risks and increasing security requirements for V2X, and many protective measures have likewise emerged. The article first introduces t...

Full description

Saved in:
Bibliographic Details
Main Authors: Zuobin Ying, Kaichao Wang, Jinbo Xiong, Maode Ma
Format: Article
Language:English
Published: Wiley 2024-12-01
Series:IET Communications
Subjects:
Online Access:https://doi.org/10.1049/cmu2.12778
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850054227320111104
author Zuobin Ying
Kaichao Wang
Jinbo Xiong
Maode Ma
author_facet Zuobin Ying
Kaichao Wang
Jinbo Xiong
Maode Ma
author_sort Zuobin Ying
collection DOAJ
description Abstract With the refinement and development of the Vehicle to Everything (V2X) concept, its security issues have gradually come to the fore, revealing many security risks and increasing security requirements for V2X, and many protective measures have likewise emerged. The article first introduces the development history of the past Internet of Vehicles(IoV), summarizes some common V2X security threats, surveys the security technologies used for V2X communication, and outlines the development of each technology and the proposed security protocols in the last 3 years. Due to the different advantages and disadvantages of previous protection schemes, the idea of using National Cryptography to supplement the security scheme or designing a new security scheme article based on the National Cryptography Algorithms((AKA SM algorithms) is proposed. The survey then introduces the SM2, SM3, SM9, and ZUC algorithms, describes the development and application of the SM commercial algorithm in recent years, and finally, statistics and introduces the part of the development process of the security protocols currently used in IoV regarding the SM algorithms and gives some application prospects.
format Article
id doaj-art-5c2cc8f687aa40eca37c110f20b81005
institution DOAJ
issn 1751-8628
1751-8636
language English
publishDate 2024-12-01
publisher Wiley
record_format Article
series IET Communications
spelling doaj-art-5c2cc8f687aa40eca37c110f20b810052025-08-20T02:52:20ZengWileyIET Communications1751-86281751-86362024-12-0118201683171510.1049/cmu2.12778A literature review on V2X communications security: Foundation, solutions, status, and futureZuobin Ying0Kaichao Wang1Jinbo Xiong2Maode Ma3Faculty of Data Science City University of Macau Macau ChinaFaculty of Data Science City University of Macau Macau ChinaFujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fujian Normal University Fuzhou ChinaCollege of Engineering Qatar University Doha QatarAbstract With the refinement and development of the Vehicle to Everything (V2X) concept, its security issues have gradually come to the fore, revealing many security risks and increasing security requirements for V2X, and many protective measures have likewise emerged. The article first introduces the development history of the past Internet of Vehicles(IoV), summarizes some common V2X security threats, surveys the security technologies used for V2X communication, and outlines the development of each technology and the proposed security protocols in the last 3 years. Due to the different advantages and disadvantages of previous protection schemes, the idea of using National Cryptography to supplement the security scheme or designing a new security scheme article based on the National Cryptography Algorithms((AKA SM algorithms) is proposed. The survey then introduces the SM2, SM3, SM9, and ZUC algorithms, describes the development and application of the SM commercial algorithm in recent years, and finally, statistics and introduces the part of the development process of the security protocols currently used in IoV regarding the SM algorithms and gives some application prospects.https://doi.org/10.1049/cmu2.12778cryptographysecurity of datavehicular ad hoc networks
spellingShingle Zuobin Ying
Kaichao Wang
Jinbo Xiong
Maode Ma
A literature review on V2X communications security: Foundation, solutions, status, and future
IET Communications
cryptography
security of data
vehicular ad hoc networks
title A literature review on V2X communications security: Foundation, solutions, status, and future
title_full A literature review on V2X communications security: Foundation, solutions, status, and future
title_fullStr A literature review on V2X communications security: Foundation, solutions, status, and future
title_full_unstemmed A literature review on V2X communications security: Foundation, solutions, status, and future
title_short A literature review on V2X communications security: Foundation, solutions, status, and future
title_sort literature review on v2x communications security foundation solutions status and future
topic cryptography
security of data
vehicular ad hoc networks
url https://doi.org/10.1049/cmu2.12778
work_keys_str_mv AT zuobinying aliteraturereviewonv2xcommunicationssecurityfoundationsolutionsstatusandfuture
AT kaichaowang aliteraturereviewonv2xcommunicationssecurityfoundationsolutionsstatusandfuture
AT jinboxiong aliteraturereviewonv2xcommunicationssecurityfoundationsolutionsstatusandfuture
AT maodema aliteraturereviewonv2xcommunicationssecurityfoundationsolutionsstatusandfuture
AT zuobinying literaturereviewonv2xcommunicationssecurityfoundationsolutionsstatusandfuture
AT kaichaowang literaturereviewonv2xcommunicationssecurityfoundationsolutionsstatusandfuture
AT jinboxiong literaturereviewonv2xcommunicationssecurityfoundationsolutionsstatusandfuture
AT maodema literaturereviewonv2xcommunicationssecurityfoundationsolutionsstatusandfuture