A literature review on V2X communications security: Foundation, solutions, status, and future
Abstract With the refinement and development of the Vehicle to Everything (V2X) concept, its security issues have gradually come to the fore, revealing many security risks and increasing security requirements for V2X, and many protective measures have likewise emerged. The article first introduces t...
Saved in:
| Main Authors: | , , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Wiley
2024-12-01
|
| Series: | IET Communications |
| Subjects: | |
| Online Access: | https://doi.org/10.1049/cmu2.12778 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1850054227320111104 |
|---|---|
| author | Zuobin Ying Kaichao Wang Jinbo Xiong Maode Ma |
| author_facet | Zuobin Ying Kaichao Wang Jinbo Xiong Maode Ma |
| author_sort | Zuobin Ying |
| collection | DOAJ |
| description | Abstract With the refinement and development of the Vehicle to Everything (V2X) concept, its security issues have gradually come to the fore, revealing many security risks and increasing security requirements for V2X, and many protective measures have likewise emerged. The article first introduces the development history of the past Internet of Vehicles(IoV), summarizes some common V2X security threats, surveys the security technologies used for V2X communication, and outlines the development of each technology and the proposed security protocols in the last 3 years. Due to the different advantages and disadvantages of previous protection schemes, the idea of using National Cryptography to supplement the security scheme or designing a new security scheme article based on the National Cryptography Algorithms((AKA SM algorithms) is proposed. The survey then introduces the SM2, SM3, SM9, and ZUC algorithms, describes the development and application of the SM commercial algorithm in recent years, and finally, statistics and introduces the part of the development process of the security protocols currently used in IoV regarding the SM algorithms and gives some application prospects. |
| format | Article |
| id | doaj-art-5c2cc8f687aa40eca37c110f20b81005 |
| institution | DOAJ |
| issn | 1751-8628 1751-8636 |
| language | English |
| publishDate | 2024-12-01 |
| publisher | Wiley |
| record_format | Article |
| series | IET Communications |
| spelling | doaj-art-5c2cc8f687aa40eca37c110f20b810052025-08-20T02:52:20ZengWileyIET Communications1751-86281751-86362024-12-0118201683171510.1049/cmu2.12778A literature review on V2X communications security: Foundation, solutions, status, and futureZuobin Ying0Kaichao Wang1Jinbo Xiong2Maode Ma3Faculty of Data Science City University of Macau Macau ChinaFaculty of Data Science City University of Macau Macau ChinaFujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fujian Normal University Fuzhou ChinaCollege of Engineering Qatar University Doha QatarAbstract With the refinement and development of the Vehicle to Everything (V2X) concept, its security issues have gradually come to the fore, revealing many security risks and increasing security requirements for V2X, and many protective measures have likewise emerged. The article first introduces the development history of the past Internet of Vehicles(IoV), summarizes some common V2X security threats, surveys the security technologies used for V2X communication, and outlines the development of each technology and the proposed security protocols in the last 3 years. Due to the different advantages and disadvantages of previous protection schemes, the idea of using National Cryptography to supplement the security scheme or designing a new security scheme article based on the National Cryptography Algorithms((AKA SM algorithms) is proposed. The survey then introduces the SM2, SM3, SM9, and ZUC algorithms, describes the development and application of the SM commercial algorithm in recent years, and finally, statistics and introduces the part of the development process of the security protocols currently used in IoV regarding the SM algorithms and gives some application prospects.https://doi.org/10.1049/cmu2.12778cryptographysecurity of datavehicular ad hoc networks |
| spellingShingle | Zuobin Ying Kaichao Wang Jinbo Xiong Maode Ma A literature review on V2X communications security: Foundation, solutions, status, and future IET Communications cryptography security of data vehicular ad hoc networks |
| title | A literature review on V2X communications security: Foundation, solutions, status, and future |
| title_full | A literature review on V2X communications security: Foundation, solutions, status, and future |
| title_fullStr | A literature review on V2X communications security: Foundation, solutions, status, and future |
| title_full_unstemmed | A literature review on V2X communications security: Foundation, solutions, status, and future |
| title_short | A literature review on V2X communications security: Foundation, solutions, status, and future |
| title_sort | literature review on v2x communications security foundation solutions status and future |
| topic | cryptography security of data vehicular ad hoc networks |
| url | https://doi.org/10.1049/cmu2.12778 |
| work_keys_str_mv | AT zuobinying aliteraturereviewonv2xcommunicationssecurityfoundationsolutionsstatusandfuture AT kaichaowang aliteraturereviewonv2xcommunicationssecurityfoundationsolutionsstatusandfuture AT jinboxiong aliteraturereviewonv2xcommunicationssecurityfoundationsolutionsstatusandfuture AT maodema aliteraturereviewonv2xcommunicationssecurityfoundationsolutionsstatusandfuture AT zuobinying literaturereviewonv2xcommunicationssecurityfoundationsolutionsstatusandfuture AT kaichaowang literaturereviewonv2xcommunicationssecurityfoundationsolutionsstatusandfuture AT jinboxiong literaturereviewonv2xcommunicationssecurityfoundationsolutionsstatusandfuture AT maodema literaturereviewonv2xcommunicationssecurityfoundationsolutionsstatusandfuture |