Smart City Gnosys

Smart city article details

Title In-Vehicle Communication Cyber Security: A Comprehensive Review Of Challenges And Solutions
ID_Doc 31055
Authors Gul B.; Ertam F.
Year 2024
Published Vehicular Communications, 50
DOI http://dx.doi.org/10.1016/j.vehcom.2024.100846
Abstract The utilization of autonomous vehicles is experiencing a rapid proliferation in contemporary society. Concurrently, with the relentless evolution of technology, the inexorable integration of autonomous vehicles into urban environments, driven by the overarching paradigm of smart cities, becomes increasingly apparent. This escalating reliance on autonomous vehicles concurrently heightens the susceptibility to malevolent actors orchestrating cyber-attacks against these vehicular systems. While previous years have seen a limited corpus of academic research pertaining to cyber-attack and defense methodologies for autonomous vehicles, the relentless progression of technology mandates a more contemporary and exhaustive inquiry. In addition, to the best of our knowledge, there is no article in the literature that provides detailed information and comparisons about in-vehicle sensors, in-vehicle networks, and in-vehicle network datasets by combining them in one article. Also, to our knowledge, very limited studies have been conducted on separately comparative analysis of in-vehicle networks, in-vehicle sensors or data sets in 2024, and therefore, the necessity of conducting a review study on these topics was recognized. To address this deficiency, we compile articles on attacks and defenses on sensors, in-vehicle networks and present detailed information about the latest datasets and provide comparative analysis. In this paper, we have analyzed 108 papers from the last 10 years on in-vehicle networks and sensors. 38 articles on in-vehicle sensors and 70 articles on in-vehicle networks were reviewed and analyzed. We categorize in-vehicle communication attacks into two main groups: sensor-initiated and network-initiated, with a chronological classification to highlight their evolution. We also compare the progress in securing in-vehicle communication and evaluate the most widely used datasets for attack and protection methods. Additionally, we discuss the advantages and disadvantages of these datasets and suggest future research directions. To the best of our knowledge, this work is the first to offer detailed information and comparative analysis of in-vehicle networks, sensors, and the latest datasets. While the study highlights the significant research conducted to protect in-vehicle networks and sensors from cyber attacks, technological advancements continue to introduce new attack vectors. Cars remain particularly susceptible to threats such as DoS, Fuzzy, Spoofing, and Replay attacks. Moreover, current defense mechanisms, including LSTM and CNN, have notable limitations. Future research is needed to address these challenges and enhance vehicle cybersecurity. © 2024 Elsevier Inc.
Author Keywords Autonomous vehicle; In-vehicle networks; Intrusion detection


Similar Articles


Id Similarity Authors Title Published
8506 View0.918Shanthalakshmi M.; Ponmagal R.S.An Intelligent Dynamic Cyber Physical System Threat Detection System For Ensuring Secured Communication In 6G Autonomous Vehicle NetworksScientific Reports, 14, 1 (2024)
17014 View0.917Kim K.; Kim J.S.; Jeong S.; Park J.-H.; Kim H.K.Cybersecurity For Autonomous Vehicles: Review Of Attacks And DefenseComputers and Security, 103 (2021)
49450 View0.913Kong S.; Wang K.; Feng C.; Wang J.Smart Cities And Transportation Based Vehicle-To-Vehicle Communication And Cyber Security Analysis Using Machine Learning Model In 6G NetworkWireless Personal Communications (2024)
58842 View0.907Aleisa H.N.; Alrowais F.; Allafi R.; Almalki N.S.; Faqih R.; Marzouk R.; Alnfiai M.M.; Motwakel A.; Ibrahim S.S.Transforming Transportation: Safe And Secure Vehicular Communication And Anomaly Detection With Intelligent Cyber-Physical System And Deep LearningIEEE Transactions on Consumer Electronics, 70, 1 (2024)
47824 View0.9Chowdhury N.M.I.; Hasan R.Security Analysis Of Connected Autonomous Vehicles (Cavs): Challenges, Issues, Defenses, And Open ProblemsProceedings - 2024 IEEE World Forum on Public Safety Technology, WFPST 2024 (2024)
46048 View0.896Brocklehurst C.; Radenkovic M.Resistance To Cybersecurity Attacks In A Novel Network For Autonomous VehiclesJournal of Sensor and Actuator Networks, 11, 3 (2022)
8914 View0.895Chowdhury N.M.I.; Hoque M.A.; Hasan R.An Overview Of Cyber Attacks And Defenses On Intelligent Connected VehiclesComputer and Information Security Handbook, Fourth Edition: Volumes 1-2, 2 (2024)
11021 View0.895Alwasel A.; Mishra S.; AlShehri M.Attacks On The Vehicle Ad-Hoc Network From CyberspaceInternational Journal of Advanced Computer Science and Applications, 14, 7 (2023)
30072 View0.886Abdallah E.E.; Aloqaily A.; Fayez H.Identifying Intrusion Attempts On Connected And Autonomous Vehicles: A SurveyProcedia Computer Science, 220 (2023)
47813 View0.885Jain R.; Tihanyi N.; Ferrag M.A.Securing Tomorrow’S Smart Cities: Investigating Software Security In Internet Of Vehicles And Deep Learning TechnologiesLecture Notes in Intelligent Transportation and Infrastructure, Part F99 (2025)