Protecting Hybrid ITS Networks: A Comprehensive Security Approach

被引:0
|
作者
Severino, Ricardo [1 ]
Simao, Jose [1 ,2 ]
Datia, Nuno [1 ,3 ]
Serrador, Antonio [1 ]
Shibata, Naoki
机构
[1] Polytech Inst Lisbon IPL, Lisbon Sch Engn ISEL, P-1959007 Lisbon, Portugal
[2] Inst Engn Sistemas & Comp Invest & Desenvolvimento, P-1000029 Lisbon, Portugal
[3] NOVA Sch Sci & Technol, NOVA LINCS, P-2829516 Monte De Caparica, Portugal
关键词
C-ITS; ITS-G5; cellular network; hybrid network; security; privacy; integrity; V2X;
D O I
10.3390/fi15120388
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cooperative intelligent transport systems (C-ITS) continue to be developed to enhance transportation safety and sustainability. However, the communication of vehicle-to-everything (V2X) systems is inherently open, leading to vulnerabilities that attackers can exploit. This represents a threat to all road users, as security failures can lead to privacy violations or even fatalities. Moreover, a high fatality rate is correlated with soft-mobility road users. Therefore, when developing C-ITS systems, it is important to broaden the focus beyond connected vehicles to include soft-mobility users and legacy vehicles. This work presents a new approach developed in the context of emerging hybrid networks, combining intelligent transport systems operating in 5.9 GHz (ITS-G5) and radio-mobile cellular technologies. Two protocols were implemented and evaluated to introduce security guarantees (such as privacy and integrity) in communications within the developed C-ITS hybrid environment. As a result, this work securely integrates G5-connected ITS stations and soft-mobility users through a smartphone application via cellular networks. Commercial equipment was used for this goal, including on-board and roadside units. Computational, transmission and end-to-end latency were used to assess the system's performance. Implemented protocols introduce an additional 11% end-to-end latency in hybrid communications. Moreover, workflows employing hybrid communications impose, on average, an extra 28.29 ms of end-to-end latency. The proposal shows promise, as it reaches end-to-end times below the latency requirements imposed in most C-ITS use cases.
引用
收藏
页数:26
相关论文
共 50 条
  • [1] SECURITY OF NETWORKS AND INFORMATION SYSTEMS IN THE EUROPEAN UNION: A COMPREHENSIVE APPROACH?
    Robles Carrillo, Margarita
    [J]. REVISTA DE DERECHO COMUNITARIO EUROPEO, 2018, (60): : 563 - 600
  • [2] A comprehensive approach to security
    Wagner, David
    [J]. MIT SLOAN MANAGEMENT REVIEW, 2007, 48 (04) : 8 - 8
  • [3] IT security evaluation - "hybrid" approach and risk of its implementation
    Livshitz, I. I.
    Neklyudov, A. V.
    Lontsikh, P. A.
    [J]. INTERNATIONAL CONFERENCE INFORMATION TECHNOLOGIES IN BUSINESS AND INDUSTRY 2018, PTS 1-4, 2018, 1015
  • [4] A Comprehensive Approach for Network Security
    Rm, Manikandan
    Radha, D.
    [J]. PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 420 - 426
  • [5] Security schemes for protecting mobile agent based networks
    Tsaur, WJ
    Ho, CH
    [J]. 8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL VIII, PROCEEDINGS: CONTROL, COMMUNICATION AND NETWORK SYSTEMS, TECHNOLOGIES AND APPLICATIONS, 2004, : 129 - 134
  • [6] Human security and multidimensional security, their approach and usefulness for protecting human rights
    Acevedo-Navas, Christian
    Ballesteros-Betancur, Valentina
    Nieto, Maria Antonieta Corcione
    [J]. REVISTA CIENTIFICA GENERAL JOSE MARIA CORDOVA, 2022, 20 (40): : 1105 - 1127
  • [7] A Comprehensive Approach to Wind Power Forecasting Using Advanced Hybrid Neural Networks
    Vishnutheerth, E. P.
    Vijay, Vivek
    Satheesh, Rahul
    Kolhe, Mohan Lal
    [J]. IEEE ACCESS, 2024, 12 : 124790 - 124800
  • [8] A Comprehensive Approach for Security Assessment in Transport
    Cavallini, Simona
    D'Onofrio, Francesca
    Ferreira, Pedro
    Simoes, Anabela
    Garcia, Nicanor
    [J]. CRITICAL INFORMATION INFRASTRUCTURES SECURITY (CRITIS 2014), 2016, 8985 : 37 - 42
  • [9] Information security.: Comprehensive approach
    Malëzhin, OB
    [J]. NEFTYANOE KHOZYAISTVO, 2001, (03): : A24 - A27
  • [10] Model for comprehensive approach to security management
    Kralik, Lukas
    Senkerik, Roman
    Jasek, Roman
    [J]. INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2016, 7 (02) : 129 - 137