Abstract
Because of the potential impact on user's life in cooperative automated safety applications, the security of Vehicle-to-X communication (V2X) is mandatory. However, the current attacker model used in literature is often too network-oriented, and it is unclear what realistic attacks could be. In this paper, we use the V2X data lifecycle to derive the attack surfaces. From this, we lay the foundations of a revisited attacker model, which details realistic attacks and identify appropriate countermeasures. We demonstrate that while the security of data processing, data at rest, and data in-transit is well-advanced, the security of meta-data and data acquisition requires extra attention by the research community.
| Original language | English |
|---|---|
| Title of host publication | IEEE 6th International Symposium on Wireless Vehicular Communications (WiVeC 2014) |
| Place of Publication | Piscataway, NJ |
| Publisher | IEEE |
| Pages | 1-5 |
| Number of pages | 5 |
| ISBN (Print) | 978-1-4799-4452-1 |
| DOIs | |
| Publication status | Published - Sept 2014 |
| Event | IEEE 6th International Symposium on Wireless Vehicular Communications, WiVeC 2014 - Vancouver, Canada Duration: 14 Sept 2014 → 15 Sept 2014 Conference number: 6 |
Conference
| Conference | IEEE 6th International Symposium on Wireless Vehicular Communications, WiVeC 2014 |
|---|---|
| Abbreviated title | WiVeC |
| Country/Territory | Canada |
| City | Vancouver |
| Period | 14/09/14 → 15/09/14 |
Keywords
- SCS-Cybersecurity
- Cooperative automated safety applications
- Metadata
- Attacker model
- Mobile radio
- Metadata security
- Smart vehicles
- Security of data
- EC Grant Agreement nr.: FP7/269994
- Security
- V2X data lifecycle
- Sensor phenomena and characterization
- Vehicle-to-X communication
- Vehicles
- Vehicular Networks
- Telematics
- Privacy
- Telecommunication security
- Cryptography
- Data acquisition
- Hardware
- Intelligent transportation systems