PreprintPDF Available

Cybersecurity Attacks in Celluler-V2X Communicaiton Networks

Authors:
Preprints and early-stage research may not have been peer reviewed yet.

Figures

Content may be subject to copyright.
A Brief Summary of Cybersecurity attacks in V2X Communication
Noman Mazher, Mohmmad Alhaddad, Oyunchimeg Shagdar
Abstract:
Vehicles in the current era can communicate with other vehicles, roadside units, and networks. This
communication is collaboratively called Vehicle to Everything(V2X) communication. V2X network
leverages modern communication technologies such as DSRC, LTE, and 5G communication. Along with
the leverages of these technologies, potential security threat has also increased. Cybersecurity attacks
are the most common attacks that damage the V2X communication network. In this paper, we will
reveal poetnetial cybersecurity attacks in V2X communication
Keywords: V2X communication, cybersecurity attacks, V2X security
Introduction:
The growth of the human population brings numerous challenges; transportation is one of its
challenges. As much as the human population increases, more transport facilities are required. The
number of roadside vehicles increased proportionally with the human population. This massive number
of vehicles on the road brings new challenges such as traffic jams, roadside accidents resulting in loss of
precious human life, polluted atmosphere, noise pollution, and many more. Vehicles in the current era
can communicate with other vehicles, roadside units, and networks. This communication is called
Vehicle to Everything(V2X) communication. . V2X network leverages modern communication
technologies such as DSRC, LTE, and 5G communication.
Along with the leverages of these technologies, potential security threat has also increased.
Cybersecurity attacks are the most common attacks that damage the V2X communication network.
Securite is stipulatory the most common paradigm of almost every thenological field such as cloud
computing, grid computing,web, internet of things, big data and all other technological paradigms[1-5].
In this paper, we will reveal potential cybersecurity attacks in V2X communication.
Security is an intergeral part of each technologiy and simultaneously increases its demand as much as
technology increases. Figure 1 is presenting an overview of V2X communication network. V2X
communication network mainly formed by vehicle to vehicle communication(V2V), Vehicle to Network
communication (V2N), Vehicle to Pedestarian communication (V2P) and Vehicle to Infrastruture
communication (V2I).
Cybersecurity is one of the major security issue in todays technology gloab[6-20]. In this paper we will
reveal cybersecurity threats in V2X communication netwok.
Fig 1: overview of V2X communication network
Cybersecurity attacks in V2X communication:
In this section we will give an overview of cybersecurity threats commonly found from our literature rev
iew in V2X communication network.
Fig 2: Attack classification in V2X communication security
Conclusion
In this research we conducted a survey on cybersecurity attacks on vehicle to everything network.
Cybersecurity is most common security threat in all kind of network. V2X communication network also
suffer from cybersecurity attack. Since the daynamic nature of V2X need more intension on inherited
security issues of cybersecurity attacks, and demand extra security features for cybersecurity attacks.
Our research can play a vital role for new researcher in V2X communication security researchers.
Refremces:
[1] I. Ashraf and N. Mazher, "An Approach to Implement Matchmaking in Condor-G."
[2] N. Mazher and I. Ashraf, "A Survey on data security models in cloud computing," International
Journal of Engineering Research and Applications (IJERA), vol. 3, no. 6, pp. 413-417, 2013.
[3] N. Mazher, I. Ashraf, and A. Altaf, "Which web browser work best for detecting phishing," in
2013 5th International Conference on Information and Communication Technologies, 2013: IEEE,
pp. 1-5.
[4] N. Mazher and I. Ashraf, "A Systematic Mapping Study on Cloud Computing Security,"
International Journal of Computer Applications, vol. 89, no. 16, pp. 6-9, 2014.
[5] S. A. Shah and N. Mazher, "A review on security on internet of things," in November 2018
Conference: 1st International Multi-Disciplinary Research Conference (IMDRC 2017).
[6] M. Du, Z. Chen, C. Liu, R. Oak, and D. Song, "Lifelong anomaly detection through unlearning," in
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security,
2019, pp. 1283-1297.
[7] H. Jain, R. Oak, and J. Bansal, "Towards Developing a Secure and Robust Solution for E-Voting
using Blockchain," in 2019 International Conference on Nascent Technologies in Engineering
(ICNTE), 2019: IEEE, pp. 1-6.
[8] K. S. Jhala, R. Oak, and M. Khare, "Smart collaboration mechanism using blockchain technology,"
in 2018 5th IEEE International Conference on Cyber Security and Cloud Computing
(CSCloud)/2018 4th IEEE International Conference on Edge Computing and Scalable Cloud
(EdgeCom), 2018: IEEE, pp. 117-121.
[9] M. Khare and R. Oak, "Real-Time distributed denial-of-service (DDoS) attack detection using
decision trees for server performance maintenance," in Performance Management of Integrated
Systems and its Applications in Software Engineering: Springer, 2020, pp. 1-9.
[10] J. C. Newman and R. Oak, "Artificial Intelligence: Ethics in Practice," login Usenix Mag., vol. 45,
no. 1, 2020.
[11] R. Oak, "A study of digital image segmentation techniques," Int. J. Eng. Comput. Sci, vol. 5, no.
12, pp. 19779-19783, 2016.
[12] R. Oak, "Extractive techniques for automatic document summarization: a survey," International
Journal of Innovative Research in Computer and Communication Engineering, vol. 4, no. 3, pp.
4158-4164, 2016.
[13] R. Oak and M. Khare, "A novel architecture for continuous authentication using behavioural
biometrics," in 2017 International Conference on Current Trends in Computer, Electrical,
Electronics and Communication (CTCEEC), 2017: IEEE, pp. 767-771.
[14] R. Oak, "A literature survey on authentication using Behavioural biometric techniques,"
Intelligent Computing and Information and Communication, pp. 173-181, 2018.
[15] R. Oak, M. Khare, A. Gogate, and G. Vipra, "Dynamic Forms UI: Flexible and Portable Tool for
easy UI Design," in 2018 Second International Conference on Inventive Communication and
Computational Technologies (ICICCT), 2018: IEEE, pp. 1926-1931.
[16] R. Oak, M. Du, D. Yan, H. Takawale, and I. Amit, "Malware detection on highly imbalanced data
through sequence modeling," in Proceedings of the 12th ACM Workshop on artificial intelligence
and security, 2019, pp. 37-48.
[17] R. Oak, "Poster: Adversarial Examples for Hate Speech Classifiers," in Proceedings of the 2019
ACM SIGSAC Conference on Computer and Communications Security, 2019, pp. 2621-2623.
[18] R. Oak, C. Rahalkar, and D. Gujar, "Poster: Using generative adversarial networks for secure
pseudorandom number generation," in Proceedings of the 2019 ACM SIGSAC Conference on
Computer and Communications Security, 2019, pp. 2597-2599.
[19] R. Oak, "The Fault in the Stars: Understanding the Underground Market of Amazon Reviews,"
arXiv preprint arXiv:2102.04217, 2021.
[20] V. Sehwag, R. Oak, M. Chiang, and P. Mittal, "Time for a background check! uncovering the
impact of background features on deep neural networks," arXiv preprint arXiv:2006.14077,
2020.
ResearchGate has not been able to resolve any citations for this publication.
The Fault in the Stars: Understanding the Underground Market of Amazon Reviews
  • R Oak
R. Oak, "The Fault in the Stars: Understanding the Underground Market of Amazon Reviews," arXiv preprint arXiv:2102.04217, 2021.
Time for a background check! uncovering the impact of background features on deep neural networks
  • V Sehwag
  • R Oak
  • M Chiang
  • P Mittal
V. Sehwag, R. Oak, M. Chiang, and P. Mittal, "Time for a background check! uncovering the impact of background features on deep neural networks," arXiv preprint arXiv:2006.14077, 2020.