{"title":"A Survey on Vulnerabilities and Classification of Cyber-Attacks on 5G-V2X","authors":"Mera Saulaiman, M. Kozlovszky, Á. Csilling","doi":"10.1109/CINTI53070.2021.9668440","DOIUrl":null,"url":null,"abstract":"In the Advent of Vehicular Communion as an essential part of autonomous driving, and the demanding requirements and services for autonomous driving, a new technology is needed to fulfill those needs. The new features of 5G and NR-5G enables it as the platform of choice for sensors and vehicles. It fulfills the requirements of vehicular networks and vehicle-to-everything (V2X) services. The Third Generation Partnership Project (3GPP) Release 14 and above addresses the requirements of V2X services with standardized services for the current LTE and upcoming 5G-NR technologies. On the other hand, due to its novelty, serious security and privacy concerns were raised. Wireless interfaces on vehicles create the possibility for attackers to remotely access vehicles. In this paper, we present an organized view of the existing 5G- V2X communication technologies, including V2X history, architecture, communication and use cases, We explore the different attacks and vulnerabilities on 5G-V2X, and present a comprehensive classification based on the combination of various criteria found in the literature. Lastly we discuss the possible direction of future research related to security issues in V2X communication.","PeriodicalId":340545,"journal":{"name":"2021 IEEE 21st International Symposium on Computational Intelligence and Informatics (CINTI)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE 21st International Symposium on Computational Intelligence and Informatics (CINTI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CINTI53070.2021.9668440","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
In the Advent of Vehicular Communion as an essential part of autonomous driving, and the demanding requirements and services for autonomous driving, a new technology is needed to fulfill those needs. The new features of 5G and NR-5G enables it as the platform of choice for sensors and vehicles. It fulfills the requirements of vehicular networks and vehicle-to-everything (V2X) services. The Third Generation Partnership Project (3GPP) Release 14 and above addresses the requirements of V2X services with standardized services for the current LTE and upcoming 5G-NR technologies. On the other hand, due to its novelty, serious security and privacy concerns were raised. Wireless interfaces on vehicles create the possibility for attackers to remotely access vehicles. In this paper, we present an organized view of the existing 5G- V2X communication technologies, including V2X history, architecture, communication and use cases, We explore the different attacks and vulnerabilities on 5G-V2X, and present a comprehensive classification based on the combination of various criteria found in the literature. Lastly we discuss the possible direction of future research related to security issues in V2X communication.