5G-V2X网络攻击漏洞及分类研究

Mera Saulaiman, M. Kozlovszky, Á. Csilling
{"title":"5G-V2X网络攻击漏洞及分类研究","authors":"Mera Saulaiman, M. Kozlovszky, Á. Csilling","doi":"10.1109/CINTI53070.2021.9668440","DOIUrl":null,"url":null,"abstract":"In the Advent of Vehicular Communion as an essential part of autonomous driving, and the demanding requirements and services for autonomous driving, a new technology is needed to fulfill those needs. The new features of 5G and NR-5G enables it as the platform of choice for sensors and vehicles. It fulfills the requirements of vehicular networks and vehicle-to-everything (V2X) services. The Third Generation Partnership Project (3GPP) Release 14 and above addresses the requirements of V2X services with standardized services for the current LTE and upcoming 5G-NR technologies. On the other hand, due to its novelty, serious security and privacy concerns were raised. Wireless interfaces on vehicles create the possibility for attackers to remotely access vehicles. In this paper, we present an organized view of the existing 5G- V2X communication technologies, including V2X history, architecture, communication and use cases, We explore the different attacks and vulnerabilities on 5G-V2X, and present a comprehensive classification based on the combination of various criteria found in the literature. Lastly we discuss the possible direction of future research related to security issues in V2X communication.","PeriodicalId":340545,"journal":{"name":"2021 IEEE 21st International Symposium on Computational Intelligence and Informatics (CINTI)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"A Survey on Vulnerabilities and Classification of Cyber-Attacks on 5G-V2X\",\"authors\":\"Mera Saulaiman, M. Kozlovszky, Á. Csilling\",\"doi\":\"10.1109/CINTI53070.2021.9668440\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In the Advent of Vehicular Communion as an essential part of autonomous driving, and the demanding requirements and services for autonomous driving, a new technology is needed to fulfill those needs. The new features of 5G and NR-5G enables it as the platform of choice for sensors and vehicles. It fulfills the requirements of vehicular networks and vehicle-to-everything (V2X) services. The Third Generation Partnership Project (3GPP) Release 14 and above addresses the requirements of V2X services with standardized services for the current LTE and upcoming 5G-NR technologies. On the other hand, due to its novelty, serious security and privacy concerns were raised. Wireless interfaces on vehicles create the possibility for attackers to remotely access vehicles. In this paper, we present an organized view of the existing 5G- V2X communication technologies, including V2X history, architecture, communication and use cases, We explore the different attacks and vulnerabilities on 5G-V2X, and present a comprehensive classification based on the combination of various criteria found in the literature. Lastly we discuss the possible direction of future research related to security issues in V2X communication.\",\"PeriodicalId\":340545,\"journal\":{\"name\":\"2021 IEEE 21st International Symposium on Computational Intelligence and Informatics (CINTI)\",\"volume\":\"13 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-11-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 IEEE 21st International Symposium on Computational Intelligence and Informatics (CINTI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CINTI53070.2021.9668440\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE 21st International Symposium on Computational Intelligence and Informatics (CINTI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CINTI53070.2021.9668440","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

车辆共享作为自动驾驶的重要组成部分,以及自动驾驶的苛刻要求和服务,需要一种新的技术来满足这些需求。5G和NR-5G的新特性使其成为传感器和车辆的首选平台。它满足了车联网和车联网(V2X)服务的需求。第三代合作伙伴计划(3GPP)第14版及以上版本通过针对当前LTE和即将到来的5G-NR技术的标准化服务,解决了V2X业务的需求。另一方面,由于其新颖性,引发了严重的安全和隐私问题。车辆上的无线接口为攻击者远程访问车辆创造了可能性。在本文中,我们对现有的5G-V2X通信技术进行了组织视图,包括V2X历史,架构,通信和用例,我们探索了5G-V2X的不同攻击和漏洞,并根据文献中发现的各种标准进行了综合分类。最后讨论了V2X通信安全问题的未来研究方向。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
A Survey on Vulnerabilities and Classification of Cyber-Attacks on 5G-V2X
In the Advent of Vehicular Communion as an essential part of autonomous driving, and the demanding requirements and services for autonomous driving, a new technology is needed to fulfill those needs. The new features of 5G and NR-5G enables it as the platform of choice for sensors and vehicles. It fulfills the requirements of vehicular networks and vehicle-to-everything (V2X) services. The Third Generation Partnership Project (3GPP) Release 14 and above addresses the requirements of V2X services with standardized services for the current LTE and upcoming 5G-NR technologies. On the other hand, due to its novelty, serious security and privacy concerns were raised. Wireless interfaces on vehicles create the possibility for attackers to remotely access vehicles. In this paper, we present an organized view of the existing 5G- V2X communication technologies, including V2X history, architecture, communication and use cases, We explore the different attacks and vulnerabilities on 5G-V2X, and present a comprehensive classification based on the combination of various criteria found in the literature. Lastly we discuss the possible direction of future research related to security issues in V2X communication.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Clustering of Business Organisations based on Textual Data - An LDA Topic Modeling Approach Effective ECG data conversion solution to solve ECG data interoperability problems Adaptive Online Opponent Game Policy Modeling with Association Rule Mining Meat Factory Cell: Assisting meat processors address sustainability in meat production Validation of a Self-developed Algorithm for Solving Inverse Problems on Impedance Networks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1