Protecting Hybrid ITS Networks: A Comprehensive Security Approach

Cooperative intelligent transport systems (C-ITS) continue to be developed to enhance transportation safety and sustainability. However, the communication of vehicle-to-everything (V2X) systems is inherently open, leading to vulnerabilities that attackers can exploit. This represents a threat to all...

Full description

Bibliographic Details
Main Authors: Ricardo Severino, José Simão, Nuno Datia, António Serrador
Format: Article
Language:English
Published: MDPI AG 2023-11-01
Series:Future Internet
Subjects:
Online Access:https://www.mdpi.com/1999-5903/15/12/388
_version_ 1797380994856124416
author Ricardo Severino
José Simão
Nuno Datia
António Serrador
author_facet Ricardo Severino
José Simão
Nuno Datia
António Serrador
author_sort Ricardo Severino
collection DOAJ
description Cooperative intelligent transport systems (C-ITS) continue to be developed to enhance transportation safety and sustainability. However, the communication of vehicle-to-everything (V2X) systems is inherently open, leading to vulnerabilities that attackers can exploit. This represents a threat to all road users, as security failures can lead to privacy violations or even fatalities. Moreover, a high fatality rate is correlated with soft-mobility road users. Therefore, when developing C-ITS systems, it is important to broaden the focus beyond connected vehicles to include soft-mobility users and legacy vehicles. This work presents a new approach developed in the context of emerging hybrid networks, combining intelligent transport systems operating in 5.9 GHz (ITS-G5) and radio-mobile cellular technologies. Two protocols were implemented and evaluated to introduce security guarantees (such as privacy and integrity) in communications within the developed C-ITS hybrid environment. As a result, this work securely integrates G5-connected ITS stations and soft-mobility users through a smartphone application via cellular networks. Commercial equipment was used for this goal, including on-board and roadside units. Computational, transmission and end-to-end latency were used to assess the system’s performance. Implemented protocols introduce an additional 11% end-to-end latency in hybrid communications. Moreover, workflows employing hybrid communications impose, on average, an extra 28.29 ms of end-to-end latency. The proposal shows promise, as it reaches end-to-end times below the latency requirements imposed in most C-ITS use cases.
first_indexed 2024-03-08T20:45:00Z
format Article
id doaj.art-ae1914d446a24ce4ad44d887a8801a5d
institution Directory Open Access Journal
issn 1999-5903
language English
last_indexed 2024-03-08T20:45:00Z
publishDate 2023-11-01
publisher MDPI AG
record_format Article
series Future Internet
spelling doaj.art-ae1914d446a24ce4ad44d887a8801a5d2023-12-22T14:10:11ZengMDPI AGFuture Internet1999-59032023-11-01151238810.3390/fi15120388Protecting Hybrid ITS Networks: A Comprehensive Security ApproachRicardo Severino0José Simão1Nuno Datia2António Serrador3Lisbon School of Engineering (ISEL), Polytechnic University of Lisbon (IPL), 1549-020 Lisboa, PortugalLisbon School of Engineering (ISEL), Polytechnic University of Lisbon (IPL), 1549-020 Lisboa, PortugalLisbon School of Engineering (ISEL), Polytechnic University of Lisbon (IPL), 1549-020 Lisboa, PortugalLisbon School of Engineering (ISEL), Polytechnic University of Lisbon (IPL), 1549-020 Lisboa, PortugalCooperative intelligent transport systems (C-ITS) continue to be developed to enhance transportation safety and sustainability. However, the communication of vehicle-to-everything (V2X) systems is inherently open, leading to vulnerabilities that attackers can exploit. This represents a threat to all road users, as security failures can lead to privacy violations or even fatalities. Moreover, a high fatality rate is correlated with soft-mobility road users. Therefore, when developing C-ITS systems, it is important to broaden the focus beyond connected vehicles to include soft-mobility users and legacy vehicles. This work presents a new approach developed in the context of emerging hybrid networks, combining intelligent transport systems operating in 5.9 GHz (ITS-G5) and radio-mobile cellular technologies. Two protocols were implemented and evaluated to introduce security guarantees (such as privacy and integrity) in communications within the developed C-ITS hybrid environment. As a result, this work securely integrates G5-connected ITS stations and soft-mobility users through a smartphone application via cellular networks. Commercial equipment was used for this goal, including on-board and roadside units. Computational, transmission and end-to-end latency were used to assess the system’s performance. Implemented protocols introduce an additional 11% end-to-end latency in hybrid communications. Moreover, workflows employing hybrid communications impose, on average, an extra 28.29 ms of end-to-end latency. The proposal shows promise, as it reaches end-to-end times below the latency requirements imposed in most C-ITS use cases.https://www.mdpi.com/1999-5903/15/12/388C-ITSITS-G5cellular networkhybrid networksecurityprivacy
spellingShingle Ricardo Severino
José Simão
Nuno Datia
António Serrador
Protecting Hybrid ITS Networks: A Comprehensive Security Approach
Future Internet
C-ITS
ITS-G5
cellular network
hybrid network
security
privacy
title Protecting Hybrid ITS Networks: A Comprehensive Security Approach
title_full Protecting Hybrid ITS Networks: A Comprehensive Security Approach
title_fullStr Protecting Hybrid ITS Networks: A Comprehensive Security Approach
title_full_unstemmed Protecting Hybrid ITS Networks: A Comprehensive Security Approach
title_short Protecting Hybrid ITS Networks: A Comprehensive Security Approach
title_sort protecting hybrid its networks a comprehensive security approach
topic C-ITS
ITS-G5
cellular network
hybrid network
security
privacy
url https://www.mdpi.com/1999-5903/15/12/388
work_keys_str_mv AT ricardoseverino protectinghybriditsnetworksacomprehensivesecurityapproach
AT josesimao protectinghybriditsnetworksacomprehensivesecurityapproach
AT nunodatia protectinghybriditsnetworksacomprehensivesecurityapproach
AT antonioserrador protectinghybriditsnetworksacomprehensivesecurityapproach