Protecting Hybrid ITS Networks: A Comprehensive Security Approach
Cooperative intelligent transport systems (C-ITS) continue to be developed to enhance transportation safety and sustainability. However, the communication of vehicle-to-everything (V2X) systems is inherently open, leading to vulnerabilities that attackers can exploit. This represents a threat to all...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2023-11-01
|
Series: | Future Internet |
Subjects: | |
Online Access: | https://www.mdpi.com/1999-5903/15/12/388 |
_version_ | 1797380994856124416 |
---|---|
author | Ricardo Severino José Simão Nuno Datia António Serrador |
author_facet | Ricardo Severino José Simão Nuno Datia António Serrador |
author_sort | Ricardo Severino |
collection | DOAJ |
description | Cooperative intelligent transport systems (C-ITS) continue to be developed to enhance transportation safety and sustainability. However, the communication of vehicle-to-everything (V2X) systems is inherently open, leading to vulnerabilities that attackers can exploit. This represents a threat to all road users, as security failures can lead to privacy violations or even fatalities. Moreover, a high fatality rate is correlated with soft-mobility road users. Therefore, when developing C-ITS systems, it is important to broaden the focus beyond connected vehicles to include soft-mobility users and legacy vehicles. This work presents a new approach developed in the context of emerging hybrid networks, combining intelligent transport systems operating in 5.9 GHz (ITS-G5) and radio-mobile cellular technologies. Two protocols were implemented and evaluated to introduce security guarantees (such as privacy and integrity) in communications within the developed C-ITS hybrid environment. As a result, this work securely integrates G5-connected ITS stations and soft-mobility users through a smartphone application via cellular networks. Commercial equipment was used for this goal, including on-board and roadside units. Computational, transmission and end-to-end latency were used to assess the system’s performance. Implemented protocols introduce an additional 11% end-to-end latency in hybrid communications. Moreover, workflows employing hybrid communications impose, on average, an extra 28.29 ms of end-to-end latency. The proposal shows promise, as it reaches end-to-end times below the latency requirements imposed in most C-ITS use cases. |
first_indexed | 2024-03-08T20:45:00Z |
format | Article |
id | doaj.art-ae1914d446a24ce4ad44d887a8801a5d |
institution | Directory Open Access Journal |
issn | 1999-5903 |
language | English |
last_indexed | 2024-03-08T20:45:00Z |
publishDate | 2023-11-01 |
publisher | MDPI AG |
record_format | Article |
series | Future Internet |
spelling | doaj.art-ae1914d446a24ce4ad44d887a8801a5d2023-12-22T14:10:11ZengMDPI AGFuture Internet1999-59032023-11-01151238810.3390/fi15120388Protecting Hybrid ITS Networks: A Comprehensive Security ApproachRicardo Severino0José Simão1Nuno Datia2António Serrador3Lisbon School of Engineering (ISEL), Polytechnic University of Lisbon (IPL), 1549-020 Lisboa, PortugalLisbon School of Engineering (ISEL), Polytechnic University of Lisbon (IPL), 1549-020 Lisboa, PortugalLisbon School of Engineering (ISEL), Polytechnic University of Lisbon (IPL), 1549-020 Lisboa, PortugalLisbon School of Engineering (ISEL), Polytechnic University of Lisbon (IPL), 1549-020 Lisboa, PortugalCooperative intelligent transport systems (C-ITS) continue to be developed to enhance transportation safety and sustainability. However, the communication of vehicle-to-everything (V2X) systems is inherently open, leading to vulnerabilities that attackers can exploit. This represents a threat to all road users, as security failures can lead to privacy violations or even fatalities. Moreover, a high fatality rate is correlated with soft-mobility road users. Therefore, when developing C-ITS systems, it is important to broaden the focus beyond connected vehicles to include soft-mobility users and legacy vehicles. This work presents a new approach developed in the context of emerging hybrid networks, combining intelligent transport systems operating in 5.9 GHz (ITS-G5) and radio-mobile cellular technologies. Two protocols were implemented and evaluated to introduce security guarantees (such as privacy and integrity) in communications within the developed C-ITS hybrid environment. As a result, this work securely integrates G5-connected ITS stations and soft-mobility users through a smartphone application via cellular networks. Commercial equipment was used for this goal, including on-board and roadside units. Computational, transmission and end-to-end latency were used to assess the system’s performance. Implemented protocols introduce an additional 11% end-to-end latency in hybrid communications. Moreover, workflows employing hybrid communications impose, on average, an extra 28.29 ms of end-to-end latency. The proposal shows promise, as it reaches end-to-end times below the latency requirements imposed in most C-ITS use cases.https://www.mdpi.com/1999-5903/15/12/388C-ITSITS-G5cellular networkhybrid networksecurityprivacy |
spellingShingle | Ricardo Severino José Simão Nuno Datia António Serrador Protecting Hybrid ITS Networks: A Comprehensive Security Approach Future Internet C-ITS ITS-G5 cellular network hybrid network security privacy |
title | Protecting Hybrid ITS Networks: A Comprehensive Security Approach |
title_full | Protecting Hybrid ITS Networks: A Comprehensive Security Approach |
title_fullStr | Protecting Hybrid ITS Networks: A Comprehensive Security Approach |
title_full_unstemmed | Protecting Hybrid ITS Networks: A Comprehensive Security Approach |
title_short | Protecting Hybrid ITS Networks: A Comprehensive Security Approach |
title_sort | protecting hybrid its networks a comprehensive security approach |
topic | C-ITS ITS-G5 cellular network hybrid network security privacy |
url | https://www.mdpi.com/1999-5903/15/12/388 |
work_keys_str_mv | AT ricardoseverino protectinghybriditsnetworksacomprehensivesecurityapproach AT josesimao protectinghybriditsnetworksacomprehensivesecurityapproach AT nunodatia protectinghybriditsnetworksacomprehensivesecurityapproach AT antonioserrador protectinghybriditsnetworksacomprehensivesecurityapproach |