Security in V2I Communications: A Systematic Literature Review

Recently, the number of vehicles equipped with wireless connections has increased considerably. The impact of that growth in areas such as telecommunications, infotainment, and automatic driving is enormous. More and more drivers want to be part of a vehicular network, despite the implications or ri...

Full description

Bibliographic Details
Main Authors: Pablo Marcillo, Diego Tamayo-Urgilés, Ángel Leonardo Valdivieso Caraguay, Myriam Hernández-Álvarez
Format: Article
Language:English
Published: MDPI AG 2022-11-01
Series:Sensors
Subjects:
Online Access:https://www.mdpi.com/1424-8220/22/23/9123
_version_ 1797462212928864256
author Pablo Marcillo
Diego Tamayo-Urgilés
Ángel Leonardo Valdivieso Caraguay
Myriam Hernández-Álvarez
author_facet Pablo Marcillo
Diego Tamayo-Urgilés
Ángel Leonardo Valdivieso Caraguay
Myriam Hernández-Álvarez
author_sort Pablo Marcillo
collection DOAJ
description Recently, the number of vehicles equipped with wireless connections has increased considerably. The impact of that growth in areas such as telecommunications, infotainment, and automatic driving is enormous. More and more drivers want to be part of a vehicular network, despite the implications or risks that, for instance, the openness of wireless communications, its dynamic topology, and its considerable size may bring. Undoubtedly, this trend is because of the benefits the vehicular network can offer. Generally, a vehicular network has two modes of communication (V2I and V2V). The advantage of V2I over V2V is roadside units’ high computational and transmission power, which assures the functioning of early warning and driving guidance services. This paper aims to discover the principal vulnerabilities and challenges in V2I communications, the tools and methods to mitigate those vulnerabilities, the evaluation metrics to measure the effectiveness of those tools and methods, and based on those metrics, the methods or tools that provide the best results. Researchers have identified the non-resistance to attacks, the regular updating and exposure of keys, and the high dependence on certification authorities as main vulnerabilities. Thus, the authors found schemes resistant to attacks, authentication schemes, privacy protection models, and intrusion detection and prevention systems. Of the solutions for providing security analyzed in this review, the authors determined that most of them use metrics such as computational cost and communication overhead to measure their performance. Additionally, they determined that the solutions that use emerging technologies such as fog/edge/cloud computing present better results than the rest. Finally, they established that the principal challenge in V2I communication is to protect and dispose of a safe and reliable communication channel to avoid adversaries taking control of the medium.
first_indexed 2024-03-09T17:33:18Z
format Article
id doaj.art-dd195d9365774202a49596845ad7a6e5
institution Directory Open Access Journal
issn 1424-8220
language English
last_indexed 2024-03-09T17:33:18Z
publishDate 2022-11-01
publisher MDPI AG
record_format Article
series Sensors
spelling doaj.art-dd195d9365774202a49596845ad7a6e52023-11-24T12:08:56ZengMDPI AGSensors1424-82202022-11-012223912310.3390/s22239123Security in V2I Communications: A Systematic Literature ReviewPablo Marcillo0Diego Tamayo-Urgilés1Ángel Leonardo Valdivieso Caraguay2Myriam Hernández-Álvarez3Departamento de Informática y Ciencias de la Computación, Escuela Politécnica Nacional, Ladrón de Guevara E11-25 y Andalucía, Edificio de Sistemas, Quito 170525, EcuadorDepartamento de Informática y Ciencias de la Computación, Escuela Politécnica Nacional, Ladrón de Guevara E11-25 y Andalucía, Edificio de Sistemas, Quito 170525, EcuadorDepartamento de Informática y Ciencias de la Computación, Escuela Politécnica Nacional, Ladrón de Guevara E11-25 y Andalucía, Edificio de Sistemas, Quito 170525, EcuadorDepartamento de Informática y Ciencias de la Computación, Escuela Politécnica Nacional, Ladrón de Guevara E11-25 y Andalucía, Edificio de Sistemas, Quito 170525, EcuadorRecently, the number of vehicles equipped with wireless connections has increased considerably. The impact of that growth in areas such as telecommunications, infotainment, and automatic driving is enormous. More and more drivers want to be part of a vehicular network, despite the implications or risks that, for instance, the openness of wireless communications, its dynamic topology, and its considerable size may bring. Undoubtedly, this trend is because of the benefits the vehicular network can offer. Generally, a vehicular network has two modes of communication (V2I and V2V). The advantage of V2I over V2V is roadside units’ high computational and transmission power, which assures the functioning of early warning and driving guidance services. This paper aims to discover the principal vulnerabilities and challenges in V2I communications, the tools and methods to mitigate those vulnerabilities, the evaluation metrics to measure the effectiveness of those tools and methods, and based on those metrics, the methods or tools that provide the best results. Researchers have identified the non-resistance to attacks, the regular updating and exposure of keys, and the high dependence on certification authorities as main vulnerabilities. Thus, the authors found schemes resistant to attacks, authentication schemes, privacy protection models, and intrusion detection and prevention systems. Of the solutions for providing security analyzed in this review, the authors determined that most of them use metrics such as computational cost and communication overhead to measure their performance. Additionally, they determined that the solutions that use emerging technologies such as fog/edge/cloud computing present better results than the rest. Finally, they established that the principal challenge in V2I communication is to protect and dispose of a safe and reliable communication channel to avoid adversaries taking control of the medium.https://www.mdpi.com/1424-8220/22/23/9123VANETV2Isecurityprivacyauthenticationconfidentiality
spellingShingle Pablo Marcillo
Diego Tamayo-Urgilés
Ángel Leonardo Valdivieso Caraguay
Myriam Hernández-Álvarez
Security in V2I Communications: A Systematic Literature Review
Sensors
VANET
V2I
security
privacy
authentication
confidentiality
title Security in V2I Communications: A Systematic Literature Review
title_full Security in V2I Communications: A Systematic Literature Review
title_fullStr Security in V2I Communications: A Systematic Literature Review
title_full_unstemmed Security in V2I Communications: A Systematic Literature Review
title_short Security in V2I Communications: A Systematic Literature Review
title_sort security in v2i communications a systematic literature review
topic VANET
V2I
security
privacy
authentication
confidentiality
url https://www.mdpi.com/1424-8220/22/23/9123
work_keys_str_mv AT pablomarcillo securityinv2icommunicationsasystematicliteraturereview
AT diegotamayourgiles securityinv2icommunicationsasystematicliteraturereview
AT angelleonardovaldiviesocaraguay securityinv2icommunicationsasystematicliteraturereview
AT myriamhernandezalvarez securityinv2icommunicationsasystematicliteraturereview