{"title":"A literature review on V2X communications security: Foundation, solutions, status, and future","authors":"Zuobin Ying, Kaichao Wang, Jinbo Xiong, Maode Ma","doi":"10.1049/cmu2.12778","DOIUrl":null,"url":null,"abstract":"With the refinement and development of the Vehicle to Everything (V2X) concept, its security issues have gradually come to the fore, revealing many security risks and increasing security requirements for V2X, and many protective measures have likewise emerged. The article first introduces the development history of the past Internet of Vehicles(IoV), summarizes some common V2X security threats, surveys the security technologies used for V2X communication, and outlines the development of each technology and the proposed security protocols in the last 3 years. Due to the different advantages and disadvantages of previous protection schemes, the idea of using National Cryptography to supplement the security scheme or designing a new security scheme article based on the National Cryptography Algorithms((AKA SM algorithms) is proposed. The survey then introduces the SM2, SM3, SM9, and ZUC algorithms, describes the development and application of the SM commercial algorithm in recent years, and finally, statistics and introduces the part of the development process of the security protocols currently used in IoV regarding the SM algorithms and gives some application prospects.","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":null,"pages":null},"PeriodicalIF":1.5000,"publicationDate":"2024-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IET Communications","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1049/cmu2.12778","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0
Abstract
With the refinement and development of the Vehicle to Everything (V2X) concept, its security issues have gradually come to the fore, revealing many security risks and increasing security requirements for V2X, and many protective measures have likewise emerged. The article first introduces the development history of the past Internet of Vehicles(IoV), summarizes some common V2X security threats, surveys the security technologies used for V2X communication, and outlines the development of each technology and the proposed security protocols in the last 3 years. Due to the different advantages and disadvantages of previous protection schemes, the idea of using National Cryptography to supplement the security scheme or designing a new security scheme article based on the National Cryptography Algorithms((AKA SM algorithms) is proposed. The survey then introduces the SM2, SM3, SM9, and ZUC algorithms, describes the development and application of the SM commercial algorithm in recent years, and finally, statistics and introduces the part of the development process of the security protocols currently used in IoV regarding the SM algorithms and gives some application prospects.
期刊介绍:
IET Communications covers the fundamental and generic research for a better understanding of communication technologies to harness the signals for better performing communication systems using various wired and/or wireless media. This Journal is particularly interested in research papers reporting novel solutions to the dominating problems of noise, interference, timing and errors for reduction systems deficiencies such as wasting scarce resources such as spectra, energy and bandwidth.
Topics include, but are not limited to:
Coding and Communication Theory;
Modulation and Signal Design;
Wired, Wireless and Optical Communication;
Communication System
Special Issues. Current Call for Papers:
Cognitive and AI-enabled Wireless and Mobile - https://digital-library.theiet.org/files/IET_COM_CFP_CAWM.pdf
UAV-Enabled Mobile Edge Computing - https://digital-library.theiet.org/files/IET_COM_CFP_UAV.pdf